Security management - Security beat

Vicon providing openness against “total solutions” manufacturers

We’re seeing a market trend toward manufacturers seeking to provide “total solutions” rather than components. The trend is reflected clearly in recent industry consolidation, for example. When companies that manufacture various components become part of a single corporate owner, it’s not a stretch to expect the new owners to combine those components into a single end-to-end solution – sooner or later. Manufacturers are also leveraging OEM agreements and other partne...

ISCON Imaging’s IR technology addresses shrinkage at distribution centres

Most of us think of shrinkage in the context of the retail environment, where a host of video cameras, tamper-proof packaging, sensors and other technologies help control theft by customers and employees. However, the term shrinkage also applies to goods before they get to a retail store. Goods can be stolen at any stage of their manufacture and distribution, usually by employees, and there are fewer technology solutions geared toward theft along the supply chain. In fact, some distribution cen...

Buying security services: one size does not fit all

Buying security services can be a tricky business, and success requires a strategic approach involving multiple stakeholders and careful evaluation of proposals, including a scoring system that targets the most important criteria. “Buying security services is a special beast,” says George Councils, AlliedBarton’s vice president of strategic sourcing and acquisition integration. “Evaluation requires special considerations.” I listened in on a recent AlliedBarton web...

New capabilities to monitor real time security system operations

When you need to view video of an incident or information about an access point, you expect your security system will provide that information. But what happens if a camera or card reader isn’t working for some reason? It’s the security director’s worst nightmare. Sadly, the moment when a system fails is often the first indication an end user has that there is a problem. A useful trend I saw at ISC West this year is growth in various types of diagnostic, monitoring and control...

3xLOGIC acquires infinias product line to create disruptive cloud solution

3xLOGIC has a vision to provide a fully integrated video, access control and cloud-based managed solution. The acquisition this week of the infinias access control product line provides the missing piece of that vision, says Matthew Kushner, CEO of 3xLOGIC. “This acquisition is a pure strategic play to create a disruptive solution for cloud-based managed services,” says Kushner. The acquisition includes the infinias brand, its intellectual property and the infinias team, including e...

AMAG Symposium 2015: Emphasis on partnership

The spirit of collaboration was alive and well at AMAG Technology’s Security Engineering Symposium 2015 in Carlsbad, Calif. Targeting consultants, architects and engineers (A&E), and integrators, the weekend conference was built around AMAG’s Symmetry access control products, especially their role in a unified system that incorporates a variety of other technologies, too. Also participating in the event (and emphasising the value of long-term partnering) were several other techn...

Sandy Hook lawsuit alleges breakdown in security

A lawsuit filed by the parents of children killed in the Sandy Hook school shooting in 2012 highlights how the best-thought-out security plans can fall apart because of details and/or last-minute changes. Before the tragedy unfolded, Sandy Hook Elementary had established protocols in place to cope in the event of an active shooter incident. However, some of the protocols broke down on the day of the shooting, and it’s possible that additional young lives were lost as a result. A lawsuit f...

Paris terrorism attacks reflect a problem larger than us

The recent terrorist acts in Paris defy any understanding or explanation. The events represent a level of mayhem that defies easy answers, emblematic of a global security threat that demands a unified, worldwide response way beyond what is achievable by any combination of technology gadgets. Simply put, the problem is not our industry’s to solve. It’s bigger than we are. Still, such events haunt the people in our market – dedicated as we are to protecting people, facilities and...

Video walls provide the big picture for collaborative security

Video walls are growing in popularity in security applications, providing everyone in a control room access to the same current information at the same time. They are a perfect way to display the “big picture” – literally. Video walls are often used in situations where several people are working together to create a coordinated effort, whether related to security, emergency response, process control or other discipline. In the security sector, video walls are commonly used in...

The next group of challenges for “Plug-and-Play” access control

In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and...

The Threat of Commoditisation – and new opportunities

Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental imp...

Sometimes security equipment is the solution (but sometimes it isn’t)

Abraham Maslow's "law of the instrument" says: If the tool you have is a hammer, then everything looks like a nail. To avoid the pitfall Maslow describes, let’s remember that the nature of a threat profile should decide the choice of security equipment, not the availability of that equipment. When we hear about a school shooting, for example, some of us immediately think “they should have had a camera system?” The ones thinking that probably sell camera systems. Although we...

ONVIF, SIA collaborating on new access control standards

The next generation of access control standards will be developed by the recently announced collaboration between the Open Network Video Interface Forum (ONVIF) and the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C. Both organisations have staked a claim in the area of access control standards, and now they’re seeing their interests converge. SIA’s Open Supervised Device Protocol (OSDP) standard addresse...

IFSEC Day Three: Assessing the benefits of a productive show

The third day of a trade show is when you start feeling like Bill Murray in that movie "Ground Hog Day." It's like you're living the same day over and over -- the same waiter at breakfast, the same (or at least interchangeable) crowds on the London Underground, the same frowning man waiting to scan your badge, the same frantic search to find your badge among multiple pockets (coinciding with the same brief moment of panic). Another day, another group of suppliers to visit, and some of the theme...

Announcements and food for thought at the first day of IFSEC

It took a crowded ride during rush hour on the London “Tube” to get me there, including multiple transfers, but the first day of IFSEC at its new venue, the ExCel in London, yielded a couple of newsy announcements and busy traffic at many of the stands. The industry is still reeling from bombshell news last week of the acquisition of Milestone by Canon. The ink may be barely dry, but the agreement was celebrated at IFSEC with a press event and big photo opportunity involving Rokus v...

What’s unmanageable and what’s unavoidable

“Our mission should be to avoid the unmanageable and manage the unavoidable.” I heard that sentence in a completely different context recently, but it seems to summarise well the mission of the security market. If a security professional can avoid the unmanageable, (by logic) he or she can manage whatever else happens (the rest). Avoiding the unmanageable involves using whatever deterrents or preventive measures (including various technologies) to keep things from happening that ca...

The Impact of Big Data on the Physical Security Market

From being a buzzword today, Big Data is poised to have a large impact on the physical security market with numerous practical applications in preventing and fighting crime. I’ve been hearing a lot about "Big Data" and its impact on the physical security market. Wikipedia tells us that Big Data involves using larger and larger sets of data points to find correlations that can “spot business trends, determine quality of research, prevent diseases, link legal citations, combat crime,...