Security management - Expert commentary
Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-growing border security challenges “More than one bil...
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...
Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “e...
FirstNet’s network would provide dedicated support to law enforcement on the scene not only from a local standpoint, but from a Federal standpoint as well Someday in the not-too-distant future, first responders – from police to EMS will have access to a secure broadband network. It will keep them connected with other agencies while ensuring their data is protected even in the midst of natural and manmade disasters. At least that’s the idea behind the...
Some people contend that traffic light cameras are money-makers for localgovernments rather than a deterrent for dangerous driving These days, cameras are everywhere, and getting away with petty offences like running traffic lights has got harder. Citizens have got hot under the collar, and some have even gone to court to get rid of the automatic tickets generated by these robotic traffic enforcers. Traffic light camera intersections not conforming to federal traffic stan...
A more strategic approach to corporate security can better align departmentsin an organisation to achieve better results of shared goals The alignment of corporate security with the business strategy of an organisation is a topic that has been on the agenda of many senior security professionals. A corporate security department’s inability to demonstrate a clear thought process of how they arrived at proposing the strategic direction, or failing to make a compelling busin...
More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...
Many security manufacturers are working towards ISO 14001, an internationally-recognised standard for the environmental management of businesses How green are security industry manufacturers? As innovation (much of it driven from home video and mobile phones) continues, it’s likely that our sector’s carbon footprint will decrease since compact products use up fewer raw materials. Even casual observers will note that integrators are falling over themselves to gain e...
Done right, a good metric programme will help tell the story of the security department Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security professionals are often on their own quest, seeking what sometimes feels like the impossible – the search for perfect security metrics! What are metrics and are they really that hard to find?...
Improved alarm verification standards will help reduce the number of false dispatches of law enforcement officers The verification of alarms continues to progress with more affordable technology as well as an updated industry standard set for release as soon as the end of February 2016. The definition of alarm verification is getting a makeover in the standard, guided by a range of stakeholders including the security industry, law enforcement, associations and other intereste...
A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings created by pop culture Contributing to the problem of understanding is the popular culture. “Popular mo...
Secure payment card technology at the point of sale and a strong authentication are effective defences against data security threats Data security is one of the top concerns to a retailer’s reputation and its customers’ privacy. The fall-out can be catastrophic, and organisations must understand the threat and take all necessary steps to protect their assets and customers. The challenge has become more complex with the explosive growth in mobile device usage throug...
Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...
Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and...
NCS4’s research has mainly been on professional sports venues, but they alsodevelop best practices for all levels of sports – including high schools and colleges Some of the most profound changes in the way sporting events are secured have come about since the terrorist attacks on Sept. 11, 2001. A realisation that stadiums could be a target for terrorists has transformed sports security into a highly sophisticated profession that works closely with local and n...
Key control technology and guard tour systems provide a ready-made solution for healthcare organisations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defence is having a significant impact on...
As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...
Determining how the cloud can best support your business depends on fivefactors: Bandwidth, storage, cost, security and accessibility Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the fact. Today, many are taking advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance t...
With increased demand for high-security door locks in all the vertical markets we serve, the last year has been very good for Securitech. Looking forward, we expect this across-the-board growth to continue, as we continue to listen and respond to customer demands and closely monitor industry trends. In recent years, the security industry has witnessed a growing trend towards development of user-friendly access control solutions that enable customers to have complete control...
An improving economy has resulted in additional spending on new and existing security initiatives in 2015, a solid year for the security industry. In addition, industry consolidation continued with the announcement of a few important mergers and acquisitions, which is further evidence of a vibrant and exciting time for our industry. As we move into 2016, we expect to see increased momentum for megapixel and 4K security products. The benefits of 4K are being realised by end users in outdoor cit...
2015 has been a huge success for key and asset management company Traka. The manufacturer is predicting growth between 20 and 30 percent. It attributes a large part of its success to the extensive work completed in previous years in the U.S. markets, as the foundations set are now coming to fruition. However, Traka has also encountered a real culture shift within the industry. Where previously key management systems and intelligent lockers for asset management were seen as a...
In today’s connected world, our customers are focused on streamlining operations and garnering actionable insights to help drive success across the business. Modern security systems enable security integrators to offer remote access capabilities which in turn helps businesses to improve their performance. For example, security integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, secu...
HID Global is looking forward to a long term investment in a complete range of secure identity solutions. Also, focusing on its global partnership program will be on the agenda. An increasingly global market for identity and access management is undergoing very rapid development due to technological advances, particularly in communications, where digital mobile solutions are experiencing strong demand. The year 2015 was a good one for HID Global, which has a strong global position and is invest...
Siklu further expanded its presence in the video surveillance market in 2015. The company released the world’s smallest outdoor Gbps radio to address the issue of densified coverage, which results in the need for high capacity connectivity in surveillance networks – a trend that has snowballed in past years. Growing video surveillance networks demand greater bandwidth capacity Developments in video analytics and resolutions, requiring high-quality video at the surveillance ne...
SIPcurity is a new breed of security product that is a key element of anyAdvanced Threat Protection (ATP) framework As cyber threats continue, there’s no business or market immune from malicious takeover and data compromise. Now, systems integrators have a new, cloud-based weapon in their arsenal designed specifically as an affordable monthly subscription service to prevent telecommunications attacks and takeovers directed at small to medium businesses (SMBs). Acc...
Farpointe Data started 2015 in newly relocated offices featuring a larger, more proficient layout that added new manufacturing equipment and increased its production and inventory capabilities. Shortly into the year, Farpointe introduced new WRR-22 and WRR-44 433 MHz receivers that use either 2-button or 4-button transmitters to open two or four different doors from ranges up to 200 feet (61 m). Each button outputs transmitter data over separate Wiegand outputs, yet the receiver installs just...
The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organisations face on a daily basis. Intelligent technologies for proactive security management Over the past year, the increased fo...
2015 was a notable year for Quantum Secure, culminating with the company becoming part of HID Global. Growth was seen in several sectors for us, led by the adoption of our SAFE software solutions in the finance and aviation markets, among others. For the industry in general as it relates to Quantum Secure, predictive security became a more prevalent theme as organisations were tasked with not only providing more data but making sense of the data for use in improving security operations. Another...
It is better to create new markets than to struggle to maintain a presence in the bitterly contested existing markets. The security market in 2015 has been faced with many ups and downs, and in such a scenario innovating new products gave companies the necessary boost to take on competitors and capture new markets. That’s the viewpoint of Dallmeier as an eventful year draws to a close; a year in which we won and completed many new projects all over the world. Despite, or perhaps because o...
Capital spending continues to open up in 2015, providing funding for security projects that may have been delayed from prior years. Overall, it was a solid year for the security industry. From a SightLogix perspective, we have seen an increased rate of repeat business as existing customers expand the number of assets they need to secure. Smart thermal cameras provide ideal outdoor intrusion detection 2015 saw an accelerated adoption of thermal cameras with video analytics...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download