Security management - Expert commentary
Porter will tell IFSEC attendees about an upcoming National Surveillance Camera Strategy The Surveillance Camera Commissioner for England and Wales, Tony Porter, will be speaking at IFSEC International 2016 on how compliance with the U.K. Surveillance Camera Code of Practice can ensure that CCTV systems are operated proportionately, transparently and effectively. Porter has certainly been busy in the two years since his appointment by the Home Secretary. He has the difficult...
Hikvision website’s “Security Center” provides cybersecurity informationand tools for integrators and end users The time is now to address the impact of cybersecurity threats on the IP video market. In the case of video surveillance systems, the main motives of cyber-attackers are usually to either cover up video evidence of crimes or to gain access to video that should be private. “The use of video surveillance is growing across North America, not j...
There are resources to help guide an organisation’s management of cybersecurity risks, most prominently from the National Institute of Standards and Technology (NIST) and the U.S. Department of Homeland Security. NIST defines cybersecurity as "the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorised use or modification, or exploitation.&rdquo...
Systems may be reliable and performing as originally intended, but can also beoutdated in comparison to current technology offerings Let’s start by defining what a legacy system is in the context of a security control system. Legacy refers to an installed and operating security control system made up of numerous components, both hardware and software, that have been eclipsed by newer technologies. A shortage of parts and pieces may be creeping in, and it’s also li...
PSIM systems extend their value beyond emergencies by including routinemanagement tools, that provide value during daily operations, such as automatingmaintenance activities Physical Security Information Management (PSIM), an acronym termed to describe a family of software platforms that claim to replace traditional command and control (C&C) systems, primarily used to provide situation awareness in control and monitoring centres of Critical Facilities. Traditional C...
Joining Pelco in late 2015, Sharad Shekhar is responsible for the entire global video business and is leading the charge to reinvigorate the Pelco brand with system integrators Back in the day, you literally couldn’t speak with a security company about a video surveillance project without the Pelco name coming up. It had a loyal following and an extremely large installation base. Over the years, that changed and the fervour with which integrators referred to the brand se...
From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilisation The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...
The right security system can add great value when used as anintegral part of business processes When buying a security system, primary consideration is often given to short-term issues such as technical capability and how current risks are covered. However, this approach doesn’t account for a security system being a longer-term investment, often spanning around ten years. During this time a lot can change, both in terms of technical development and an organisation&rsquo...
Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analogue cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as p...
Many operators don’t know what’s actually transpiring on their OT networkand,even if hacked, have no knowledge of the assault Innovation in the oil and gas, utility, healthcare and transportation industries is heavily reliant on connectivity - between devices and systems, machines and data, people and processes. This connectivity is great for productivity upstream, mid-stream and downstream, but is also exposes these systems to greater cyber threat. Furthermore, as...
By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analogue to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways...
As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...
PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...
Stringent security policies are necessary in an organisation to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...
ISE’s research shows that healthcare facilities & hospitals security programmesto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security programme can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see...
Accurately confirming a person’s identity is one key to improving security forour workplaces, communities, and our nation Perhaps I’m sensitised to the term, but it seems to me that I’m hearing the word “identity” a lot lately. Identity comes up in current news stories about Syrian refugees, for example. Candidates for the U.S. presidency debate how long it should take to confirm the identity of immigrants before allowing them to ent...
ISC West has seen manufacturers' efforts to simplify the installation, serviceand deployment of security solutions for systems integrators Efficiencies come in all shapes and forms for systems integrators in the security industry, and ISC West 2016 was a testament to manufacturers' efforts to simplify installation, service, maintenance and deployment of IP video specifications for installers. GURU smartphone app with audit reporting capabilities March Networks, Ottawa, Canad...
IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends in access control technology SourceSec...
Access control now includes a strong focus on the data integration side ofthe business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...
UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...
Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labour costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...
The video storage boom shows no signs of slowing down. The talk is not typically how much storage; but where and how to store. Locally-housed (on-premises) storage continues to be the most cost-effective, along with providing the most control over your data. However, prior to considering the storage, it is important to look at the robustness of the network, as it is a key factor in making the right decision for storage architecture. It is necessary to know if there is enough...
Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...
Barriers certified by the US Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over...
According to Merit LILIN, the UAE will be a thriving new and potential market in 2016since Europe’s economy is still sluggish The global Chinese community recently welcomed the year of the Fire Monkey with a two-week celebration, concluding with the lantern festival at the end of February. According to Chinese astrology, we are now in the year of the Fire Monkey. What’s in store for businesses around the world? Global economic growth is predicted for the ye...
The established security distribution channel is being disrupted by a new trend towardsspecialist distributors – who offer more a more focused range of products andsupport services In the last 10 years a lot has changed within UK security distribution, but on the surface everything would appear to be the same. The top two distributors remain the same, despite creditors at one and talk of a looming sale at another. However, they’re operating with a slightly reduced...
Thermal cameras with video analytics detect with great accuracy in bright sun,fog, rain and other conditions Smart thermal cameras are rapidly becoming the intruder detection solution of choice for securing outdoor assets. Whether for smaller-range applications like protecting entranceways or gates, or securing large perimeters around energy, utility, chemical, or transportation assets, thermal cameras paired with video analytics offer an accurate detection solution that provi...
Poor quality training, poor literacy and numeracy skills and inadequatesupervision were some of the areas for concern highlighted by ASQA A lack of consistency in licensing, poor training and variable standards of teaching safe restraint techniques among Australian security officers are putting members of the public at risk, according to a report by the national training regulator in Australia. The report reflects officer training and licensing challenges that are common w...
The PASS guidelines don’t just point to specific technologies; they address security issues and help guide school administrators to make their schools safer and more secure From K-12 to college campuses, schools need integrated solutions and proactive measures to lessen the potential of active shooters while targeting general loss prevention and security. The good news is that technology is available to address nearly every threat and challenge, and systems integrato...
Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organisation from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download