Technology & Trends - Access Control
The winds of change have swept into the access control market in 2016. The hardware is transitioning away from being solely panel-based, software is rapidly moving to the cloud, and credentials are going mobile. It seems that the security access control world is finally waking up from its technological slumber, and 2017 will be an exciting time. These three major trends are feeding off one another and are driving the growth all around. IP And Edge Based SystemsIn 2016, hardware companies like...
Merger and acquisition activity has become a familiar topic in the physical security market. In 2016, SourceSecurity.com covered M&A news involving some of the industry’s largest companies, including high-profile names such as Tyco, Honeywell, Hikvision, ADT, and Ingram Micro. Here’s a look at the top 10 M&A stories in 2016, as covered by SourceSecurity.com: 1. Johnson Control And Tyco merge Johnson Controls and Tyco announced their merger into one comp...
The economy positively impacted the security marketplace in 2016 as end users have been more willing to invest in new security systems or upgrade existing systems. Organizations are breaking down department silos as it has become clear that security impacts everyone. Companies are realizing they need to do more with the data they have. Utilizing Security System Data Access control, video management, identity management and visitor management systems provide data that can help companies streaml...
Drastic increase in cybersecurity discussions is one thing that many of us in the security industry didn’t predict for 2016. Cybersecurity has obviously always been an important issue in general, but the discussion has gained a lot of momentum in the past year. As I said, this wasn’t predicted by most of us in the industry. The intensity of the focus on and discussion around cybersecurity in 2016 was a response to some of the high-profile denial of service (DoS)...
The access control industry is now picking up the challenge of embracing new technologies The access control business has, over the last 10 years, completely changed its image from being a rather unattractive slow growth and conservative business to taking up a position as a fast-growing confident business. The access control industry has listened and acted on the needs of the stakeholders in the supply chain and as a result the world market for access control products and so...
New construction has continued to grow as a result of low interest rates in 2016 and that has positively impacted the security marketplace. Yet the limited availability of skilled labor is becoming a large issue as it leads to higher cost of labor. This also creates a challenge in recruiting, training, and retraining a capable staff in building construction and maintenance activities. As a result, there is a continued desire to improve our efficiency in production, commissioning and the manageme...
The security market in 2016 saw an uptick in the economy, the introduction of new technologies, increased compliance requirements in key verticals, and rising concerns over the need for greater security. Users interested in upgrading or deploying new systems consistently chose networked system platforms. This trend further drove the demand for adaptive transmission solutions as a means of repurposing existing analog infrastructure to accommodate IP devices on a networked platform. As this migr...
Access control and video management systems provide much more data than originally intended An organization is a complex environment that is ever changing and continuously growing to include more servers, more buildings, more systems and as a result -- includes more risk, costs and threats. As a Chief Operations Officer looks at the many objectives across an organization, he needs to evaluate how to increase profits, manage risk, and provide a cost-effective route for improvin...
There will likely continue to be high numbers of lone wolf and soft target attacks in the year ahead. The drivers behind these tragedies are a confluence of self-radicalization, social media, violent extremism, and mental illness. They will require our skills as security professionals — observation, investigation, interviewing, due diligence — like never before.Looming in the background of these physical attacks is the prospect of combined physical and cyberattacks that could disable...
The single largest group of consumer IoT devices being deployed is for home automation and residential security Business and technology analysts are in unanimous agreement that the number of IoT devices will explode into the many 10’s of billions within the next five years. These billions of new computing devices will produce enormous volumes of data about ourselves, our society, and our physical environment. The security industry is at ground zero of this upheaval. In f...
The holiday season generates 34% of annual sales for retailers but accounts for 37% of annual losses It is that time a year again, when shoppers and shoplifters converge on our retail outlets looking for that all important deal or steal. Peak Shopping Season This year, the National Retail Federation estimates holiday spending will rise 3.6% from 2015 to more than $655 billion. While the peak shopping season used to be defined as the time between Thanksgiving and Christmas Ev...
Merging objectives into a business relationship requires ongoing communication along with a shared vision and values A myriad of books has been written on business relationships. From establishing and maintaining business relationships to compensation issues and contract terminations, there’s a how-to book out there on most every aspect of business. While I have never published a business “how-to” book, I do have the benefit of experience in successfully navi...
This executive brief explores the security risks associated with using CSN instead of reading the data protected by security mechanisms. When contactless smart cards are implemented and deployed properly, they represent one of the most secure identification technologies available. However, some manufacturers, in an attempt to sell a ‘universal’ reader capable of reading almost any contactless smart card technology, actually disable the built-in security...
Thermal cameras see heat rather than light, so they are a perfect “human detector” Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement: Accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best...
All access information can be stored and managed by highly trained professionals operating from a remote operations center The security and safety industry has seen tremendous advances in cloud-based access control recently as cloud computing has opened up a world of possibilities for security and access control. Whether controlling access for a single door or for an entire enterprise spread out over multiple locations, cloud-based hosted or managed solutions allow security de...
Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognizing this reality, most organizations test their own networks for security weaknesses, whether to meet compli...
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centers, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but firs...
As the trend from analog to IP continues to progress, more and more security devices are IP-enabled for seamless network integration With rising concerns over organizations’ physical security and potential network vulnerabilities, it has become more important now than ever for security professionals and other decision makers to take actions that will guard against potential problems and help prevent system failures. One specific area of heightened focus is the implementa...
If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security indus...
Visitor management refers to the methods organizations use to admit and track visitors to their facilities. The concept is not new. Many facilities use some form of visitor management, ranging from simple sign-in sheets to high-tech approaches that scan government IDs to capture relevant data. But visitor management is more than a sheet of paper or a technology. It is also a policy that governs the how, why, and who of visitors. Increased Security Driving VMS Upgra...
Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various...
Access levels of individuals based on their roles can be cross compared with their normal access patterns, it is also useful to look for anomalies in device behavior Threats to an organization’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To combat this problem, security and IT professionals are fighting back with system upgrades and software solutions including advanced analytics. Using the analytics...
The technologies behind physical access control are constantly evolving. It’s a fast-changing market that can leave end user organizations struggling to keep up. Smart cards still reign supreme, with good reason, but there are also new options today and on the horizon. Customers want to implement the most secure and up-to-date technologies, but constantly adapting their systems to keep up with the pace of change is impractical. Leveraging access control technologies in a way that both m...
If one component within the infrastructure changes, other components may need to be changed too Developing a bill of materials for an infrastructure is not difficult if you have the right information. One word of caution: Infrastructures are unique. Each is individual, so don’t depend on drop-down menus; it simply will not work. If one component within the infrastructure changes, take the time to check and see if the rest of the components need to be changed, too. Let&...
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...
Protecting the world’s critical infrastructure is a complex mission. Managing security for these facilities involves addressing a broad range of possible threats and vulnerabilities, from the intentional contamination of water supplies to the theft of equipment vital to electricity distribution. Vandalism, theft or deliberate sabotage — by terrorists or other criminals — are ever-present threats. The consequences of any security breach can be dire,...
Part 11 of our Security in Healthcare series The Joint Commission’s mission is to continuously improve health care for the public, in collaboration with other stakeholders Compliance with Joint Commission accreditation can impact hospital and healthcare safety and security decisions, and can even drive security system improvements at healthcare facilities. An independent, not-for-profit organization, The Joint Commission accredits and certifies nearly 21...
The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...
A perceived benefit of buying direct is to save money as opposed to paying a middleman Security companies have multiple options to purchase security products today – online, manufacturer direct, or from the vast array of security products and electrical supply networks dotting the landscape. Because there are numerous options, and costs may not vary drastically, the final decision on where to purchase ultimately boils down to service and additional support these channels...
Too often we attribute failure of connected devices to the devices themselves when the problem is actually an infrastructure failure Network infrastructures for security devices are complex. It may seem simple to connect an Ethernet cable to a cable modem, but the connection of IP cameras, access control devices and other IP/Power Over Ethernet (PoE) devices is not nearly so simple. Infrastructure is the heart of any system; and too often we attribute failure of connected devi...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises
Delta Scientific MP100 Portable Barricade Solution