Security devices - Expert commentary
Airport security has tightened ever since the September 9/11 catastrophic event. Post-incident investigation of such events often brings to light a particular weakness in security. As a result, security and safety protocols are developed in reaction to such traumatic events. Similar to the security measures adopted by airlines, school safety systems have also undergone major changes with a variety of electronic and mechanical access control products that prevent assailants fr...
Small-timers with big ideas can always make their way into the industry In recent years, home automation technology has given birth to the “Smart Home” in which internet-enabled and controlled devices are bringing a new level of comfort to the standard house. From locking doors to setting the temperature to opening the blinds for a view of the sunset, technology is transforming the home into something reminiscent of the now-quaint 1960s sci-fi cartoon, The Jetsons....
Once home automation – controlling everything from HVAC to door locks to lights to security cameras – was solely the providence of the high-end home. Custom systems were pricey – some ranging upwards of $100,000 or more. That was before widespread access to broadband internet and before everyone started carrying a powerful internet-connected mini-computer – called a smart phone – in their pocket. Home Automation goes mainstream These days the Smart Home has gone...
According to Paul Wong, MD, Bosch Security Systems, intelligence and increased image quality are helping to drive the security market Paul Wong, Managing Director of Bosch Security Systems, has an optimistic view of current security trends. According to him, the security market is generally in good shape, with improvements in video image quality and integration driving growth and shaping the market. As global companies are looking to standardise internationally, intelligence,...
Intimate body search at airports also takes a psychological toll on the person conducting the search SourceSecurity.com's European Correspondent, Jeremy Malies gives an account of the Body Search 2015 security conference that was held at Hounslow, London. Along with emphasis on aviation security, the conference also covered an array of safety and commercial applications. Some of the topics outlined in this article include: New techniques in body scanning, the exasperation publ...
Private security professionals and law enforcement personnel are leveraging social media as a physical security tool to identify security threats and prevent crime. “Knowledge is power, and we’re all learning to cyber-sleuth to keep up with the bad guys,” says Wendy Patrick, JD, PhD, Deputy District Attorney, special operations division, San Diego District Attorney’s office and president of the Association of Threat Assessment Professionals San Diego...
David Bleisch, ADT general counsel, addresses the media at a conference Door-to-door selling can be an effective tool to garner new security subscribers, and it’s been practiced for decades, according to Jay Hauhn, executive director of the Central Station Alarm Association (CSAA), Alexandria, Va. But it has to be done right, he says. A recent conference by ADT Security Services focused on deceptive alarm sales practices and the need to report such practices. In her late...
As the home automation industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. Next-generation protocols: Bluetooth and Wi-Fi “Right now companies are releasing really i...
A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by smuggling mock explosives and weapons past checkpoints. With admirable transparency, U.S. Office of Inspector General (OIG) has described how so-called “Red Teams” posed as regular passengers and exposed inadequate measures at some of the busiest airports across the United States. The revelations came a few days before Body Search 2...
Affiliated Monitoring’s UL-Listed monitoring centre with a second floor dedicated to areas for security company meetings Central monitoring stations have innovative approaches to assist security installing companies in growing their account base, adding value and boosting recurring monthly revenue (RMR). These companies do much more than simply monitor accounts – today they provide a host of services to give security installing companies the added edge in an extrem...
Security-Net has grown significantly in stature as a global national accounts organisation Back in the day, security companies kept their business close to the vest, didn’t collaborate and worked locally, without expanding beyond limited geographic boundaries. Security-Net™, Exton, Pa., came about in an effort to find a better way. So some 22 years ago, in 1993, the organisation began a journey – one that would eventually establish it as a highly respected n...
Today, the once crime-ridden area of Los Angeles is a flourishing shopping and tourist mecca Los Angeles struggled with a rising crime rate. Constant crime plagued the historic area with its well-known tourist attractions, which include TCL Chinese Theatre and the Walk of Fame. Criminal activity ranged from major to minor, from felonies to prostitution, public drunkenness, trespassing, vandalism, theft and on and on. Time and budget constraints had forced local police officer...
New notification appliances from Silent Knight provide code-required low-frequency output Just before the National Fire Protection Association’s (NFPA) World Safety Conference and Expo, June 22-25 in Chicago, Honeywell unveiled new solutions and features designed to boost life safety and provide more intuitive installations. S3 series control/communicator A “virtual press conference” unveiling the announcements was kicked off by Beth Welch, manager of publi...
Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...
Today, a number of school districts are saying no to these kinds of realistic active shooter drills In the wake of the shootings at Columbine High School in 1999 — 16 years ago — and the school shootings that have followed, we have struggled to figure out how to keep students and teachers safe during such an attack. Protective measures An approach to the problem that has grown controversial is armed assailant or active shooter drills. Six states including Arkansa...
Just how big is the home automation industry? One way to tell is by looking at the sheer number of companies – large and small—that have rushed to enter this fast-growing space. They include some of the world’s largest corporations – Apple and Google – along with the nation’s biggest cable and telecom companies – Comcast and AT&T. It includes big names in security like Honeywell and ADT. Then there are less known, but fast growing, contenders such as...
Stowaway incidents in the last two months in the United Kingdom have dramatised the desperate nature of individual attempts to cross borders. They have also exposed the callous methods of human traffickers. Sixty-eight foreign nationals were discovered in four lorries at the port of Harwich on the south coast of England in June after the vehicles had disembarked from a Stena Line ferry entering English waters from Holland. None of the group, which included 15 children and tw...
In the vast centre of the hall almost none of the randomly shaped stands display their index number I enjoy IFSEC each year, spending three days walking the halls. I do feel frustrated by the acres of "me too" products prompting a "meh" response. So often I’m left feeling the "big news" is that hype and lies are growing and continue to drown out the truth. If companies' marketing budgets were simply given over to their product development departments, we would find thing...
A retail banking tipping point is fast approaching with the state-side adoption of EMV technology Banking faces a challenge: to reconcile major security concerns with improving technology in order to reflect modern, mobile technology and the self-service solutions that customers have come to expect from their non-banking retail experiences. This is probably the number one issue I discuss with my bank clients. Banks need to make the technology in their branches more automated,...
The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data ne...
A demonstration of the home automation capabilities of Z-Wave wireless transmission – controlling a coffee maker from the Mt. Everest base camp – came off without a hitch at ISC West. A few days later, however, the veteran climber involved in the stunt got a first-hand look at the deadly 7.8 earthquake in Katmandu and the resulting avalanche. The adventurer, Mariusz Malkowski, began his love of climbing in his native Poland while in early high school. “I would go on an 8-hour...
“Better, Faster, Cheaper – choose any two” is the old adage for computerised systems. When it comes to businesses subjected to federal or industry security regulations, the equivalent saying might be, “mitigate risk, achieve compliance, or reduce cost – choose any two.” So if there were a way to have all three that would get your attention. Complying with regulations More and more industries are subjected to some form of regulation....
SWOT evaluates a company’s Strengths, Weaknesses, Opportunities and Threats (SWOT) in connection with a project Expanding into other countries with sales offices, manufacturing facilities and distribution centres can present a number of security risks. SWOT analysis for security strategy Physical security technology can help to mitigate some of these risks. “The physical security technology used in international locations is similar to what we use here, but t...
Petrow began her career at Vector Security in 1982, and was appointed senior vice president of the Central Stations and Information Services Group in 1997 Pamela J. Petrow, chief executive officer (CEO) of Vector Security Inc., Warrendale, Pa., has been appointed President of CSAA International, the industry’s leading, 65-year-old central station monitoring organisation. Petrow is the first woman in the organisation’s history to hold this top leadership...
Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa county security project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognised for its zero tolerance toward crime and unwavering focus on innovation in law enforce...
To guide people under stress facing emergency situations, SchoolDude developed the CrisisManager smartphone app Last year, SchoolDude asked administrators at several hundred primary/seconday schools and colleges how they communicated their emergency and crisis management plans to administrators and faculty. Seventy-nine percent said they sent their emergency plans out in paper binders. Cary, N.C.-based SchoolDude, an education enterprise asset manager, conducted the study to...
The physical security community is contributing expertise and equipment of many kinds to the country As rescue teams and aid workers from around the world converge on Nepal after the country's 7.8-magnitude earthquake, the physical security community is contributing expertise and equipment of many kinds to a country whose government has described it as being “on a war footing.” At time of writing, conservative estimates of the fatalities are around 5,000, but many,...
Audio systems can enhance liability protection. Recently, a large regional convenience store chain with units across the Midwest and South supplemented its video surveillance security system with an audio monitoring system. Retail stores with Louroe audio system: The technology has been installed in more than 700 of the convenience retailer’s locations. The Louroe Electronics systems feature omni-directional capability and sensitivity and pick up sound within a 15-foot...
Layering as applied to computers is a made up term having no relationship to any particular standards When it comes to setting the criteria for network switching, we often hear “I only want a layer 3 switch.” We naturally assume that since the number 3 is bigger than the number 2, a layer 3 switch must be better than a layer 2 switch. It may surprise you, but when it comes to video security applications, this may not be the case. In fact, just the opposite may...
SWIFT is a wireless fire detector line offered by Honeywell Fire Systems Honeywell Fire Systems, Northford, Conn., continues to enhance its line of wireless fire detectors, announcing new updates to its Fire-Lite® Alarms Smart Wireless Integrated Fire Technology (SWIFT™) at ISC West 2015 in Las Vegas. The SWIFT line of wireless fire alarm detectors and modules – which includes smoke, heat and pull stations – integrate with new and existing Fire-Lite...
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download