Security service - Expert commentary
Cloud computing has many benefits, including greater flexibility, infrastructure cost savings, and enhanced computing performance. However, the cloud presents new security challenges that organisations need to address. A failure to implement security controls and adhere to solid data governance practices could result in a breach. Preventing worst case scenarios Consider this scenario, a company begins their migration by getting excited about the possibilities the cloud can provide to their app...
A childhood friend of mine has made a nice career in coaching college football. As with most coaching careers, he’s had to make several moves over the years. He was the Linebackers Coach at a national powerhouse FBS school for a few years before getting promoted to Special Teams Coordinator. From there, he moved into a Defensive Coordinator at another FBS school. Not a national powerhouse, but he was the D.C. – a huge promotion. Although I’ve kept up with his progress, and have...
Workplace violence (WPV) cannot be 100% prevented. However, we know from experience that well-placed preparedness and prevention measures can significantly diminish the probability and severity of potential workplace violence. A prime example comes as an outgrowth of the multiple “going Postal” shootings at the U.S. Postal Service (USPS) by employees or ex-employees (mostly in the 1990s). Out of necessity, USPS implemented a comprehensive workplace violence programme throughout thei...
How do you provide unparalleled, personalised customer service and support in a high-tech, self-service world? This blue ribbon is achievable by fusing the human component of superb customer care with user-friendly, cutting-edge solutions that are available around the clock. Technology has made it possible for customers to get assistance at their convenience, with no need to be concerned with business hours or time zone differences. Automated operators and sophisticated websites c...
Successful critical thinkers are judged by results that almost always involve deliberation and intuition, logic and creativity Security and safety practitioners responding to evolving threats make decisions every day based on uncertainty, insufficient information, and too few resources for textbook solutions. Unsurprisingly, Chief Security Officers report that critical thinking, decision making, and communications skills are key characteristics for job success. But do we reall...
Three key trends will continue dominating the security industry looking ahead to 2017 – cloud video, predictive maintenance and emergency preparedness. Cloud video The continued integration of cloud and hosted video into security programmes offers a lot of benefits for customers. The convenience of remotely viewing video footage in real-time or historic footage has been a great benefit to our customers and provides significant business intelligence. It helps with ever...
Access levels of individuals based on their roles can be cross compared with their normal access patterns, it is also useful to look for anomalies in device behaviour Threats to an organisation’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To combat this problem, security and IT professionals are fighting back with system upgrades and software solutions including advanced analytics. Using the analytics...
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...
The right security system can add great value when used as anintegral part of business processes When buying a security system, primary consideration is often given to short-term issues such as technical capability and how current risks are covered. However, this approach doesn’t account for a security system being a longer-term investment, often spanning around ten years. During this time a lot can change, both in terms of technical development and an organisation&rsquo...
By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analogue to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways...
ISE’s research shows that healthcare facilities & hospitals security programmesto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security programme can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see...
Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organisation’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do t...
ISC West has seen manufacturers' efforts to simplify the installation, serviceand deployment of security solutions for systems integrators Efficiencies come in all shapes and forms for systems integrators in the security industry, and ISC West 2016 was a testament to manufacturers' efforts to simplify installation, service, maintenance and deployment of IP video specifications for installers. GURU smartphone app with audit reporting capabilities March Networks, Ottawa, Canad...
Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labour costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...
The established security distribution channel is being disrupted by a new trend towardsspecialist distributors – who offer more a more focused range of products andsupport services In the last 10 years a lot has changed within UK security distribution, but on the surface everything would appear to be the same. The top two distributors remain the same, despite creditors at one and talk of a looming sale at another. However, they’re operating with a slightly reduced...
Poor quality training, poor literacy and numeracy skills and inadequatesupervision were some of the areas for concern highlighted by ASQA A lack of consistency in licensing, poor training and variable standards of teaching safe restraint techniques among Australian security officers are putting members of the public at risk, according to a report by the national training regulator in Australia. The report reflects officer training and licensing challenges that are common w...
Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organisation from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernisation Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Secur...
Some people contend that traffic light cameras are money-makers for localgovernments rather than a deterrent for dangerous driving These days, cameras are everywhere, and getting away with petty offences like running traffic lights has got harder. Citizens have got hot under the collar, and some have even gone to court to get rid of the automatic tickets generated by these robotic traffic enforcers. Traffic light camera intersections not conforming to federal traffic stan...
A more strategic approach to corporate security can better align departmentsin an organisation to achieve better results of shared goals The alignment of corporate security with the business strategy of an organisation is a topic that has been on the agenda of many senior security professionals. A corporate security department’s inability to demonstrate a clear thought process of how they arrived at proposing the strategic direction, or failing to make a compelling busin...
Done right, a good metric programme will help tell the story of the security department Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security professionals are often on their own quest, seeking what sometimes feels like the impossible – the search for perfect security metrics! What are metrics and are they really that hard to find?...
NCS4’s research has mainly been on professional sports venues, but they alsodevelop best practices for all levels of sports – including high schools and colleges Some of the most profound changes in the way sporting events are secured have come about since the terrorist attacks on Sept. 11, 2001. A realisation that stadiums could be a target for terrorists has transformed sports security into a highly sophisticated profession that works closely with local and n...
As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...
In today’s connected world, our customers are focused on streamlining operations and garnering actionable insights to help drive success across the business. Modern security systems enable security integrators to offer remote access capabilities which in turn helps businesses to improve their performance. For example, security integrators continue to bring new value to customers through new capabilities enabled by the Internet of Things. By utilising connected technology and sensors, secu...
SIPcurity is a new breed of security product that is a key element of anyAdvanced Threat Protection (ATP) framework As cyber threats continue, there’s no business or market immune from malicious takeover and data compromise. Now, systems integrators have a new, cloud-based weapon in their arsenal designed specifically as an affordable monthly subscription service to prevent telecommunications attacks and takeovers directed at small to medium businesses (SMBs). Acc...
The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organisations face on a daily basis. Intelligent technologies for proactive security management Over the past year, the increased fo...
The security environment is unsettling and continues to require focus and continuing vigilance to increase security measures. Sensors in active technology systems play an important role in situational awareness, which helps in identifying and responding to emergency situations. As of October 2015, there were 45 school shootings in the United States. There continues to be grave concern about potential “lone wolf”-type events for individuals and businesses. Situati...
From my vantage point, it would appear that the acquisition of goods and services related to security controls and measures remains healthy at the end of 2015. Although the time associated with evaluations and overall procurement processes, I am told, has become a bit lengthier. Mergers and acquisitions of both security industry providers and the merger of national and international companies are the biggest unexpected things to have an impact this year. Forbes reported that...
The ESA Summit is offering registration for “Rising Leaders” to gain valuableleadership skills and business tactics Leadership Summit presented by the Electronic Security Association (ESA), Irving, Texas, has penned the slogan: “Link. Learn. Lead.” for its 2016 event. Scheduled for January 31 through February 3 at the Wild Horse Pass Hotel & Casino in Chandler, Arizona, the ESA Leadership Summit is a testament to a quickly changing security landscap...
The proportion of failed ATM attacks is more than 50%, but the collateraldamage is high and growing ATM security providers and products can take various countermeasures to mitigate attacks on ATMs. The key is to detect an attack in its preparation phase. Speaking at ATM Security 2015 in London, Claudio Ferioli, head of physical security at Italian bank Intesa Sanpaolo, provided an overview of the current state of physical attacks on ATMs in Italy. As the largest bank in the...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download