Perimeter security - Expert commentary

Terrorism drives global demand for crash-resistant barriers, barricades and bollards at embassies and consulates

As terrorism continues to rear its ugly head, we at Delta Scientific have been upgrading high-profile embassy and consulate facilities for several major counties around the world. 2015 was a strong year for us. We saw an increase in manufacturing output on our complete line of vehicle barricades and guard booths. 2016 shows no signs of slowing down.    Increased global security measures for explosive-laden vehicles  The Middle East is a particular hotbed for increas...

Continued growth of thermal imaging cameras for perimeter security

The security market was affected by the economic situation in 2015. However, the penetration of thermal products for security applications continues, and FLIR is seeing strong growth. The company saw the use of thermal imaging cameras continue to develop in perimeter security. End users and integrators are experiencing excellent results by combining high-quality thermal cameras with video analytics. The take up of thermal cameras is increasing for security applications as the industry recognises...

Reactive to proactive - central command centres transform security capabilities for organisations

Command centres allow physical and IT security to collaborate for greatersituational awareness and responsiveness Conventional command centres focus on video and access control system monitoring. When something happens at a door, the video system reports the event to one monitor in the command centre, while the access control system reports to another monitor. It is up to the operator to imagine the possibilities, draw the right conclusions, decide on a response and, if necess...

Mobile & biometric access control to build in 2016 with increased need for perimeter security

While the access control market typically moves at a near glacial pace, 2015 brought quite a bit of news to the marketplace, including the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. For Vanderbilt, 2015 was a big year as we brought the Siemens Security Products business into the fold, building our global brand and awareness of our award-winning solutions that have been...

Solar and wireless video surveillance technologies continue to revolutionise security market

Video surveillance technologies such as solar and wireless security which are cost-effective and sustainable have witnessed increased adoption. Innovative end-user focused security companies will flourish in the coming years as new market verticals are looking to address security issues.   Evolution of surveillance Looking back over the past year, it is easy to see how the security industry has continued to realise substantial gains. Some of these gains have been financial, s...

Hardening perimeter security by integrating more access control technology at entrances

At 2015 year-end, we are continuing to see a trend toward hardening the perimeter for buildings and property. I believe we are approaching a tipping point with respect to C-suite awareness of the perils of unauthorised entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organisations to take action. Role of trusted consult...

2015 sees rise of drone detection systems and the convergence of physical and cyber security

Physical and cyber security convergence, perimeter intrusion detection systems and fibre optic-based sensors were some of the security trends that picked up pace in 2015 and will continue to grow in the coming year as well. The beginning of 2015 started out slowly as the implementation of security projects by a number of organisations was postponed for various reasons. Mid-year picked up momentum, and the year is ending on a strong note. A significant trend was the gradual progression of conve...

The role of security integrators in preventing tailgating

Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorised person follows an authorised personnel through a controlled entrance. More than 50 percent...

Paris attacks shift focus on securing soft targets against external threats

Soft targets are civilian-centric places suchas churches and retail centres, where securityis not as fortified The terror attack on Paris on Nov. 13 lasted just 23 minutes. The bombers and gunmen split up and attacked seven sites: the soccer stadium where it all began, four restaurants, a bar and a concert venue. All told, they killed 130 people and injured 368 in the time it takes for a coffee break. This situation has raised questions about the security management for conce...

EMERgency 24, dealer value and RMR with critical response services

EMERgency 24 developed the Incident Command and Control platform to deliver faster and more succinct data to first responders and others At ISC West 2015 in Las Vegas, EMERgency24 introduced a groundbreaking web-based software platform called Incident Command and Control Service, which allows system owners to generate alerts for situations such as lockdown, severe weather or HAZMAT (hazardous materials) situations and enables instant communication to pre-defined contact groups...

Airport perimeter security breach – laughable or potential threat?

If airport perimeter fencing is vulnerable then covert detection methods should be used Lack of airport perimeter security would be laughable, if it weren’t so serious. A recent farcical breach of security in London is drawing renewed attention to airport perimeter protection. I want to focus on airport perimeter security, but we’ll start with critical infrastructure in general: A nun, a housepainter and a gardener break into a nuclear facility. This sounds like t...

Laser scanning technology for perimeter protection, building security applications

When it comes to protecting buildings and property, traditional methods of security—such as structural barriers, security guards, and security cameras—have their limitations.  Advanced laser scanning technology can overcome many of these limitations and provide a safe, reliable, and easy-to-use solution. Overview of laser scanning technology Laser scanning technology for building security applications utilises the time-of-flight method, in which a sensor em...

The challenge of keeping contraband out of prisons

The technological resources from the physical security sector available to prisons dealing with contraband threats are effective For those outside the security industry, the idea of prison contraband rarely extends beyond the old gag of a file inside a cake. In fact, contraband at prisons and other custodial premises is a major challenge: deterring and detecting it occupies many man-hours, and manufacturers devote much R&D activity to the problem. Contrabands in prison T...

Technology solutions to deter and detect international stowaways

Stowaway incidents in the last two months in the United Kingdom have dramatised the desperate nature of individual attempts to cross borders. They have also exposed the callous methods of human traffickers. Sixty-eight foreign nationals were discovered in four lorries at the port of Harwich on the south coast of England in June after the vehicles had disembarked from a Stena Line ferry entering English waters from Holland. None of the group, which included 15 children and tw...

Technology contributes to holistic security approach at primary/secondary schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting primary/secondary schools. Technology can contribute to a broader, holistic approach to security that is customised to meet the needs of each educational institution. Honeywell has helped many schools customise security systems to meet each school’s unique needs, says Bruce Montgomery,...

From barriers to Bluetooth at ISC West: Reinventing the door opening category

ASSA ABLOY discussed the importance of securing the critical infrastructure, the building and beyond, at a media press conference April 15 on the opening day of ISC West 2015 in Las Vegas. Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group, based in New Haven, Conn., outlined some of the current and future objectives of the company, which continues to fine-tune its global leadership in door opening solutions while playing a significant role in the future of access...

Addressing the unique security challenges of primary/secondary schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Sports security: Ensuring safety at sports venues a continuing challenge

Anything that can incite a crowd surge is a security threat in a sports arena Security at sports stadiums is making headlines across several countries during a week when UBM announced that Protection & Management 2015 (which includes the IFSEC International trade fair) will feature Karren Brady (Baroness Brady), a career soccer executive, as one of its inspirational keynote speakers. As I type, inquests are being held into the deaths of some of the 96 people who were kill...

Smart thermal cameras protect perimeters in transportation applications

Thermal cameras can often be used to cover larger areas than standard visible light cameras Smart thermal cameras use on-board video analytics and a high degree of video processing to detect people very accurately in complete darkness, bright sun, and bad weather over the typically large perimeters associated with transportation applications. Combining manpower and smart thermal technology makes security for transportation assets more effective. At the end of the day, it takes...

Addressing false alarms in video analytics

Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...

Combining thermal cameras with video analytics

Combining thermal imaging with analytics provides a robust system Prices are dropping for thermal cameras. Now they are much more affordable for non-military customers – and more likely to be used in combination with video analytics. Combining thermal imaging with analytics provides a robust system; the technologies work well together. Thermal cameras make it easier to detect motion because you are eliminating much of the detail and only emphasising temperature “c...

Video Analytics for forensics: Analytics-based forensic evidence collection

Intelligent searches of video archives provide investigators faster access to any needed video clip That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some modern video analytics solutions can not only save investigators significant amounts of time but also help them find results more accurately. These solutions leverage facial recognition and advanced object tracking, demographic analytics, lice...

Video analytics systems in real-world environments

Various vertical markets such as retail, airports, and transportation have benefited from video analytics Video analytics systems have progressed far beyond the theoretical and are now being used effectively in a range of applications. Let’s look at some of the real-world scenarios that have taken advantage of the latest video analytics systems. Video analytics aren’t just for security. For a traffic application, Agent Vi provides business intelligence on the ave...

Multiple high-value markets are embracing video analytics

The aviation and transportation industries are using video analytics to provide operational cost savings and performance enhancement Video analytics are now increasingly being used for the critical infrastructure, airports, transportation and city surveillance sectors, among other high-value markets. These markets need robust video analytics solutions that can be integrated into an overall security solution to deliver totally reliable results without any significant level of n...

Taking another look at video analytics

Video analytics allow users to automate the use of video and extract more value Almost anyone in the video analytics market will admit that the capabilities of the technology were initially oversold. The first generation of analytics simply didn’t work as promised, and an undercurrent of distrust of the technology in general still haunts the market. Ironically, video analytics capabilities have now matured into a robust and dependable option for a variety of applications...

Usefulness of video at airports extends beyond security

Video cameras are great tools for security at airports, but increasingly cameras are offering operational benefits, too. Anthony Incorvati, business development manager, critical infrastructure and transportation, Axis Communications, says cameras at airports today are often used for operations rather than (or in addition to) security. For example, cameras mounted at departure gates are not installed for security but rather for operations and maintenance, as a tool to help airlines...

Meet Dave Tyson - ASIS 2015 president

Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...

Security is better than ever! The industry is optimistic looking to 2015

Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organisations participated in our...

Extending the reach of video surveillance in 2015

Customers look to leverage video surveillance technologies to optimise and monitor operations within their business MicroPower 2014/2015 Review and Forecast: In 2015, we will continue to see customers look to leverage video surveillance technologies to optimise and monitor operations within their business. Solutions that enable organisations to shift from more situational awareness to situational assessment – for example, using images collected from the surveillanc...

New NERC standard to guide security of bulk power systems

On April 16, 2013, snipers fired for 19 minutes on PG&E Corp.'s Metcalf electric power transmission station near San Diego, California, knocking out 17 giant transformers that supply electricity to Silicon Valley. At least 100 rounds were fired from at least one high-powered rifle. The power grid was rerouted to avoid a blackout, but it took 27 days to make repairs and get the substation back up and running. The incident got the attention of regulators and security prof...