Expert commentary

How Partnering Builds Vendor Value

In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organization is viewed by its clients can have a huge impact on the success of its security programs. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients.  Time, care, and diligence For security vendors s...

Optimizing Modular Security Solutions

Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualized system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own busine...

Four Misconceptions Regarding AI And Analytics In Video Security

Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialog&...

Nedap Adapts To Change: The Dynamic Nature Of Retail Crime

With the rise of organized retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand.  RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supportin...

How A Push For Efficiency Can Be A Boon For Security Integrators In 2024

As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building secu...

Shaping The Future With Interconnected Door Hardware

The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-...

Cloud Computing: A Foundational Element In Modern Technology

In the early stages of childhood education, kindergarten imparts foundational principles that shape future behavior. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's...

A New Breed Of Security Leadership: How The Digital Age Is Transforming The Security Professional

The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialized skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from near...

How Mobile Technology Is Redefining Duty Of Care In Organizations By Mark Niblett

When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls...

ASSA ABLOY Discusses How The Door Security Industry Can Keep Rising To The Occasion

If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity.   Integrated, inter...

Modernizing Your Identity Governance For Today’s Security Challenges

These days, business is more collaborative, adaptable, and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors, and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid, and cloud systems. Good security is built on solid identity...

Strengthening Retail Security: Strategies To Combat The Surging Shoplifting Epidemic

Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023,​ where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concer...

How Security Gets Real With Remote Guarding

The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose.  Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming...

ADT: Five Ways To Maximize Your Home Security

The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximize your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that bu...

Exploring Evolving Trends In Data Security: Unveiling Key Developments

It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data se...

3 Trends To Watch At GSX Conference 2023

GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise cli...

The Evolving Role Of Access Control In Healthcare

Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications.  From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...

Bridging The Consumption Gap: A Guide For Systems Integrators

Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies.  Consumption ga...

Mastering Transportation Cybersecurity: The Comprehensive Guide

Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply cha...

The Importance Of Machine Authentication In Plant Safety And Security

Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication?  Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building...

Efficacious K-12 Solutions In A Challenging, Fluid World

Mass attacks continue to lead the news far too often. All are horrific and disturbing, but the heartbreaking tragedies that have unfolded on school campuses touch us the deepest and have the most profound effects on our communities. NTAC statistics According to a January 2023 report from the United States Secret Service National Threat Assessment Center (NTAC), K-12 events accounted for 6% of all mass attacks in public and semi-public spaces between 2016 and 2020. 6% may strike some as being...

Enhancing Visitor Management Through Access Control

Organizations of all types have made it a priority to better track who is coming and going inside their facilities and on their property. This can include an HVAC technician who needs to be inside a building for several hours to fix a faulty air conditioning unit or a parent who volunteers each week in their child’s school. Technology-based visitor management With considerable advancements in visitor management systems in recent years, organizations are now benefiting from technology-b...

HID Introduces First Eco Card-the Sustainable And Secure Seos® Bamboo Credential

Our recent survey on the state of access control in 2023 showed that HID partners and end users, as well as security and IT professionals, may have varying needs and concerns but nearly all agree on one thing: the need for sustainable solutions. Operational transparency In fact, sustainability was a top issue for almost 90% of our survey respondents. Our end users and their consumers are primarily driving this demand, with ever-increasing numbers asking for operational transparency...

Responsible Technology: Upholding Ethical Standards And Protecting Human Rights Within Security

Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognize the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technolo...

Why The Term “Security Team” Is Too Limiting

There’s been a long history of people thinking of “gates, guards, and guns” when referring to physical security. And for a long time, this was the norm. When analog cameras required significant amounts of wiring and a dedicated guard to watch said feeds (think about any action movie from the 90s), the assumption was that security was protecting assets, but had little to do with the overall business.  Defining security with recent advancements Fast forward to more recen...

Reinventing Security Integrators To Weather Macroeconomic Headwinds

We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalize the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand c...

PR Raises Your Cybersecurity Company’s Trust Level

There are about 3,500 cybersecurity companies across 17 categories operating throughout the United States right now, according to both IT-Harvest and Cyber DB. So, on any given day, an IT security firm must beat back competitors in the market before it can even begin to battle the bots, phishing scams and ransomware attacks that are a part of your trade. And, you won’t be able to do that with marketing and advertising alone. Most, if not all, of your competitors are probably using a sim...

What Makes A Mass Notification Technology A Solution

Keeping people and property safe is the purpose of the entire security industry, and the methods for ensuring safety take numerous forms. From cameras to paging horns to door locks and badge readers, facility managers and security manufacturers must consider multiple factors for securing a building and managing emergencies. Mass notification is critical for many customers to protect a facility and keep people safe. Still, the technology may consist of many elements from one or multiple manufac...

The King’s Coronation: Essential Security Considerations

In this article, Peter Jackson, Managing Director at Jacksons Fencing, emphasizes the significance of implementing and upholding robust security measures, highlighting their role in safeguarding national and public events. In light of a number of tragic incidents, safeguarding public venues has become increasingly prominent in recent years. Despite ongoing threats from terrorism and spontaneous acts of violence, it is imperative that government entities, local authorities, and venue operators t...

Multifactor Authentication Is Now A Top Factor For Cyber Insurance Eligibility And Reducing Premiums

Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimize these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MF...

Related videos

ABLOY UK : ABLOY Critical Infrastructure

IDIS Launches Efficient AI-Powered Security Camera Range

Hikvision Introduces DS-K1T342-E1 Series PoE Power Supply