Physical security - Expert commentary

Door security trends: The path forward

The outlook for advancements in door security solutions is proving to be an extension of the positive trends that have emerged over the past few years and that continue to evolve in exciting new ways. That’s a good sign as we make our way along the road toward an ever-safer world. Improvements in a hybrid workforce  Here’s what we’re seeing: More and more companies are rethinking the office space and how electronic access control (EAC) security and data can help better s...

Everything you need to know about adding Planned Preventative Maintenance (PPM) to your building

If defence is the best form of attack, then in security, planned preventative maintenance (PPM) is the best way to protect your business from harm. Also known as PPM, the service ensures that your security efforts are up-to-date and effective. In the latest how-to guide, discover the benefits of planned preventative maintenance and learn how to add PPM to your building. What is Planned Preventative Maintenance? You have installed all of the necessary security measures for your business, now wh...

How to update telecom security for the 5G era

Although the wider adoption of 5G, together with faster connection speeds and improved bandwidth, opens up new prospects for telecom service providers, it also poses new risks in terms of network security. This article explains how telcos can make their newly-established 5G networks as well as telecom software solutions more impenetrable and secure. Implement robust device authentication protocols 5G is set to spur a wide-scale adoption of connected devices in the business and consumer sphere...

How technology addresses worker shortages in security

It’s clear that despite recent layoffs in the tech industry and general unease about the economy, there are still significant gaps in the number of jobs available and the amount of workers available to fill them. According to the Labour Department, there are 5.5 million more job openings than workers available. The physical security industry is not immune to these shortages. Last fall, Allied Universal reported being unable to fill thousands of open roles nationally while other smaller s...

How secure is your identity management solution?

Identity management is an important element of both data security and physical security in an organisation. But all ID management solutions are not the same—especially when it comes to security. There are no uniform security standards for the industry, and many off-the-shelf systems fall short when it comes to data protection. To protect people, property, and data, make sure you select a system that maximises security at every stage. What is identity management? Identity management&mdas...

Six trends at the intersection of video and AI

Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early colour cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books....

Innovative security: The key to business efficiency, cost savings and more

Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend: More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher...

The right to privacy in the age of digital eyes

Back in 1890, Samuel Warren and Louis Brandeis published a ground-breaking article in the Harvard Law review called ‘The Right to Privacy’. To this day, it is regarded as one of the most influential essays in the history of American law and is widely regarded as the first publication in the United States of America to advocate a right to privacy, articulating that right primarily as a ‘right to be let alone’. In this essay, the authors questioned whether the arrival of p...

Want the benefits of true cloud: Look beyond the cloud marketing

Many people, quite correctly, point to Salesforce.com—which launched in February of 2000—as the first example of cloud computing. In the years following, the term ‘cloud’ became so popular and was applied to so many products and service offerings, that it became almost meaningless. The result was cloud confusion in the business world and in the media. In one stark example from 2008, Oracle CEO Larry Ellison described news stories about cloud as, ‘complete gibberis...

A step-by-step guide to choosing the right smart lock

The world around us is full of technological innovation. Smart locks are commonplace in our homes and control access to buildings, but when it comes to industrial locking and access control for equipment cabinetry, options can seem limited. Equally, there’s not enough accessible information to act as a guide. The development of new technologies and cabinet capabilities feels as though it is being held back. But that doesn’t have to be the case. Common problems are seen across the l...

Illumio - securing the supply chain against cyber attacks

Trevor Dearing, the EMEA Director of Critical Infrastructure Solutions at Illumio, said “It is encouraging to see NIST releasing updated guidance acknowledging the increase in cyber-attacks targeting the supply chain and the consequent necessity to bolster the supply chain’s cyber security. We can no longer turn a blind eye to the exponential increase in attacks on the IT systems of manufacturers, logistics companies and organisations, which ultimately target the operational part of...

What physical specifications play a role in integrating card reader

One key aspect of hardware design is choosing an appropriate form factor for your product. In today's world, form factor not only defines your product's size and shape but also includes its aesthetic appeal. While size and shape are important, another aspect that is prominent when dealing with RFID card readers (including NFC and BLE mobile credential readers) is the reader's location within the end device and the size of the RF antenna. This article focuses on some key considerations relating...

Eleven considerations for embedded system RFID readers

Today, RFID readers can be found in numerous devices requiring user authentication, authorisation and access control, from doors to multi-function printers to point of sale terminals to computers and more. RFID is a simple, secure and convenient access control solution for end users and original equipment manufacturers. RFID readers/writers come with a broad range of form factors, capabilities and configurations. Choosing the right RFID reader When choosing a reader to embed into a system or d...

Transforming physical security with real-time situational awareness

There is little doubt that security concerns have heightened in the near two years since the pandemic first swept across the globe. A report from Pro-Vigil reveals that nearly one in five companies experienced more physical security incidents since the start of the COVID-19 pandemic, and one in three of the 124 respondents surveyed anticipate further increases in 2021. The tragic terrorist attacks experienced during this period in the UK have caused many organisations to make changes to their...

5 intelligence-based capabilities for boosting executive protection

Corporate global security operations centres (GSOCs) bear the responsibility for protecting C-suite executives from physical and reputational harm amid the social upheaval, extreme weather events, and escalating cyber threats. That mission, daunting as it is, becomes more difficult when GSOCs lack the data necessary for conducting a comprehensive threat assessment. Threat intelligence Unfortunately, many centres never move past basic threat intelligence which focuses on scenario-driven queries...

Identity and access management in 2022 - what will the future look like?

As we enter into 2022, there is still a level of uncertainty in place. It’s unclear what the future holds, as companies around the world still contend with the COVID-19 pandemic. Remote working has been encouraged by most organisations and the move to a hybrid working system has become ‘business as usual’, for the majority of businesses. Some have reduced their office space or done away with their locations altogether. Following best security practices With all this change in...

Why cellular connectivity is the smart choice for CCTV deployments

Businesses large and small rely on their CCTV systems to deter intruders and provide recorded evidence of security incidents. Overtime, CCTV has evolved to offer real-time intrusion detection and monitoring, and businesses now expect easy, secure and anytime access to cameras, and data. For that, they need connected CCTV systems. These modern installations can benefit from cellular connectivity, helping businesses protect their sites, while also supporting enhanced capabilities for CCTV to deliv...

Crossing the divide - automating security processes across physical, business and IT domains

Security is a critical requirement for all organisations. Getting security right involves the correct mix of people, processes and technology working together. However, many enterprise companies don’t look at the full mix that encompasses information security, and instead split their physical security and business continuity teams away from their IT security departments. According to research by ASIS, around half (52 per cent) of companies have converged two or three out of their physica...

Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of fa...

The automated future of retail and how to secure it

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more cont...

‘We want to become better known for access control’ - Q&A with Bosch Building Technologies’ Gregor Schlechtriem

Gregor Schlechtriem has worked in the access control market for over 20 years and is now responsible for the Access & Intrusion Business Unit at Bosch Building Technologies. In this interview, the expert talks about key industry trends, the impact of the COVID-19 (Coronavirus) pandemic, technical innovations and his company’s strategy. Mr. Schlechtriem, you have many years of experience in the security technology market. What is your background and what are your responsibilities as Se...

Insider threats are on the rise – even in the virtual workplace

More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organisation, are posing a major security problem for businesses. This is pa...

The robotic transformation of the security industry

The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transform...

How schools can make outdoor learning safe and secure

Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head...

The growing popularity of personal safety apps

The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery...

Cutting through the hype: AI and ML for the security space

Today’s organisations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure o...

Sensor data fusion for more reliable intrusion alarm systems

Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-mas...

Mitigating the total risks and cost of a physical security incident

Owning and operating an entertainment venue comes with increasing levels of risk – whether it’s during the current pandemic or in a post-pandemic world. With the additional challenge of safe re-opening comes increased levels of social unrest, emboldened and unruly patrons, and increasing threats from weapons and other prohibited materials. The venue owners and operators have an obligation to keep patrons and employees safe from these kinds of security threats, while not negatively...

Get the most from investments in building security

From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone...

How to build smarter, more secure cities from the ground up

Today, we live in a technology-obsessed age. Whichever way you look, it’s hard to avoid the increasing number applications, products and solutions that continue to redefine the boundaries of what we previously thought possible. From autonomous vehicles and edge computing to 5G and the Internet of Things, all facets of our lives are continuing to evolve, thanks to an endless stream of differentiated innovations. In this article, we’ll be focusing on the latter of these - the Internet...