Every Security System Has a Story

Our industry’s technology solutions are at work almost everywhere, if you think about it. You might see Kelvin Hughes high-resolution radar pictures providing protection for Maryland’s oyster beds. At the 2014 Oscars, Axis pan-tilt-zoom (PTZ) cameras kept watch around the Dolby Theater in Los Angeles. At The Marque, an exclusive membership club in Houston, Texas, MorphoTrak 3D facial recognition technology secures access and enables the club to be “exclusive.”

These are just a few examples of the many ways security technology is at work every day around the world. I came across them when browsing through SourceSecurity.com’s Application section.

Every system has a history. Each application of security technology has a story behind it, and more and more supplier companies are seeing the value of telling those stories. Sometimes, it’s not easy to get the stories out there. Suppliers have to browbeat their dealer/integrator partners to identify interesting ways their equipment is being used in the field, and then they have to work with each end user customer to collect the details of the story and to get the information written down and distributed.

Showcasing Value with Success Stories

In the end, the application stories tell as much about our industry than anything else. Application case studies are about our successes. They demonstrate the value of our products and equipment in terms that any end user or integrator can understand. Simply put, application stories confirm that our industry’s products really work. Case studies are about happy customers – the best kind – so of course manufacturers want those stories told and retold.

I personally love to hear how security technology is working in the real world. Application stories take the abstract concepts and technology jargon we hear every day and translate them into something concrete and understandable. This was our problem. Here’s how we solved it. These are our results.

As a broad-ranging digital publisher dedicated to security systems and technology, SourceSecurity.com leverages its Applications to enable every supplier to share their successes. And technology makes it easy to search for content specific to any situation. I find it interesting just to browse through the various articles to see the diverse range of ways equipment is used. Definitely worth a look.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...