SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Security and surveillance technologies for the casino market

Security and surveillance technologies for the casino market

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Video surveillance - Expert commentary

Video surveillance trends driving increasing storage needs
Video surveillance trends driving increasing storage needs

End users in the video surveillance market are looking for higher quality images and to retain those images for longer periods. Also, small- and medium-sized enterprises (SMEs) are turning to networked video surveillance in larger numbers. And video is now finding many uses outside the security market, including business intelligence and customer service applications, among others. These familiar trends are directly impacting the choice of video storage solutions being used i...

Battling the $36 billion U.S. problem of retail shrinkage losses
Battling the $36 billion U.S. problem of retail shrinkage losses

Employees are the front line of defence — as well as the most economical defence — against shrinkage losses The financial cost of retail shrinkage is huge. The latest Annual Shrink Report issued by Dr. Richard Hollinger and Dr. Read Hayes at the University of Florida puts the total at $36 billion annually. Shrinkage has several causes: customers shoplifting , employee theft, supplier fraud and administrative errors. Frequent inventories and accounting audits coun...

Education-centric PSA-TEC 2015 show to focus on integrators and installers
Education-centric PSA-TEC 2015 show to focus on integrators and installers

It’s that time of year: show season! And for systems integrators and security installers, PSA-TEC is one of the quintessential annual conferences, offering hundreds of hours of education and training during the May 4-8 show (exhibits are May 6). Hotel registration at the Westin in Westminster, Colo., is due on or before April 16. PSA Security Network was established in 1974 as the Professional Security Alliance, Inc. dba PSA Security Network and is now the world’s largest electronic...

Deploying a high-performance computing environment to minimise processing costs
Deploying a high-performance computing environment to minimise processing costs

Organisations must find more effective ways to optimise the use of the resources they have available As market demand intensifies for higher resolution from megapixel, and 4K cameras, customers will begin to feel the ensuing cost pressures caused by the increased need for greater processing power. As customers update their system and add new cameras, operators must monitor additional cameras concurrently, oftentimes leveraging high resolution video streams. HPC For Quick...

Networking basics for security professionals: Considering 4k’s impact on networks
Networking basics for security professionals: Considering 4k’s impact on networks

Since last year there has been a lot of talk with regard IP security cameras with 4K resolution. As with any advancement in video security, this too has come about due to advances in consumer electronics. While being the “latest and greatest,” it still raises questions as to actual, practical everyday usage. What Is 4K Resolution? Let’s start by defining 4K. Back in the day we had HDTV, which in some cases was defined in terms of its resolution of 1920 hor...

Networking basics for security professionals: Do you believe in specifications?
Networking basics for security professionals: Do you believe in specifications?

Misreading specifications of transmission products can lead to making the wrong selection Manufacturers’ product specifications are the main source of determining product purchases for video security users. In many cases, the ability to pretest a product under the actual operating conditions is almost impossible. Often the choice is between several different product manufacturers. The time and expense it would take to install and evaluate each one in the actual applicati...

Insights From More Than Two Decades of Attending ISC West
Insights From More Than Two Decades of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Video surveillance storage suppliers gearing up to meet demand
Video surveillance storage suppliers gearing up to meet demand

According to a recent MarketsandMarkets report, video surveillance storage solutions and services are experiencing a rapid adoption in the industry, estimated to grow 16.3 percent each year until 2018, eventually reaching a market size of $10.41 billion. In addition to the specific image content of surveillance cameras, there are also huge amounts of data surrounding it – everything from the location to the time of day, the duration of the video, and more. And the amount of data in the ima...

Designing security systems: Project management techniques
Designing security systems: Project management techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

Utilising intelligence analysts to improve business
Utilising intelligence analysts to improve business

If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...

Networking basics for security professionals: What network switches don’t do
Networking basics for security professionals: What network switches don’t do

Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance When the need to purchase a network switch arises, many IT directors immediately turn to two favourites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by i...

ISC West 2015 countdown: An integrator’s perspective
ISC West 2015 countdown: An integrator’s perspective

With the industry’s largest security trade show just weeks away, we spoke with leading systems integrator Securadyne Systems, Austin, Texas, for their assessment of ISC West and how they use the show to benefit their organisation. Terry King, vice president and regional general manager, shares his thoughts on what Securadyne Systems plans to accomplish at this year’s event. SourceSecurity.com: What is your take on ISC West and what do you get out of it? Terry King: ISC West has al...

Addressing false alarms in video analytics
Addressing false alarms in video analytics

Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...

Learning to use visitor management technology in schools
Learning to use visitor management technology in schools

It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools.  However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...

Physical security and the quest for interoperability at ISC West 2015
Physical security and the quest for interoperability at ISC West 2015

The security industry continues to move away from closed, proprietary systems and instead is fine-focused on open solutions that assist the move to total integration. The benefits of achieving this feat belong to both installing company and end user. Benefits of open security solutions Open, interoperable systems make it easier to integrate a wide array of sensors, devices and communication technologies across the enterprise. That means quicker installations, lower labour costs and heightened...

Video analytics: On the server or at the edge?
Video analytics: On the server or at the edge?

Analytics at the edge provide the ability to process what is happening in a field of view and discern if a relevant alert is triggered There are multiple benefits to using video analytics at the edge (i.e., near or inside the camera). For one thing, analytics at the edge provides the ability to process what is happening in a field of view and discern if a relevant alert is triggered. This can be faster and less expensive than the original video analytics model of using a separ...

Video analytics applications in retail - beyond security
Video analytics applications in retail - beyond security

Video analytics isn’t just for security. In general, the ability to leverage data from video provides a new wealth of information and “intelligence” about all aspects of the business. The retail vertical is leading the way in reaping the benefits of video analytics beyond the security function.   There are two reasons retailers have taken advantage of video analytics far more than other vertical markets. First, retailers generally face more theft than a...

Video Analytics for forensics: Analytics-based forensic evidence collection
Video Analytics for forensics: Analytics-based forensic evidence collection

Intelligent searches of video archives provide investigators faster access to any needed video clip That video analytics can be immensely useful in forensics is relatively less known. However, forensic search capabilities offered by some modern video analytics solutions can not only save investigators significant amounts of time but also help them find results more accurately. These solutions leverage facial recognition and advanced object tracking, demographic analytics, lice...

Video analytics systems in real-world environments
Video analytics systems in real-world environments

Various vertical markets such as retail, airports, and transportation have benefited from video analytics Video analytics systems have progressed far beyond the theoretical and are now being used effectively in a range of applications. Let’s look at some of the real-world scenarios that have taken advantage of the latest video analytics systems. Video analytics aren’t just for security. For a traffic application, Agent Vi provides business intelligence on the ave...

High quality images maximise video analytics success
High quality images maximise video analytics success

The better the sensors, the better the analytics Garbage in, garbage out. The familiar cliché is just as applicable to the area of video analytics as any other field of computing. You simply must have a high-quality image in order to achieve a high-functioning analytics system. The good news is that video cameras, which are the sensors in video analytics systems, are providing images that are better than ever, offering higher quality – and more data – for us...

Understanding and sourcing the right OEM/ODM manufacturer
Understanding and sourcing the right OEM/ODM manufacturer

Local surveillance companies often struggle when deciding between distributing third-party brands or selling their own branded surveillance products, especially when the company has already achieved some level of recognition among their customers and/or other key players. Distributing a famous third-party brand is a way to “play it safe” in an environment where there is little budget to spend on marketing, public relationships and other expenses related to produc...

Canon-Axis buy: Integrators respond
Canon-Axis buy: Integrators respond

Recent news of Canon’s $2.83 billion cash bid for network surveillance leader Axis Communications came as a surprise to some, but many could easily digest the move as more consolidation of the marketplace, especially the crowded video surveillance space. Systems integrators weighed in on what they expect and the long-term outlook for IP camera leader Axis and Canon, a Japanese firm predominate in broadcast, optics and consumer electronics. Joe Liguori, a partner at Access Co...

Addressing business goals for transportation
Addressing business goals for transportation

Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their destination safely and in a timely manner. Making transportation possible are purpose-focused stand-alone systems – many that address business goals and others that achieve safety/security goals. Some systems can impact both business and security goals. For example, access control can eliminate the expense and maintenance of locks and keys...

Hardware vs. software-based surveillance recorders: which is best for you?
Hardware vs. software-based surveillance recorders: which is best for you?

Coming of age: storage devices have evolved to better record, manage and play back high-quality images Video surveillance and security technology continues to come of age. The sophistication of cameras that have moved to high-definition, high-resolution, megapixel imagery has transformed what users see on playback and greatly enhanced the usability of recorded video feeds. As the evolution continues, from the early days of grainy footage and barely recognisable images to HD, F...

Networking basics for security professionals:  Transmission limitations
Networking basics for security professionals: Transmission limitations

Transmission of video and PoE power for IP security cameras over infrastructures can be confusing. Network infrastructures are designed using twisted pair cabling that we refer to as CAT (short for Category) cable, also referred to as UTP (Unshielded Twisted Pair). Security systems, coming from an analogue environment, have historically transmitted over coax cable, and with the use adaptors can transmit over CAT cabling, which can be further broken down into single pair twist...

SecureWatch 24's Fusion Centre focuses on "all things video"
SecureWatch 24's Fusion Centre focuses on "all things video"

The focus of Fusion Centre is all about video - surveillance, analytics, verification, license plate recognition, VMS, wearable cameras and more Growing demand for surveillance that offers better quality video continues to fuel growth in the IP camera market. According to Transparency Market Research, the video surveillance market will realise a compound annual growth rate (CAGR) of 19 percent by 2019, surpassing $42 billion in sales. High-definition video and network-connect...

The impact of austerity on security budgets in Europe
The impact of austerity on security budgets in Europe

With elections due later this year in the UK, Spain and Switzerland, attitudes to the prevailing political landscape of austerity are changing rapidly. Are physical security budgets in the public sector ever protected from cuts, and what is the outlook for our industry? Consider the landscape: A left-leaning party has come to power in Greece on an anti-austerity platform and with the stated intention of halving the country’s €315bn debts. Angela Merkel, the German Chanc...

Onboard surveillance offers high-quality video for transportation vertical
Onboard surveillance offers high-quality video for transportation vertical

In-vehicle technology allows security officials to view live footage from the bus’ cameras during an emergency One of the biggest security opportunities in transportation is onboard surveillance for buses and trains. While most transit organisations have invested heavily in video security for facilities such as terminals and stations, far fewer have taken the next step and installed IP cameras on board vehicles, says John Recesso, strategic business development manager,...

Networking basics for security professionals: Network switch bandwidth limitations
Networking basics for security professionals: Network switch bandwidth limitations

Any part of a transmission infrastructure has a dramatic impact on system performance We often view network switches as transparent transmission products. What goes in comes out. In reality, nothing is further from the truth. In this article, Neil Heller - Vice President, Vigitron, Inc. highlights that any part of a transmission infrastructure has a dramatic impact on transmission and, therefore, on system performance. At the very least a network switch can be viewed as a piec...

Camera apps usher in a new era in surveillance system design
Camera apps usher in a new era in surveillance system design

Of the many benefits offered by new and advanced IP video surveillance cameras, the ability to easily customise these devices with third party apps has the potential to change the landscape in video surveillance system design and implementation. By providing the ability to customise individual cameras with the specific functionality desired for every specific camera location, camera apps not only increase functionality where needed, they deliver tremendous savings on a system-wide...

View more
  • «
  • 1
  • 2
  • ...
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. Expert commentary
About this page

See an extensive list of insightful articles related to Video surveillance, highlighting product, technology and industry trends on Video surveillance from industry thought leaders and experts.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec