Technology & Trends - Access Control

Mobile & Biometric Access Control To Build In 2016 With Increased Need For Perimeter Security

While the access control market typically moves at a near glacial pace, 2015 brought quite a bit of news to the marketplace, including the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. For Vanderbilt, 2015 was a big year as we brought the Siemens Security Products business into the fold, building our global brand and awareness of our award-winning solutions that have been...

ESA Leadership Summit 2016 - Transforming Security Industry Executives Into Rising Leaders

The ESA Summit is offering registration for “Rising Leaders” to gain valuableleadership skills and business tactics Leadership Summit presented by the Electronic Security Association (ESA), Irving, Texas, has penned the slogan: “Link. Learn. Lead.” for its 2016 event. Scheduled for January 31 through February 3 at the Wild Horse Pass Hotel & Casino in Chandler, Arizona, the ESA Leadership Summit is a testament to a quickly changing security landscap...

Increased Adoption Of Fingerprint Based Solutions, Two-Factor Authentication To Touch New High In 2016

The extraordinary global adoption of fingerprint based solutions, from mobile devices to credentials, will continue to expand and touch new markets in 2016. The trend to move away from passwords and PINs is really building momentum in logical and physical access. Widespread Use Of Biometric Security The security industry in 2015 continued to improve, along with the overall economy. Regulatory agencies are taking the lead as two-factor authentication is becoming a more mainstream concept. From...

SourceSecurity.com’s 10 Most Click-Worthy Articles Of 2015

Many of the most well-trafficked articles posted at SourceSecurity.com in 2015 were those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2015 that generated the most page views. They are listed in order here with the author’s...

Open, Software-Based Security System Crucial For Dealing With Changing Security Demands

Many security solutions available today have the problem of being insufficiently open, offering very limited flexibility. Integrating third-party products is practically impossible. Customers therefore very often have to make a long-term bet on just one vendor. Upgrading or expanding security systems is often complex, expensive and time-consuming. But the industry is changing. Initiatives like open standards and cooperation between suppliers are emerging to help companies react faster to changin...

SourceSecurity.com 2015 Review And 2016 Forecast

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.   Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...

Security Industry’s Top 10 Mergers & Acquisitions Of 2015

For the second year in a row, Canon made the biggest M&A move in the security marketplace in 2015. How could Canon top the industry shockwaves it created in 2014 when the Japanese giant acquired VMS company Milestone Systems? That’s easy: They bought Axis Communications for $2.8 billion in 2015.   Although the Canon-Axis deal grabbed the most headlines and was easily the most shocking M&A announcement of 2015, it was certainly not the only big news on the mergers...

Hardening Perimeter Security By Integrating More Access Control Technology At Entrances

At 2015 year-end, we are continuing to see a trend toward hardening the perimeter for buildings and property. I believe we are approaching a tipping point with respect to C-suite awareness of the perils of unauthorized entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organizations to take action. Role Of Trusted Consult...

Cybersecurity And Mobile Apps To See Greater Demand For Improved Security In 2016

The global economy presented some challenges to Tyco Security Products in several ways throughout 2015. Anyone in oil and gas or mining experienced an impact resulting from the market dynamics within those verticals. Also, the significant strength of the US dollar versus other currencies is impacting order value for companies with a global footprint. All in all, though, business remains strong and growing.   Measures To Strengthen Cybersecurity Looking ahead to 2016, cybersec...

Consolidation And Customer-Centric Approaches Drive Growth For 2016 And Beyond

AMAG Technology provides an overview on its regional development and the current market trends in these regions. The integrated security solution provider speaks about the consolidation of the video market and the growing necessity to develop security solutions that address the needs of their customers. The overall economy positively impacted the North American security market in 2015 as AMAG Technology has experienced unprecedented growth as an organization. On the international side, there ha...

Security Industry Benefits From Greater Public Sector Spending & Market Growth Despite Fears Of Economic Stagnation

Overall 2015 has been a year of increased public sector spending (as the UK economy continues to emerge from the recession), which has been highly beneficial to the security industry. This trend has been particularly evident in the healthcare and education sectors, which are key markets for TDSi. Nobody could have predicted the significant number of international security and terrorism threats this year. Undoubtedly this will result in even closer ties among the security industry, police and se...

SourceSecurity.com’s Top 10 Expert Panel Roundtable Discussions In 2015

SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions.   Not surprisingly, the discussion topics that have generated the most interest (in terms of how much visitor traffic they generated) are the same hot topics we hear about every day in the industry. Our very most-clicked-on Roundtable discussion in 2015 was about the impact of video on privacy rights. Other hot topics that made the Top-10 list of Roundtable d...

Security Market Consolidation Trending For 2015; Cloud, IoT And Home Automation Set To Grow Further In 2016

2015 was a year of consolidations: The spring of 2015 recorded the highest acquisition rate for a six-month period in 10 years. There were single-digit market growth rates reported in video surveillance due to price erosion affecting revenues. Video solution providers are expanding into access control, and both are slowly but steadily moving into the cloud. Users want the efficiency benefits of converging access control with video verification and unified operation. There are more cloud offering...

Security Industry In 2016 To See Higher Megapixel Cameras, IT Security Strengthening And Adoption Of New Technologies

The year 2015 has been notable in several ways. Industry changes include a rise in Chinese manufacturers in the mid- to low-end market, more mobile devices providing video surveillance, and the rise of omnidirectional and higher-megapixel cameras. Unexpectedly, the industry also saw an increase in popularity of do-it-yourself security systems and the speed with which Chinese companies saturated the marketplace with “good enough” products. Omni-Directional Cameras Oncam welcomes th...

IP Access Control Moves Beyond Door Control Solutions, Evolves Into New Roles And Applications

Rapid expansion of access control into new roles has been fueled by panel-less architecture Our world has changed and our industry has changed with it.  Data now rules, and the network is king. The Internet of Things has driven customer expectations in how data is received and can be acted upon.  Advances in panel-less pure IP technologies have allowed our customers to redefine the applications of access control. These two colliding forces have put us all in the bus...

Cloud And Mobile Credential Offerings To Overtake Market For Card-Based Identity Systems In 2016

Throughout 2015 the security industry saw the appearance of numerous mobile credential offerings, signaling the “beginning of the end” of card-based identity, and strengthening of mobile offerings in general. Overall, the security industry enjoyed healthy growth throughout 2015, as reflected in the better-than-index performance of most publicly traded security company stocks.  Cloud companies, in particular, saw the market turning their way, as a number of security vendors hav...

Value And Quality To Drive Security Market Growth In 2016; Axis Expansion Plans

The security industry continued to grow in 2015, although it was a bit slower than expected. Most noticeably, we saw a lot of M&A activity throughout the industry, including our own new ownership under Canon. Business continues as usual, and we have and will maintain our separate brand. The industry also experienced more price pressure on hardware than in previous years. Axis U.S. Expansion Plans 2016, IP Video, IoT The discussion of price versus value will be a common one in 2016. There...

How Security Plans With Reliable Policies And Procedures Deliver Improved Operational Effectiveness

Automated procedures reduce manual errors & help meet regulatory requirements End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective securi...

The Role Of Security Integrators In Preventing Tailgating

Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorized person follows an authorized personnel through a controlled entrance. More than 50 percent...

Paris Attacks Shift Focus On Securing Soft Targets Against External Threats

Soft targets are civilian-centric places suchas churches and retail centres, where securityis not as fortified The terror attack on Paris on Nov. 13 lasted just 23 minutes. The bombers and gunmen split up and attacked seven sites: the soccer stadium where it all began, four restaurants, a bar and a concert venue. All told, they killed 130 people and injured 368 in the time it takes for a coffee break. This situation has raised questions about the security management for conce...

How Windows 10 Enhances ATM Security By Protecting Against Cyber Attacks

Speaking at ATM Security 2015 in London, Pat Telford, principal consultant at Microsoft Canada, summarized the software threats to ATMs and the features to combat them when migrating to Windows 10. ATM security is compromized by physical attacks on the cash, physical attacks on the card, replacement of the ATM computer (black box), and malware attack (where normally a person visits the ATM and adds malware). According To Telford, There Are Certain Immutable Laws Of ATM Sec...

Risk Based Security Solutions – A Holistic And Balanced Approach To Security Management

Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families.  As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a pre...

Dortronics’ Customized Door Control Solutions Enhance Business Opportunities For Specialty Applications

Dortronics continues to focus on custom solutions in addition to its line of standard devices Security installers have new ways to add value to their specifications with switches and door controls that can be deployed in a wide range of applications to meet emerging needs of end-users. John FitzPatrick, president of Dortronics Systems Inc., Sag Harbor, New York, says the company continues to work closely with security integrators and their end-user customers to provide co...

The Impact Of Smart Video Surveillance Technology And Analytics On Home Automation Systems

Modern home security systems have come of age with innovative technologies that enable homeowners to have complete control over every aspect of the system. MOBOTIX’s Keith Jernigan Sr. and Hunter Fort explore the immense capabilities smart video surveillance technology to make a huge impact on the home automation systems by driving down energy costs as well as storing massive amounts of data. Home automation is not as new as most people would imagine. It has been around for several decade...

Role Of Advanced Security Technologies In Enhancing Exhibits And Visitor Experience In Museums

With every technological advance that canbenefit museum management comes anotherthat may assist thieves  When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...

Ethernet Switches – Powering IP Surveillance Systems The Smarter And More Economical Way

Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...

IoT Intelligent Building Systems Expose Security Threats And Challenges

The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organizations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...

Combating ATM Security Risks With Innovative Security Technology Reduces Costs

Recycling ATMs, which can reuse deposited cash to supply withdrawals, are another way in which ATM-associated crime can be reduced With some 3 million automated teller machines (ATMs) around the world, they are bound to be seen as attractive targets by some criminals. Banks need to ensure customers do not fall prey to skimming and other malicious attacks from criminals, by having an effective ATM security in place. The advent of contactless technology has eliminated the need...

Parking Facility Security Offers New Opportunities For System Integrators

Security cameras provide live, real-time video to assist security personnel in spotting potential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new s...

H&S Protection Systems Uses Social Media To Increase Brand Awareness And Sales

Social media channels have active and consistent users and may constitute a promising audience for security integrator’s marketing efforts  If you have any lingering doubts about the impact of social media, consider this: Worldwide, there are over 1.44 billion monthly active Facebook users, which is a 13 percent increase year over year, according to the social media giant. In addition, 936 million people log onto Facebook daily (as of March 2015), whi...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems