Technology & Trends - Access control software

Five Best Practices For Protecting Video Surveillance Systems Against Cyber Threats

There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...

How To Optimize Mobile Access Control Authentication With Smart Devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

Applying Biometric Authentication To Physical Access Control Systems

Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...

Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...

Are Mobile Credentials More Secure Than Smart Cards?

For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, al...

Artificial Intelligence (AI) Applications For Cybersecurity Automation

Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so far, machine learning is more hype than helpful for cybersecurity, but that does not mean you can’t automate some tasks to keep your...

Artificial Intelligence (AI) Trends In Physical Security Systems

If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of appli...

Open Platform Security Solutions: Managing Customer Expectations

It’s not hard to see why more and more locations are requesting security solutions that operate on an open system. Selecting products and platforms that utilize open standards—Session Initiation Protocol (SIP), HTTP, IEEE, RESTful APIs, etc.—provide additional levels of interoperability, scalability and versatility that give organizations the flexibility they want to be proactive with safety and security. Unfortunately, creating the right solution today isn’t quite as si...

How The Convergence Of Physical Security And Cybersecurity Will Benefit Businesses

The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2...

How Effective Security Departments Bust Multi-million Dollar Crimes

It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging A Curious Incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the...

Impact Of Sophisticated IT Technologies On The Security Market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being l...

How Video Analytics Maximise The Value Of Your Surveillance System

Despite the huge amount of video data collected, statistics show that only 10 percent of data is ever used and most loses its value within seconds of being generated. Why use such a limited amount of data? Many security organizations are focused on delivering the right information in case of an emergency or providing the correct evidence after a criminal act. Yet the fact is, a new video security system can be a large investment. Together with the service, maintenance and management costs assoc...