Expert commentary
“Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...
H.265/HEVC coding format will bring major benefits to IP video cameras offering a new level of video quality at an economic price The emergence last year of a new format for High Efficiency Video Coding (HEVC) is poised to have a huge impact on IP video surveillance cameras over the next few years. Among the benefits of the new H.265/HEVC coding format over the legacy H.264/MPEG-4 is a 40 percent or more bit rate reduction at the same visual quality. Therefore, a camera...
There are new biometrics on the horizon, but much of current biometrics research centers on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....
Security officers work diligently to protect people and property and are often first on the scene of an emergency. Working alongside police, paramedics and firefighters, security officers demand our collective respect. The Freedonia Group reports that the demand for security officer and patrol services is forecast to rise at an annual rate of 4.6 percent through 2014 to $25 billion and the number of officers employed by private security firms is expected to increase 2.6 perce...
A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...
Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Furth...
A systems integrator can guide the selection of appropriate technologies to accomplish set objectives, leaving nothing to chance In this article, Laurie Smock-Jackson, Vice President of Sales at North American Video, explains that an experienced and knowledgeable system integrator is a valuable partner who can help casino management make the best choices for security and surveillance and get the most from its budget. It used to be that closing a sale simply entailed c...
Panoramic view megapixel cameras simplify and lower overall video surveillance cost High definition megapixel cameras can cover larger areas with fewer surveillance cameras while delivering superior detail and improving overall security operations. This translates into lower security infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video surveillance systems with megapixel cameras while achieving better performance...
Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan...
Video surveillance software now allows retailers to monitor a location from anywhere Video surveillance has a lot more applications in the retail sector than mere loss prevention. It can serve as an important management tool to boost operations and business intelligence. In this article, Gadi Piran of OnSSI, describes how surveillance video can be effectively used by retailers to improve their operating efficiencies and save costs by combining remote monitoring with...
Intelligent asset management is a natural extension of access control Key and asset management can integrate with other security disciplines to extend beyond the much-hyped vogue for 'convergence' and move towards truly intelligent building management. Brenda Taylor, Sales and Marketing Director of Traka, shows how assets can be protected with an approach that draws on shared data while making its own contribution to enterprise-wide information. A point for anybody who has be...
One alternative purpose for a 360-degree camera is the ability to provide a panoramic view in a wall-mounted orientation Changing security requirements have necessitated rapid advances in video surveillance technologies. With the ability to retrospectively track incidents of security breaches, 360-degree cameras provide a much clearer perspective into such events. Here, Richard Pineau of Oncam explains the many facets of this technology and its impact on improv...
Thermal video analytics identify intruders despite background water movement or glare off the water There are more than 300 ports in the U.S. maritime system, representing a major point of vulnerability that could have potentially devastating effects on the US economy. Securing the nation's ports is essential, and port perimeter security is the first line of defense against disruption to global commerce. In this article, SightLogix CEO, John Romanowich, explains how therma...
For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts...
Acquiring emergency phones is an effective way to improve security and safety Call boxes / emergency phones play a very important role in improving security. Not only are they important communication tools in the event of an emergency, but they can also serve as effective deterrents to crime or prevent security threats. In this article, Sam Shanes, Chairman at Talk-A-Phone, gives five valuable tips to significantly enhance the capabilities of the call box / emergenc...
Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of...
The idea that homeland security starts with hometown security cannot be overemphasised Homeland security, which manifests in overall public security and safety, is the responsibility of all citizens, as much as it is of the police and security officers. The idea that homeland security starts with hometown security cannot be overemphasized. Ordinary citizens can contribute to the timely detection and prevention of any serious security threat by staying alert, recognizing suspic...
IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world, c...
Multi-building campuses face unique problems in implementing a total physical security solution The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research faciliti...
Technologies are now available that are specifically designed to accurately detectbreaches in a range of environments Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of n...
The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services. In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...
Security integrators prefer to standardizetheir choices of system components such as power supplues using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In th...
End users should consider the cost of anentire surveillance system rather than the cost of a single megapixel camera Are megapixel surveillance cameras more expensive than conventional cameras? Yes, if one were to believe a common misconception in the security industry. But, to get a clear picture of the reality, one should consider the cost of an entire video surveillance system rather than evaluating the cost of a single megapixel camera. A holistic evaluation of the cost ve...
Video surveillance solutions can work alone to deliver intelligence or integrate with other business systems and optimize operations If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a...
As per DHS, Tier 1 facilities will go through a preliminary round of site inspections called pre-authorisation inspections (PAI) In October 2006, the Department of Homeland Security Appropriations Act of 2007 became law in the US. Section 550 of the Act ordered the Department of Homeland Security (DHS) to “...issue interim final regulations establishing risk-based performance standards for security of chemical facilities and requiring security vulnerability assessments a...
Choosing between "bleeding edge" and leading edge technology is critical when deploying a security system The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge prov...
The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems. Rec...
Software can combine information from various systems to create a single identity across the organization In today's enterprise business environment, the best approach to managing risk for a known scenario is to both prepare for it and guard against it. Effective security management necessitates credible real-time information about risk and the ability to respond to that information in a timely manner. However, that information is often not available in real-time or ma...
Browse expert commentaries
Expert Section
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
