Expert commentary
A perceived benefit of buying direct is to save money as opposed to paying a middleman Security companies have multiple options to purchase security products today – online, manufacturer direct, or from the vast array of security products and electrical supply networks dotting the landscape. Because there are numerous options, and costs may not vary drastically, the final decision on where to purchase ultimately boils down to service and additional support these channels...
Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...
In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...
Camera apps provide flexibility that is unheard-of with traditional server-based processing and analytics solutions The ability to customize IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional analytics require streaming all video to a server or external processor for deep interpretation to detect a license plate, face, or other criteria in each video frame. Apps perform image processing within the camera...
Summary Date: Tuesday, September 20, 2016 Time: 10:00am PT / 1:00pm ET / 5:00pm UTC Duration: 45 minutes + Q&A What's The Webinar About? Mobile credentials are one of the most exciting areas of the access control market. The transformation caused by the development of various mobile solutions in payment, banking, ticketing and automation is poised to deliver similar changes in the access control industry. Mobile credentials are now entering the market...
Part 6 of our Robots in Security series Later this year Universal Protection Service will begin offering a new autonomous robot to customers in California The next security guard you see may look more like R2D2 than Paul Blart, Mall Cop. Robots are starting to make their way into the offerings of security companies, and they may give guards a whole new image. Later this year Universal Protection Service — a division of Universal Services of America — wil...
We will examine the question of the increasing technicality of the closed circuit video industry from three perspectives; The Manufacturer, the Specifier, and the Integrator. History Of Closed Circuit Video Industry Before we begin examining this subject, let's take a look briefly at the history of the Closed Circuit Video Industry. 1920s: Tubes were invented (Cathode, Image Dissector, Iconoscope) 1940s: CCTV first introduced to monitor rocket launches 1970s: The...
Part 10 of our Security in Healthcare series Ensuring the safety of patients, staff and visitors is no easy task Security integration is more than a buzzword in the hospital and healthcare vertical. Increasingly, it’s a necessity. When creating a safe and secure healthcare environment, end users should look for solutions that not only drive new levels of security and business intelligence but can provide long-term value in the future. Specifically, Kevin...
One obvious benefit of an NVR appliance compared to software VMS system is ease of configuration and installation A quality networked video recorder (NVR) and software-based video management system (VMS) both do an excellent job of safeguarding valuable video data. But there are a number of pros and cons for both, along with specific applications that will do better with one option over the other. These can easily be broken down into five topics: ease of setup/install, suppor...
The age of robotics is fast approaching. To be successful, security systems integrators need to understand how these machines fit in the security of their clients, according to industry experts. “The integrators did not begin this trend,” says Bill Bozeman, President and CEO of the PSA Security Network, cooperative of security product suppliers and system integration companies. “They did not say, ‘Oh boy I can’t wait to introduce robotics into my portfolio'. This i...
Many end-users shell out the cash to acquire the newest high-end devices, plug in, and expect to be wowed A well-developed surveillance system can give a single security guard the power to see what otherwise might take a hundred pairs of eyes to see. But what happens when all the components are all connected and powered up, and the resulting image on the screen is, well, indiscernible, or, at the very least, terribly pixelated? Many end-users shell out the cash to acquire the...
Security Week is designed to give something back to the Seminar’s host city in exchange for its hospitality The 62nd ASIS International Seminar and Exhibits will run from September 12 to September 15 in Orlando, Florida. ASIS estimates that the Seminar may attract more than 20,000 security professionals to the Orlando Convention Center, where the event is being held. Giving Back To The Host Community The Seminar always has a major economic effect on the host community...
Winning full engagement from your prospects is tougher today than ever before thanks to the Internet For months, maybe years, you’ve worked to secure an appointment with a prospective customer. You’ve utilized your network, and shown persistence. You’ve consulted with your boss, brainstormed with your peers, and even asked for advice from your friends. You’ve given it every ounce of energy you have, and finally… finally, the...
There’s no better indication that robots are the next big thing in security than the formation of the industry organization known as Robolliance. It’s billed as “a forum for technology partners and industry experts in robotics, surveillance and security to advance the understanding and awareness of the Autonomous Robotics marketplace.” Founded by Sharp Electronics Corp, its members include some of the biggest names in security and technology including Bell and Howell, R...
What's the White Paper about? The mobile industry is known as one of the most innovative and fast-paced and what we have seen in recent years has been nothing short of remarkable. This rapid growth is affecting the underlying technologies and standards in mobile devices as more people use their devices in their daily life and new applications are developed. This white paper from HID Global explores the essential elements in successfully implementing mobile acce...
Today, we find ourselves in a world where we all need to talk less about products and more about solutions The security industry has changed a lot in recent years. Many will remember a time not so long ago when it was about buying boxes/pieces of tin, opening them up and installing them. Today, we find ourselves in a world where we all need to talk less about products and more about solutions. Despite this, there is still an inclination to put everything in a ‘box’...
IT access control offers significant cost savings per unit or door as less hardware is required to cover a large area Over the last several years, there has been a revolution in access control methodologies including increased integration with video management software and video surveillance capabilities that better protect businesses and enterprise applications. But nowhere is the integration space more progressive in scope than the collaboration between the IT department and...
Dennis Sage Home Entertainment, Phoenix, is a best-in-breed audiovisual contracting services firm that gradually began expanding its offerings to security several years ago. After testing the waters, hiring experienced technicians and learning about the parallels with its current business, the company made a successful transition. Now, Dennis Sage, President and Chief Executive Officer (CEO), is also counting on heightened customer engagement and stickier clients as he moves into the role of t...
(Image credit: Antonio Scorza / Shutterstock.com) The era of the “killer robot” hasn’t arrived, exactly, but it may not be far off. Police and the military have been using these machines for decades now to disarm bombs and provide reconnaissance in areas where it would be risky to send officers or soldiers. When Dallas Police equipped a robot with an explosive device and sent it in to take out a sniper who had killed five officers, it raised eyebrows and conjured images...
A lot has changed in the last 15 plus years in the security industry, including the ability to process and analyze Big Data. The growth rate of data has reached an astounding pace. Today, best estimates are that about 2.5 quintillion bytes of data are produced every day—that’s 2.5 followed by a staggering 18 zeros! The volume of data feeding into businesses is so vast, the only means available to leverage this data to drive decision making is to harness the power of a Business I...
The security industry as a whole is migrating from the historical mechanical lock to the newest technology of electronic locks Mechanical locks and keys date back thousands of years and have undergone many changes, but the industry’s transition to electronic locks might be the most important, lasting, and surprisingly affordable security and safety change of all. The objective behind the creation of locks so long ago remains: to control a value on the other side...
The need for security convergence and shared threat intelligence is markedly increasing “Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged security recognizes that truly comprehensive organizational risk management involves the integration of two distinct security functions that have largely been siloed in the past: information security (network operations center or NOC) and physi...
Part 8 of our healthcare series Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. Hospitals are challenging environments. A hospital requires ov...
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of bli...
Part 2 Of Our Robots In Security Series Companies realized they could improve security by mounting laser sensors and cameras on a mobile platform such as Knightscope's Autonomous Data Machines Security and safety robotics, unlike any other industry, is driven by customer and market demand. Once buyers acquire robots, they often find new things they want them to do. Manufacturers are then called upon to respond to those demands, and they often do. Enhancing Security...
Insider threat is primarily focused on malicious threats to the company either by, or to, information technology assets For the past several years, information technology security concerns and priority regarding insider threats have steadily risen as evidenced by a variety of surveys across the IT security industry. Companies are becoming increasingly worried about insider threats. From the cyber security perspective, insider threat is primarily focused on malicious threats...
Lighting, or the absence of it, is one issue that significantly affects a camera’s video quality Video surveillance has rapidly advanced over the last two decades. Today, integrators can purchase IP cameras offering complete network control, megapixel cameras with HD imaging, and PTZ cameras with remote directional control. Although these features are impressive, they don't solve all the challenges that surveillance solutions face. Importance Of Lighting For Camera Per...
A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do...
Workplace mobility is on the rise, which means organizations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situat...
Part 7 of our healthcare series Integrators can sell a breadth of possible equipment into the healthcare market One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound mask...
Browse expert commentaries
Expert Section
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
