Network / IP security - Expert commentary

Minimising video frame drops in video surveillance systems

Gaps in video from dropped video frames are a common problem. A web search on the phrase “dropped video frames” turns up links oriented towards gamers, YouTube videographers and even the world of video surveillance, discussing why frame drops happen and providing advice for coping with them. On Windows computers, video frame drops are a fact of life. Much of the advice can help reduce the number of frame drops, though never completely eliminate them. If you are an amateur filmmaker...

Identity management systems verify employee background screening checks

One leading company has developed an identity management system using patents that verify the identity of an applicant Most enterprises rely on background screening providers to report accurate and complete information without understanding the litigious landscape. Security executives often have little input in how background checks are performed or by what provider, as this has become the domain of human resources (HR). A growing trend finds employers and their backgroun...

Integrating security management into broader building systems

Security solutions should be about integration not isolation. Many organisations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. Gert Rohrmann, Technical Manager for the solutions division of Siemens Building Technologies UK, examines how by drawing data from a number of different sources...

Intercoms increasingly popular in education, campuses and multi-tenant housing markets

Part 1 in our Intercoms in Security Series Lambert-St. Louis International Airport uses Code Blue intercoms Organisations are demanding a new level of interoperability among mission-critical security systems. Intelligible audio, the ability to hear, be heard and be understood, is critical to communication, which is essential to the core security processes within an organisation, as well as to emergency situations. Intelligible audio provides a platform to optimise various...

Intercom technology and entry security: Keeping pace with security innovation

Part 2 of our Intercoms in Security Series The 2N Helios IP family intercoms present a comprehensive portfolio of security offerings for businesses and individuals Some integrators and end users may think of intercoms as older technology that isn’t required as part of a robust security system. Not true. Intercoms include innovative technologies that have developed rapidly, keeping pace with other categories. Just as cameras and access control systems have made techn...

Building human relationships in an automated customer service world

How do you provide unparalleled, personalised customer service and support in a high-tech, self-service world? This blue ribbon is achievable by fusing the human component of superb customer care with user-friendly, cutting-edge solutions that are available around the clock. Technology has made it possible for customers to get assistance at their convenience, with no need to be concerned with business hours or time zone differences. Automated operators and sophisticated websites c...

[Download] House Of Smart Cards: How assumptions can open dangerous security gaps

In early 2016, dialogue between ASIS International in Europe and HID Global around access technology identified the need to take a closer look at why sometimes cutting-edge technology is not as effective as it should be in real world applications. Central to the issue were security gaps caused when elements are combined that do not match the same level of sophistication. This resulted in ASIS conducting a study amongst its European members with HID Global providing support o...

[Download] Choosing the right solution for video data needs

  Demand is increasing rapidly for more video, higher quality video, and increasing use of video for innovations like video analytics that provide enhanced security and operational intelligence.   The growing demand is driving higher resolutions, larger camera counts, and longer retention times, which have all contributed to the growing importance and higher profile of data management and storage systems in the video surveillance industry.   Customers need...

Deep learning algorithms broaden the scope of video analytics

Over the years, video analytics has gained an unfavourable reputation for over-promising and under-delivering in terms of performance. One of the biggest complaints regarding video analytics has been its inability to correctly identify objects in situations which appear trivial to the human observer. In many cases, this has resulted in a tendency to generate substantial numbers of false alarms, while not detecting actual events accurately. This, together with a propensity for complex set-up proc...

[Download] The state of physical access control: Impact on the enterprise

  The global market for card-based electronic access control (EAC) is projected to reach $10.1 billion by 2020 according to Global Industry Analysts. However, as credential technologies have evolved over the years, so have the ways users interact with them.   Mobile credentials   One of the bigger developments over the past few years has been the increased adoption of mobile credentials, which allows users to access facilities via their mobile device. To m...

Impact of MmWave Technology on network video surveillance solutions

CCTV security deployments require high reliability and availability in order to prove truly effective In recent years, there has been incredible growth in the security video surveillance market with law enforcement agencies embracing video surveillance to enhance security in problematic areas across cities. But these projects require connectivity to carry video feeds from multiple deployed CCTV cameras distributed over one or more sites, to the control room for viewing and rec...

Optimising building automation for good return on investment

Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realised through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new tech...

Aligning physical and digital security in the Cloud

Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile...

ISC West 2017: How will IT and consumer electronics influence the security industry?

The top influencing trends in the security industry at ISC West 2017 will be big data, cyber security and the Internet of Things More than a thousand companies will be showing off their latest and greatest technologies and services at this year’s ISC West in Las Vegas. With so much to look at and experience, will you be able to pinpoint the next big thing or things that will dominate the security market in 2017? A good way to predict those upcoming trends is to look at w...

Securing premises to avoid million dollar verdicts

Crime prevention may require changes to the structure, added surveillance cameras, effective access control methods Given the vast amount of litigation, businesses and property owners must find a system of adherence towards safe and secure premises to avoid multimillion dollar verdicts. In the business of law, negligent security is a rapidly growing niche field and the number of lawsuits continues to increase. Why? The obvious answer is the current lack of uniform security pro...

Smartphones offer many advantages over cards and fobs for access control

Smartphones offer a new alternative to traditional physical access control form factors such as smart cards or fobs. Convenience is the most obvious benefit, but there are others. Here are some advantages of using smart devices for access control: 1. Less vulnerability to cloning when compared to magstripe or low-frequency proximity cards. Digital credentials and mobile IDs are securely stored and protected. 2. Longer-distance communication, which allows readers to be mount...

Artificial intelligence poised to make great strides in security industry

When most people think of the term artificial intelligence, science fiction films both old and new tend to come to mind. Whether it’s the military network Skynet becoming self-aware in The Terminator and wiping out the majority of mankind with nuclear weapons, or the hosts in Westworld developing consciousness and turning against their human masters, Hollywood tends to paint a grim picture of this area of technology. The reality is that artificial intelligence – or AI...

QinetiQ demonstrates new privacy-protecting body scanner for crowded places

The new scanner can quickly screen large groups of people without needing them to stop or slow down Most body scanners are designed to work one person at a time, checkpoint style. QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. The QinetiQ SPO-NX SPO-NX...

Key critical thinking skills for security professionals

Successful critical thinkers are judged by results that almost always involve deliberation and intuition, logic and creativity Security and safety practitioners responding to evolving threats make decisions every day based on uncertainty, insufficient information, and too few resources for textbook solutions. Unsurprisingly, Chief Security Officers report that critical thinking, decision making, and communications skills are key characteristics for job success. But do we reall...

Next generation video analytics: separating fact from fiction

Real-time search analytics addresses one of the most important control room tasks - locating a person of interest If you have been to any of the many security industry tradeshows this year you will undoubtedly have seen and heard the phrase ‘next generation video analytics’. Is it just a catchy marketing phrase or is there more substance behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mys...

Increased power grid security tackles natural and man-made threats

Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a mode...

Protecting cultural and hospitality venues from terrorist attacks

Cultural and hospitality venues are attractive targets for terrorists due to their public accessibility Over the past 40 years there have been numerous attacks carried out against cultural and hospitality venues in the furtherance of religious, ideological, criminal or political beliefs. By default, cultural and hospitality venues are attractive targets for terrorists due to their public accessibility, the volumes of visitors and guests or because of what the venue represents;...

Combining mechanical and electronic systems to enhance door security

Customers are increasingly requesting both mechanical and electronic services for their doors In most buildings, security is a hybrid solution of both mechanical and electronic security products. Locksmiths take care of the mechanical door hardware and the integrators focus on the electronic security technology. However, for consumers, this traditional division of labour means they must deal with two different companies for the same door - one to design, install and service a...

Simplifying multi-site security management with the Cloud

Cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management Facility managers and security operations staff are often bombarded with calls from multiple tenants, across several sites — each with unique needs — but traditionally they had no insight or control on the spot. Now, cloud-based solutions with mobile credentials and capabilities are simplifying multi-site management — enablin...

What will Donald Trump's presidency mean for the security industry?

The border with Mexico is an obvious starting point for the security community. Many had assumed that 'wall' would mean a high-tech fence or possibly just a virtual barrier of perimeter intrusion detection systems (PIDS), video surveillance with analytics and thermal imaging. However, during a press conference shortly before inauguration, Mr Trump put journalists straight. Unless there is a mountain or river already doing the work along the 2,000 miles to be protected, this really...

Developing an antiterrorism plan: A step-by-step guide

Counterterrorism tells antiterrorism about threats and antiterrorism tells counterterrorism about unusual or suspicious activities The most terrifying thing about terrorism is its reliance on the element of surprise. Most people don’t see the attacks coming, or don’t recognise the indicators when they see them. When terrorists strike, law enforcement is disadvantaged, the victims shocked and by the time an effective response is mounted the perpetrators are oft...

Physical security evolves to protect mobile workers

Many employees who once commuted to on-site corporate offices now spend their time working remotely or travelling between sites Over the past two decades, the workforce has drastically changed. As mobile devices became increasingly affordable and the demand for multiple offices, distributed campuses and globalisation has increased, many employees who once commuted to on-site corporate offices now spend their time working remotely or travelling between sites. In 1997, only 9.2...

[Download] The most viable converged solution for video security and monitoring

A Converged Solution for Video Security, Monitoring and Storage: Today’s networked video systems have expanded their functionality beyond simply storing and retrieving video. Deploying the latest video systems depends more than ever on managing video data efficiently and effectively. New tools for managing video data include the use of virtual storage platforms, dynamic tiered storage, and video management system (VMS) software, all combined into a converged, standalone sol...

How to approach campus outdoor security

The locks, alarms and access control solutions used for buildings have little impact outdoors Large campuses – colleges and universities, hospitals and office parks – face difficult security challenges in protecting people and property across wide-open outdoor spaces. Outdoor security requires a different approach. The locks, alarms and access control solutions used for buildings have little impact outdoors. Outdoor security may include protecting a student on an...

Innovation and Internet of Things to influence 2017 security market

Continued consolidation and price pressures were factors in 2016 in the security market, which grew as expected.However, there is still interesting innovation being developed to further the market, such as the industry’s first PTZ with laser focus, says Fredrik Nilsson, VP, Americas, for Axis Communications. “While the video surveillance market is getting close to being 100% converged over to IP, there are many other IoT markets that are early in the cycle of convergence, such as int...