Physical security - Round table discussions

How does IT affect the physical security buying decision?

With more physical security systems using Internet protocol and being connected to the enterprise IT network, it’s not surprising that the corporate IT department is more involved than ever in the buying decision – for better or worse. Does the IT department bring valuable resources to the table, or are they an impediment to the sales and integration process? It’s not a new issue, but an increasingly important one as the industry changes. We asked this week’s Expert Panel...

Do privacy concerns limit use of audio features in video cameras and surveillance systems?

Most of today’s video surveillance cameras are capable of providing audio, but when should it be implemented? Acceptable uses of audio surveillance, as opposed to video, are a different concept in many jurisdictions worldwide. Privacy laws regarding audio may be more stringent than those for video, but both tend to centre around the concept of an “expectation of privacy,” which may mean something different in the case of audio versus video. How can system designers and end user...

How does globalisation impact the physical security marketplace?

There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximise their successes throughout the world. We asked our panellists this week to comment on how they see globalisation impacting the physical security market. Their broad-ranging responses emphasis the opportunities and challenges of succeeding the global marketplace.

What do you expect to be the "big news" coming out of ISC West this year?

The U.S. physical security market will be focused on Las Vegas this week and the big ISC West trade show for 2015. But what should attendees expect when they get to Sin City? We asked our panelists for their insights into what will be making “big news” at this year’s show. Fortunately, the suspense is almost over!

What are the cybersecurity vulnerabilities of IP based systems?

Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...

How to avoid counterfeit security products?

“Buyer beware” is always good advice in the security marketplace – or in life for that matter. But the age-old warning is more timely than ever in our age of global commerce and given our fragmented market with thousands of products manufactured all over the world. Complicating the picture: our market is also inching toward commodisation and facing downward pricing that shrinks margins for manufacturers. So the question becomes: When is an item merely a good deal or somehow &ld...