Security management - Expert commentary
DWC added equipment warranty plans for security, surveillance, fire systems, parking control & security gates While the systems integration industry continues to chirp about moving to services and recurring monthly revenue (RMR), Sound Incorporated, Naperville, Ill., has been successfully working this angle for more than two decades. The privately held firm has been in business more than 50 years, starting in the school intercom and sound side of the business, and migr...
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...
With the industry’s largest security trade show just weeks away, we spoke with leading systems integrator Securadyne Systems, Austin, Texas, for their assessment of ISC West and how they use the show to benefit their organisation. Terry King, vice president and regional general manager, shares his thoughts on what Securadyne Systems plans to accomplish at this year’s event. SourceSecurity.com: What is your take on ISC West and what do you get out of it? Terry King: ISC West has al...
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer multi-site transportation facilities increased security and control to help prevent authorised key access as well as reducing the number of lost or misplaced keys. As an example, road repair is often done at night and requires equipment, vehicles, lights, gene...
It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools. However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...
The security industry continues to move away from closed, proprietary systems and instead is fine-focused on open solutions that assist the move to total integration. The benefits of achieving this feat belong to both installing company and end user. Benefits of open security solutions Open, interoperable systems make it easier to integrate a wide array of sensors, devices and communication technologies across the enterprise. That means quicker installations, lower labour costs and heightened...
Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...
Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role in frontline positions, but also their exposure to a diverse array of security challenges make them increasingly valuable in formulating security management strategies. At the same time, such companies also offer the veterans an alternative and re...
Many security company employees say they first learned about opportunities in the field through other employees The nation’s security companies are increasingly turning to U.S. military veterans to fill the ranks of both uniformed guards and management personnel. Getting the best former soldiers, airmen and sailors into the civilian workforce requires recruiting, and some of the best recruiters are other veterans. A wide variety of current security company employees say...
Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security, reports responding to 198 cyber incidents in fiscal year 2012 across all critical infrastructure sectors. Forty-one percent of these incidents involved the energy sector, particularly electricity, according to a February 2014 report. Considering the enormity of the...
The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall outlet and that’s all that happens. PoE power is a far more complex. There is interaction between the source providing power and the device receiving power. This interaction is governed under the 802.3 AF and AT standards. These differences...
Organisational resilience takes all appropriate actions to help ensure the organisation’s continued viability In this day and age, the traditional components of security officers, cameras, access control and alarm systems aren’t enough to protect a company or organisation. No matter how good your preparations, security sometimes breaks down, and bad things happen. That can take a toll on a business. Today, security’s role extends to organisational resilience...
Whether you are a contractor, installer, dealer or systems integrator depends on where you live and how you are perceived by the real world Because I have been in the industry for a considerable amount of time, I have seen quite a few changes, albeit the bulk have come over the last five or so years. Before that, the advent of the digital dialer was our big innovation – that tells anyone with any history in the industry just how far back I go! But today, change is fast a...
While the number of incidents is falling, hundreds of thousands of workplace violence incidents still occur every year More than 572,000 people met with a violent crime at work during 2009. In addition, workplace violence caused 521 homicides in 2009. The Bureau for Justice Statistics (BJS) reported these numbers (the most recently updated) in a study of workplace violence between 1993 and 2009. That is a lot of violence. Surprisingly, though, those numbers show a significant...
The focus of Fusion Centre is all about video - surveillance, analytics, verification, license plate recognition, VMS, wearable cameras and more Growing demand for surveillance that offers better quality video continues to fuel growth in the IP camera market. According to Transparency Market Research, the video surveillance market will realise a compound annual growth rate (CAGR) of 19 percent by 2019, surpassing $42 billion in sales. High-definition video and network-connect...
Installers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-security can always be improved in the cloud. The continued trend to SaaS (Software as a Serv...
Check out the research available from the ASIS Foundation. It is proving to be right on the button.When the Guardians of Peace hacked Sony Pictures Entertainment late in 2014, they crashed the studio’s email, leaked films and scattered personnel data across the Internet. By mid-December, four class-action lawsuits had hit Sony, claiming that the company had not taken adequate cyber-security precautions. How about your company? Are you prepared to withstand a cyber-att...
The stigma of the cannabis industry still hangs in the balance Final installment of 4-part series: The legalisation of recreational marijuana use in Colorado and Washington, along with it medical use in about 23 other states, has created an industry made up mostly of small mom-and-pop operators. “While the revenues in this industry are big, the number of people involved is pretty small,” said one security industry insider. That’s about to change as Wall Stre...
The systems integration industry is abuzz. Access control is super-hot, and the product category continues to grow. IP video surveillance specifications are moving along at break-neck speed. New technology categories in the security market – energy management, home automation and interactive services – are helping savvy dealers and systems integrators grow their businesses. But do these companies really know how to take full advantage of all the possibilities for...
Third instalment of 4-part series: One question that comes up when talking about security for the cannabis industry is “why aren’t there more companies getting into the business?” While a number of small operators and larger companies have begun offering their services to marijuana retailers, some very big players have largely passed on the opportunity. According to a report by CNNMoney, security giant ADT won't "sell security services to businesses engaged...
Unscrupulous companies reversing positive steps made by security industry to remove stigma of being known as "trunk slammers" ABC news report reaffirms need for industry action For the businesses that make up the electronic security industry, it’s an issue that undermines all the progress we have made to date. It’s deceptive door-to-door sales tactics, and it’s still having an impact on the alarm industry. It affects the entire industry – from lar...
Right after the Paris terrorist attacks, a headline I read throughout the media asked: “Did intelligence services drop the ball?” The question has a familiar ring, and you’ll find variations on it throughout the last and present centuries concerning events that range from presidential assassinations to 9/11, 7/7 in London and the 2008 Mumbai bombings. But physical security, rather than information gathering, is our scope here. From the moment I saw thermal imagin...
Are network switches really designed for IP video security? The simple answer is no. As video security migrated to IP, a major concern for video security personal was the future of their positions in regard to system specification and control. After all, networks are networks, and they are under the control of IT directors. However, as transition occurred and the demands of IP video security grew, it became apparent that database networks don’t directly translate into IP vid...
Marshall Marinace is on a mission - to continue to infuse value into ESA If you haven’t met Marshall Marinace, you probably will soon. He’s the new President of the Electronic Security Association (ESA), and he’s instantly likeable. He’s a homespun security dealer with decades of service who knows that the new world of systems integration requires change and involvement of every member at the association level. Marinace was sworn in as the 41st Preside...
Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organisations participated in our...
The increased viability of surveillance video as data will be an opportunity for growth and development Pivot3 2014/2015 Review and Forecast: It was a solid year for the industry – not great, but not bad. The state of the economy and less U.S. government grant money for surveillance in the last year held the security industry back overall. There were two interesting trends as it relates to server/storage infrastructure for video surveillance. First, the pr...
Companies embracing new cloud-based technologies will be among the winners, those with legacy business models will struggle Vision Security Technologies 2014/2015 Review & ForecastThe year 2014 was somewhat flat due to a still recovering economy and building industry in our Southern region of the United States. We saw a greater expectation for higher quality video surveillance throughout the mid-market sector. Vision Security Technologies also saw an increase in campus...
Over the next year end users will push to get more value out of their investments Frontier 2014/2015 Review and Forecast: One of the big trends we see playing out over the next year is a push to get more value out of the investments that end users make in their solutions. Certainly the solutions must meet the core needs of customers, but more focus is being applied towards how those solutions can improve processes, increase efficiency and provide better visibility of th...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download