Radio frequency Identification - Expert commentary

Consultants' Forum: The future of mobile access, location services and BIM

Mobile access is probably the largest emerging trend in the security marketplace, but it is only one of several that are changing the face of the access control market. Another factor showing potential to change the market is the emergence of location systems and positioning systems, as reflected by HID Global’s recent acquisition of Bluvision, a provider of real-time location tracking system for assets and employees, and building information modeling (BIM) is impacting how consultants do...

Innovation in the intercom market drives more access control capabilities

Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room Greater connectivity, security software enhancements, more customisation, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones an...

7 things you need to know about iris recognition systems

Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but firs...

Cloud-based surveillance spearheads growth in security as a service

The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...

Wireless tracking & RFID enabled Real-Time Location System protects infants at Boston Medical Center

The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...

Electronic locks prove a worthwhile investment for the security industry

  The security industry as a whole is migrating from the historical mechanical lock to the newest technology of electronic locks Mechanical locks and keys date back thousands of years and have undergone many changes, but the industry’s transition to electronic locks might be the most important, lasting, and surprisingly affordable security and safety change of all. The objective behind the creation of locks so long ago remains: to control a value on the other side...

Access control evolution allows multiple options for healthcare security

Part 8 of our healthcare series Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. Hospitals are challenging environments. A hospital requires ov...

Wireless access control moves closer to mainstream adoption, with more potential waiting to be tapped

Everything about wireless access control makes life easier for those who install and operate it A lot of market data crosses my desk at ASSA ABLOY. Sometimes it can be hard to spot patterns or pick out the trends. But not always. Some recent access control market research we commissioned pointed in one direction. Our conclusion? Slowly but surely, access control is becoming a wireless technology As the global leader in door opening solutions, we are able to survey a large,...

Hospital and healthcare markets offer healthy opportunities to security systems integrators

 Part 1 of our Security in Healthcare series Hospitals have a continuous need for security, to update their systems,and to make repairs The healthcare vertical provides plenty of opportunities for security integrator companies. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says David Alessandrini, Vice President, Pasek Corp., an integrator. Hospitals have a continuous need for security, to update their...

Live finger detection technology reinforces future of advanced biometric authentication

Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...

Wireless technology attracts security installers’ attention for its reliability and cost-effectiveness

Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signalling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programming, de...

Concerns over card security systems raise customer interest in long-range and durable contactless access control readers

Farpointe Data started 2015 in newly relocated offices featuring a larger, more proficient layout that added new manufacturing equipment and increased its production and inventory capabilities. Shortly into the year, Farpointe introduced new WRR-22 and WRR-44 433 MHz receivers that use either 2-button or 4-button transmitters to open two or four different doors from ranges up to 200 feet (61 m). Each button outputs transmitter data over separate Wiegand outputs, yet the receiver installs just...

ID cards as preventative solution for shooters and emergencies in schools, despite budget constraints

Budget becomes a major constraint for any school and organisation while addressing safety of their students and staff. IDSecurityOnline, the leading provider of photo identification services will provide customers its innovative ID card solutions irrespective of their budget. The development of cloud-based services and mobile platforms has offered more options to organisations all around the United States in 2015. In the meantime, scare tactics have been the go-to marketing strategy for many se...

Role of advanced security technologies in enhancing exhibits and visitor experience in museums

With every technological advance that canbenefit museum management comes anotherthat may assist thieves  When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...

Body search and airport security – maximising safety and dignity for travellers

A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by smuggling mock explosives and weapons past checkpoints. With admirable transparency, U.S. Office of Inspector General (OIG) has described how so-called “Red Teams” posed as regular passengers and exposed inadequate measures at some of the busiest airports across the United States. The revelations came a few days before Body Search 2...

GPS and RFID tracking to boost integrator revenue

Wi-Fi, real-time location tracking and security sensors are important elements of IoT solutions The tracking of people, processes and things continues to grow, and that’s good news for systems integrators, who can add these services to their arsenal of offerings and boost their levels of recurring monthly revenue (RMR). Real-time location tracking Global Positioning Systems (GPS) and Radio Frequency Identification (RFID) are great ways to not only add security, but ope...

Battling the $36 billion U.S. problem of retail shrinkage losses

Employees are the front line of defence — as well as the most economical defence — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...

Convergence of IT networks and physical security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

Access control keeps schools safe

Schools are beefing up their security, with access control their go-to technology Schools are back in session after the winter break, but security is a 24/7 matter any time of year. K-12 and upper education are on high alert, dealing with increased incidents of violence, crime and vandalism. Access control is often the chosen technology of this vertical market, pairing well with CCTV, emergency communications and lockdown. Integrators and dealers who understand the nuances of...

Video management software – the core of security solutions

Traditionally, security systems have been designed with the cameras in mind first then with added consideration for the infrastructure and cabling components. But this is old-school analogue thinking. Milestone Systems CEO Lars Thinggaard states that a security system can be designed for more than just protecting assets by starting with specifications for digital video management software (VMS) at the core of the solution. By thinking 'digital', an IP network video system can...