Physical security - Expert commentary

Physical security and the cloud: why one can’t work without the other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is s...

Hybrid working and the threat of desk data

The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing s...

How technology can elevate guest services and their security

The return to the workplace is a focal point for many in the built environment but one of the most important elements is easy to overlook. Guest services will be vital in the return to the workplace. Front-of-house teams will be responsible for welcoming building users back and reassuring them as they negotiate shared spaces in the post-Covid era. The workplace will inevitably look different after Covid. We have become more aware of our spaces, how clean they are, and what spaces building users...

VSaaS and ACaaS uptake increases due to cloud adoption as a result of COVID

While COVID-19 caused widespread disruption and many challenges for businesses, its sudden arrival prompted some very quick decision-making around how to maintain operations. For some businesses, cloud-based video conferencing solutions provided a welcome alternative to meeting face-to-face. A year on and it seems that this sudden and mass adoption of cloud has accelerated a digital transformation process in other departments. Physical security too is increasingly moving to the cloud in the form...

We need to talk about intelligent enclosure protection

Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actual...

Will network requirements help you build your business or put you out of business?

Once upon a time, providers had end-to-end control when deploying a physical security platform, which is not the case anymore when we consider the modernisation to IP. When considering the move to IP physical security, the provider needs to ensure the customer has a robust PoE backbone to connect the IP security device back to the application. Network readiness requirements have complicated IP security deployments, making it challenging for current providers while opening the door to new compet...

Will network requirements help you build your business or put you out of business?

Once upon a time, providers had end-to-end control when deploying a physical security platform, which is not the case anymore when we consider the modernisation to IP. When considering the move to IP physical security, the provider needs to ensure the customer has a robust PoE backbone to connect the IP security device back to the application. Network readiness requirements have complicated IP security deployments, making it challenging for current providers while opening the door to new compet...

AI is transforming the security industry

We encounter AI with increasing frequency, both online and in the media. AI has penetrated deep into various aspects of our lives, from TV sets that improve picture quality using AI, or air conditioners with automatic temperature and humidity control, to investment management services that predict return rates. AI technology first appeared in the 1950s and was briefly revived in the 1980s before falling off the radar. In the late 2000s, AI re-emerged and went on to become a key technology and d...

We have the technology to make society safer – how long can we justify not using it?

While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras  Similarly, CCTV is a well-established security measure that many of us are familiar with, wheth...

Securing empty premises: Product performance is everything

Since the start of the pandemic, almost a quarter of UK businesses have been forced to temporarily close, pause trading, or work remotely, with very little notice. Now nearing the 12th month of the crisis, the country is currently enduring its third national lockdown, with an unspecified timeframe. Most workers are being urged to remain at home and only venture out for essential travel. This means a huge number of premises across the board, from recreational venues such as theatres, pubs and le...

Safety in smart cities: How video surveillance keeps security front and centre

Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...

Biometrics provides industries with security, access control, and data protection

Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide servi...