Network / IP security - Expert commentary

Key trends driving access control growth

Access Control is the second-fastest growing area in the security market. A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are just a few factors driving access control adoption both across the residential and commercial markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these factors and how they contribute to the future of access control...

Enhancing video security with physical detector technology

Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improved; however, some conditions can still affect detection using the camera image. Tomo Ito, Business Development Man...

Role of health and performance monitoring in preventing security system downtime

If a security or video surveillance / CCTV system isn’t working, who’s to blame? Or more to the point, what’s to blame? Is the problem the malfunction of a specific device on the edge of the IP network, or is it a network or other system failure? How can an end user or dealer / installer know what the problem is? How can a camera manufacturer know if a call to their overworked tech support department is really about the manufacturer’s camera or cau...

Professionalising security management by challenging established notions

Law enforcement and pure problem-solvingskills will play less of a role for the futuresecurity director Much effort has been put down in the professionalisation of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalisation and academisation of security practice as well as a recently updated standard (ANSI/ASIS...

Analysing effectiveness of security operations with security metrics

The ability to measure and analyse the effectiveness of security operations is extremely useful – not only for identifying and addressing an organisation’s vulnerabilities, but also for demonstrating security’s mitigating impact on overall risk levels along with the higher-level value security delivers to a business. Brian McIlravey, Co-CEO at PPM, explains how security metrics can provide a powerful toolset for accomplishing these objectives. By quantifyi...

The impact of the new HDcctv AT 2.0 standard

Editor's Note: HDcctv Alliance has announced that Dahua has opened its patented HDCVI technology to the global video surveillance industry as the basis for HDcctv's AT 2.0 standard. For additional elaboration on what the move means to the growing market for higher-resolution CCTV, we approached Todd Rockoff, chairman and executive director of HDcctv Alliance. SourceSecurity.com: How is HDcctv AT 2.0 superior to HD-SDI or other previous approaches? Todd Rockoff:  When i...

Significance of value management process

In a highly competitive marketplace, where organisations need to ensure they are contracting for the best possible services, value must be visible. This starts with aligning with the right service provider – one that is dedicated to the organisation’s success and has the people and processes to make an impact. Certainly most, if not all, service organisations say that they strive to exceed client expectations and meet the highest standards in their industry &ndash...

Judging quality and performance of video security systems by the (other) numbers

When comparing specifications among a range of similarly featured video surveillance cameras, NVRs or monitors, it can be difficult to ascertain which of the devices truly has the best performance and/or quality. John Grabowski, National Sales and Marketing Manager of JVC Security Division, poses some questions for consideration: Can the human eye actually see a difference in image quality between one camera that offers 700 lines of resolution and another that offers 600...

Adopting a multi-layered security strategy by extending the benefits of strong authentication

Enterprises have typically focused on securing the network perimeter and relied on static passwords to authenticate users inside the firewall. This is insufficient, given the nature of today’s Advanced Persistent Threats (APTs) and internal risks associated with Bring Your Own Device (BYOD) adoption. Static passwords can be a potential recipe for a security disaster. In this article Julian Lovelock, Vice President of Product Marketing, Identity Assurance HID Global expl...

Tackling the challenge of low-light imaging for megapixel cameras

Low-light imaging has historically been a problem for megapixel cameras. Arecont Vision, like other megapixel camera manufacturers, has struggled to solve the dilemma of low-light images, which are plagued by noise, smearing of video, high bit rates (requiring additional storage) and loss of colour. Arecont Vision says it now has the answer, dubbing it STELLAR technology. The “LL” in the middle of STELLAR stands for “low-light;” the entire acronym sta...

Video management software – the core of security solutions

Traditionally, security systems have been designed with the cameras in mind first then with added consideration for the infrastructure and cabling components. But this is old-school analogue thinking. Milestone Systems CEO Lars Thinggaard states that a security system can be designed for more than just protecting assets by starting with specifications for digital video management software (VMS) at the core of the solution. By thinking 'digital', an IP network video system can...

Ethernet adapters ease the migration to networked platform

PoE has redefined how security professionals design and deploy systems The migration from analogue infrastructure to networked systems continues to gain traction at a rapid pace given all the inherent benefits networked technology provides for video surveillance and security applications. However, there are costs involved and they can be significant, especially if the move to networked infrastructure requires the removal of existing wiring and the installation of new Ethernet...

Optimising Effectiveness and ROI for Physical Identity and Access Management Software

Ideal COTS solutions take cost, customisation and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronised and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...

Pelco Is "Back" with a Focus on IP video surveillance: Hervé Fages

Pelco is making its big comeback with renewed vigour and new lines of surveillance products to set it apart from the rest Working to Regain Momentum in a Changing Market: Most observers agree that Pelco lost momentum in the video surveillance market after the acquisition by Schneider Electric in 2007. Hervé Fages, senior vice president of Schneider Electric's video business, is looking to regain that momentum, guiding the surveillance giant in new directions as the mark...

VMS best practices for IP video surveillance in education

Security is a top priority in schools throughout the United States. The capabilities of IP video surveillance systems, in conjunction with Video Management Software (VMS) systems, make them one of the most popular and effective security tools available. In this article, Gadi Piran, President, OnSSI defines scope and structure of IP video and its advantages in improving school security in a number of ways including: superior image quality, ease of manipulation, integration capabilit...

Seeing success reflected in the marketplace, ONVIF expands its vision beyond video

In China and Russia ONVIF Profile S compliance is becoming mandatory for smaller systems The familiarity and widespread use of ONVIF interfaces in the market are evidence of the success of ONVIF, which was created in 2008 by three manufacturers, Axis, Sony and Bosch. More evidence of success is a growing number of new members and compliant products. All over the world, ONVIF is being embraced – in China and Russia, as examples, ONVIF Profile S compliance is becoming mand...

Genetec plans “continuous integration” approach to manage changes to cloud services

The impact of the IT department on physical security has been a source of discussion for years. Generally, the influence of IT on purchasing and technology decisions related to physical security systems has been seen as increasing with no end in sight. One industry leader thinks otherwise. Pierre Racz, president, CEO and founder of Genetec, sees the clout of the IT department waning in the age of “bring you own device,” cloud services and greater intelligence at...

SourceSecurity.com Technology Report highlights remote business management platform

A new Technology Report from SourceSecurity.com, produced in collaboration with Oncam Technologies, highlights how a new technology platform that combines cloud-based computing and automated on-site data collection can help businesses with remote monitoring and management. Combining inputs from surveillance systems, access control, intrusion detection systems, and video analytics, among others, the OnVu360 management platform has applications in remote business management and secur...

PPVAR advocates use of video verified alarms to increase arrests and reduce property crime

  In practice, 90 percent or more of burglar alarms are false, and studies have estimated the related arrest rate at about 0.02 percent. No wonder law enforcement responds as a low priority, if at all. In contrast, a video-verified security alarm provides the virtual equivalent of an eye-witness to a crime in progress, and responding to video alarms yields arrest rates in the double digits – 20 percent or higher. That's a thousand times higher than non-video alarms....

H.265 compression set to make a mark on IP Video Surveillance

 H.265/HEVC coding format will bring major benefits to IP video cameras offering a new level of video quality at an economic price The emergence last year of a new format for High Efficiency Video Coding (HEVC) is poised to have a huge impact on IP video surveillance cameras over the next few years. Among the benefits of the new H.265/HEVC coding format over the legacy H.264/MPEG-4 is a 40 percent or more bit rate reduction at the same visual quality. Therefore, a camera...

Positive economic outlook for security market in 2014

A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...

Fault tolerant access control for business continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems are becoming a necessity in several high-security environments as they ensure that security is not compromised in the event of some malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this article, Greg...

Redefining access control with NFC-enabled smartphones

Comprehensive and robust security programmes and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Fur...

Security by design or designed for security?

Utilising the principals of IT security can help developers create a secure physical system that meets an organisations needs Secure Systems start with secure design and smart planning. In this article, Albert Derckson, Research and Development Director at Nedap, discusses the necessary design elements for building a more secure system based on security principles.  These principles of physical security, many of which can be drawn from proven principles of IT security, su...

Panoramic megapixel cameras boost wide area surveillance

High definition (HD) megapixel cameras can help in the surveillance of larger areas with fewer cameras while delivering superior detail and improving overall security operations. This translates into lower infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video systems with megapixel cameras and achieve better performance and functionality. In this article, Scott Schafer, Executive Vice President of Arecont Vision ex...

A long-lasting alliance between system integrators and customers promises to be favourable for both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for system integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced c...

Creating a safe and secure workplace environment using a culture of openness

Companies that have developed a culture of openness can provide and receive feedback at all levels The nail that sticks out gets hammered down” is an old Japanese saying that encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Brent O’Bryan, SPHR at AlliedBarton Security Services, explains that a winning formula for both the organisation and an individual is a culture actively exhibiting healthy behaviours and practi...

How high definition video surveillance can help crime prevention

72% of British consumers express preference for HD CCTV over standard CCTV systems According to a survey by YouGov and Avigilon, 38 percent of people feel safe in areas where they know CCTV is being used because it acts as a deterrent, and a further 41 percent attribute the feeling of safety to the fact security forces can use the footage if anything were to happen. The presence of CCTV in the UK makes people feel safe, but the images captured by today’s CCTV cameras are...

Enhancing security with 360-degree video surveillance

One alternative purpose for a 360-degree camera is the ability to provide a panoramic view in a wall-mounted orientation Surveillance cameras that capture 360-degree images are unique. However, cameras with technology that enables a user to retrospectively track an incident back in time are even more unique. This combination provides customers with total situational awareness—a field of view much larger than the capability of narrow-field, fixed-view cameras. In this art...

Unifying identity management and access control

For many companies, the current state of their access control infrastructure is best described as being fractured Identity management has now become a very important requirement for companies. The challenge, of course, lies in proper integration of different physical access control systems with an identity management system. Sophisticated security software can help overcome this challenge, says Ajay Jain, President and CEO of Quantum Secure, who adds that increasing regulatory...