SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Security and surveillance technologies for the casino market

Security and surveillance technologies for the casino market

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Video surveillance - Expert commentary

Designing an IP/PoE network infrastructure: Factors to consider
Designing an IP/PoE network infrastructure: Factors to consider

If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...

Cloud-based surveillance spearheads growth in security as a service
Cloud-based surveillance spearheads growth in security as a service

The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...

Why Hikvision is suddenly front-page news: The company responds to security concerns
Why Hikvision is suddenly front-page news: The company responds to security concerns

Hikvision has been in the news in the United Kingdom recently, including a front page news story in The Times. SourceSecurity.com offered Keen Yao, Vice President at Hikvision’s International Business Centre, a chance to set the record straight regarding concerns expressed about hacking of cameras, the company’s ties to the Chinese state, and its role as the biggest video surveillance equipment manufacturer in the world. Hikvision has come a long way in the past few ye...

Extenders convert media for longer video distance runs
Extenders convert media for longer video distance runs

IP/PoE systems eliminate the need for local power, thus saving installation costs Cost considerations are an important reason to use existing installed cable as part of a new system infrastructure. Extenders in the form of media converters can help. For almost three decades, video surveillance systems existed in the form of analogue systems. Video coaxial cable was the primary method of transmission with a limited distance of about 750 feet. Analogue systems required separate...

Beyond PoE standards – factors that can cause component failure
Beyond PoE standards – factors that can cause component failure

When a manufacturer states a specific PoE power for a camera, always count on the maximum class power source Power over Ethernet (PoE) is an important consideration in IP video security infrastructures, and many people believe Institute of Electrical and Electronics Engineers (IEEE) standards are the last word. However, when it comes to PoE, there is a wide range of both voltages and wattages that can qualify as being within an individual IEEE power class. This applies to both...

Advanced technology furniture enhances security environments
Advanced technology furniture enhances security environments

Features such as height-adjustable tabletops and adjustable monitor options can fine-tune the workstation The security market is one of the most demanding AV applications. Each environment in the security field presents its own unique set of challenges and requirements that revolve around advanced AV systems and the operators that utilise them. For monitoring and control room operators, that means continuous vigilance with little to no downtime away from their stations. Becau...

Choosing the right cable for networking infrastructure
Choosing the right cable for networking infrastructure

The use of multiple wires has advantages for network transmission Network connection to a remote device begins by considering the type of cable. In some cases, installed cable may already be present and available for reuse, or you may have the option to install a new cable. Let’s review the major types of cable used for most security applications, their advantages and disadvantages. Types of cables In general, there are four major types of cable. First is coaxial cab...

Wireless tracking & RFID enabled Real-Time Location System protects infants at Boston Medical Center
Wireless tracking & RFID enabled Real-Time Location System protects infants at Boston Medical Center

The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...

Download: Modern tools to achieve excellence in video security
Download: Modern tools to achieve excellence in video security

Better-performing video systems provide better security. Today’s end users demand systems with optimum performance, providing smooth video streams, higher resolutions, efficient storage, better analysis and quick access to stored images. Here are several technologies driving greater video surveillance capabilities: Innovations in image processing to boost system performance Higher resolutions are a challenge for video management systems, but new tools are mee...

Clarifying evidentiary procedures for digital video admissibility
Clarifying evidentiary procedures for digital video admissibility

48% of U.S. judges say they are not adequately prepared to deal with the range of “scientific or technical evidence” presented in court Over the last decade, the video surveillance security industry has morphed drastically in attempts to keep pace with both the consumer electronics and enterprise IT markets. This has created a steep learning curve for law enforcement as well as individuals in the judicial system. A 2012 survey titled “A national survey of ju...

Deep learning technology applications for video surveillance
Deep learning technology applications for video surveillance

The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...

Video intelligence broadens with actionable intelligence from social media and other data
Video intelligence broadens with actionable intelligence from social media and other data

For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...

Considerations when designing an IP video security infrastructure
Considerations when designing an IP video security infrastructure

Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...

Future of mobile security hardware for enhanced situational decision making
Future of mobile security hardware for enhanced situational decision making

In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...

Maximising camera-based applications for security
Maximising camera-based applications for security

Camera apps provide flexibility that is unheard-of with traditional server-based processing and analytics solutions The ability to customise IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional analytics require streaming all video to a server or external processor for deep interpretation to detect a license plate, face, or other criteria in each video frame. Apps perform image processing within the camera...

Has the Closed Circuit Video industry become overly technical?
Has the Closed Circuit Video industry become overly technical?

We will examine the question of the increasing technicality of the closed circuit video industry from three perspectives; The Manufacturer, the Specifier, and the Integrator.   History of Closed Circuit Video industry  Before we begin examining this subject, let's take a look briefly at the history of the Closed Circuit Video Industry. 1920s: Tubes were invented (Cathode, Image Dissector, Iconoscope) 1940s: CCTV first introduced to monitor rocket launches 1970s: The...

Healthcare end users seek more integration of disparate security systems
Healthcare end users seek more integration of disparate security systems

 Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin...

NVR vs. VMS: Support, scalability and usability of video storage systems
NVR vs. VMS: Support, scalability and usability of video storage systems

One obvious benefit of an NVR appliance compared to software VMS system is ease of configuration and installation A quality networked video recorder (NVR) and software-based video management system (VMS) both do an excellent job of safeguarding valuable video data. But there are a number of pros and cons for both, along with specific applications that will do better with one option over the other. These can easily be broken down into five topics: ease of setup/install, suppor...

HD surveillance: Secrets to producing the best possible image quality
HD surveillance: Secrets to producing the best possible image quality

Many end-users shell out the cash to acquire the newest high-end devices, plug in, and expect to be wowed A well-developed surveillance system can give a single security guard the power to see what otherwise might take a hundred pairs of eyes to see. But what happens when all the components are all connected and powered up, and the resulting image on the screen is, well, indiscernible, or, at the very least, terribly pixelated? Many end-users shell out the cash to acquire the...

Physical security systems enable compliance to HIPAA and other privacy laws
Physical security systems enable compliance to HIPAA and other privacy laws

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) in the United States fosters health insurance coverage for workers and their families, and requires national standards for electronic health care transactions.   The law’s privacy provisions include protection of information related to any individual’s health status, provision of health care, or payment for health care. There are also additional health privacy laws specific to California. Inter...

VMS and PSIM jargon distracts from tangible security solution benefits
VMS and PSIM jargon distracts from tangible security solution benefits

Today, we find ourselves in a world where we all need to talk less about products and more about solutions The security industry has changed a lot in recent years. Many will remember a time not so long ago when it was about buying boxes/pieces of tin, opening them up and installing them. Today, we find ourselves in a world where we all need to talk less about products and more about solutions. Despite this, there is still an inclination to put everything in a ‘box’...

IT & access control collaboration leads to functional, personnel and financial benefits
IT & access control collaboration leads to functional, personnel and financial benefits

IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...

Smart home products help security companies engage customers
Smart home products help security companies engage customers

Dennis Sage Home Entertainment, Phoenix, is a best-in-breed audiovisual contracting services firm that gradually began expanding its offerings to security several years ago. After testing the waters, hiring experienced technicians and learning about the parallels with its current business, the company made a successful transition. Now, Dennis Sage, President and Chief Executive Officer (CEO), is also counting on heightened customer engagement and stickier clients as he moves into the role of t...

Data mining for insider threats: Another convergence of physical and cyber security
Data mining for insider threats: Another convergence of physical and cyber security

For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety of surveys across the IT security industry. Companies are becoming increasingly worried about insider threats.  From the cyber security perspective, insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets. Whether it is fraud, intellectual property theft, or ev...

Shedding light on integrated cameras and independent illuminators
Shedding light on integrated cameras and independent illuminators

Lighting, or the absence of it, is one issue that significantly affects a camera’s video quality Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control, megapixel cameras with HD imaging, and PTZ cameras with remote directional control. Although these features are impressive, they don't solve all the challenges that surveillance solutions face. Importance of lighting for camera per...

Shooting incidents highlight importance of hospital security
Shooting incidents highlight importance of hospital security

Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors, nurses and other medical personnel may come under blame for the death of a loved one and need protection. Heightened security needs Think for a minute, though, about the elevated need for security when the victims of a massacre — such as the Orlando massacre — arrive at the hospital. On the heels of the shooting at the Pulse Nightclu...

Body worn cameras: From forensic recording to live situational awareness for law enforcement
Body worn cameras: From forensic recording to live situational awareness for law enforcement

Body worn cameras help to provide better evidence documentation, increased accountability and transparency in law enforcement Forensic recordings – or the audio and video recordings from 911 calls, traffic cameras, CCTV systems and more – are virtually everywhere.  However, in most cases the devices are static and fixed and often do not provide immediate or real-time information on incidents or pending threats.  For example, the Boston Marathon bombers we...

13 tips for security and IT professionals to keep IP video surveillance networks secure
13 tips for security and IT professionals to keep IP video surveillance networks secure

Keeping surveillance networks secure can be a daunting task but there are several methods that can greatly reduce risk, especially when used in conjunction with each other. Below are 13 tips security and IT professionals can follow in order to keep an IP video surveillance network secure. 1. The stronger the password the better Strong passwords are the most basic security measure, but unfortunately ignored by many users. Many surveillance systems are deployed in the field with...

Do NVR-based systems put video surveillance data at risk?
Do NVR-based systems put video surveillance data at risk?

Video surveillance plays a significant role in any comprehensive security plan, and the value derived from surveillance continues to expand Across the globe, organisations are challenged by a diverse risk landscape and a dynamic operational environment. The safety and security of people, assets and intellectual property are a No. 1 priority, and stakeholders look to gain continuous insight into what is happening at any given time. The ability to identify threats early and effi...

Body worn cameras increase amid current police concerns
Body worn cameras increase amid current police concerns

   Body worn cameras are seen as improving accountability, and also can provide evidence in criminal trials Body worn cameras have realised a surge in demand across the United States in the current climate of concern about how police interact with citizens, especially when that interaction turns deadly. Embracing body worn cameras For example, Los Angeles has approved a $69.6 million plan to equip 7,000 Los Angeles patrol officers with body worn cameras by the end o...

View more
  • «
  • 1
  • 2
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • 17
  • 18
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. Expert commentary
About this page

See an extensive list of insightful articles related to Video surveillance, highlighting product, technology and industry trends on Video surveillance from industry thought leaders and experts.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec