Technology & Trends - Intercom Systems
The technologies behind physical access control are constantly evolving. It’s a fast-changing market that can leave end user organizations struggling to keep up. Smart cards still reign supreme, with good reason, but there are also new options today and on the horizon. Customers want to implement the most secure and up-to-date technologies, but constantly adapting their systems to keep up with the pace of change is impractical. Leveraging access control technologies in a way that both m...
Part 8 of our healthcare series Hospitals are challenging environments. A hospital requires oversight 24 hours a day, seven days a week Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. Hospitals are challenging environments. A hospital requires ov...
Everything about wireless access control makes life easier for those who install and operate it A lot of market data crosses my desk at ASSA ABLOY. Sometimes it can be hard to spot patterns or pick out the trends. But not always. Some recent access control market research we commissioned pointed in one direction. Our conclusion? Slowly but surely, access control is becoming a wireless technology As the global leader in door opening solutions, we are able to survey a large,...
H.265 compression continued to be a popular topic from exhibitors on the second day of IFSEC Video beyond security, compression, HD over analog and integration were on the lips of several exhibitors at IFSEC International 2016. Strangely for a security exhibition, there were plenty of exhibitors talking about non-security applications on the second day of IFSEC International in London. For Axis Communications, Atul Rajput, Regional Director for Northern Europe, said the...
Access control now includes a strong focus on the data integration sideof the business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...
Organizations need to protect their properties and people by securing entranceswith security systems and policies Most criminals gain access to a business or organization the same way honest people do – they walk through a door. That door may be left unlocked. It may be propped open. Poor locks may be easily defeated or the door may be inadequately constructed and offer little resistance when attacked. Focus On Multiple-Layered Security It seems obvious the path to...
According to Merit LILIN, the UAE will be a thriving new and potential market in 2016since Europe’s economy is still sluggish The global Chinese community recently welcomed the year of the Fire Monkey with a two-week celebration, concluding with the lantern festival at the end of February. According to Chinese astrology, we are now in the year of the Fire Monkey. What’s in store for businesses around the world? Global economic growth is predicted for the ye...
More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...
A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings Created By Pop Culture Contributing to the problem of understanding is the popular culture. “Popular mo...
Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signaling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programing, depen...
Key control technology and guard tour systems provide a ready-made solution for healthcare organizations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defense is having a significant impact on...
Facial and body behavior analytics can identify people “without interferingwith the pace of life” Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to. SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems ca...
2015 has been a huge success for key and asset management company Traka. The manufacturer is predicting growth between 20 and 30 percent. It attributes a large part of its success to the extensive work completed in previous years in the U.S. markets, as the foundations set are now coming to fruition. However, Traka has also encountered a real culture shift within the industry. Where previously key management systems and intelligent lockers for asset management were seen as a...
Although 2015 seemed like the year of data breaches, it was also the year that the Internet of Things (IoT) achieved real traction. Key management systems and most other advanced security solutions can now be integrated with the networked security system (i.e. identity management, access control, IP video surveillance, intrusion and other systems) to strengthen risk management strategies. Specifically, Morse Watchmans’ KeyWatcher Touch can now be integrated with Lenel’s OnGuard Acce...
2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing. Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...
At 2015 year-end, we are continuing to see a trend toward hardening the perimeter for buildings and property. I believe we are approaching a tipping point with respect to C-suite awareness of the perils of unauthorized entry, often called “piggybacking” or “tailgating” in security vocabulary. Top executives are becoming more aware of the threat and the potential cost of such threats, and they’re motivating their organizations to take action. Role Of Trusted Consult...
Modern home security systems have come of age with innovative technologies that enable homeowners to have complete control over every aspect of the system. MOBOTIX’s Keith Jernigan Sr. and Hunter Fort explore the immense capabilities smart video surveillance technology to make a huge impact on the home automation systems by driving down energy costs as well as storing massive amounts of data. Home automation is not as new as most people would imagine. It has been around for several decade...
Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...
Security cameras provide live, real-time video to assist security personnel in spotting potential or real problems Efficient security systems for parking structures deter criminal activities and anti-social elements from destroying property. Over the years, security companies have responded to this need and developed a range of security systems for parking facilities, such as audio intercoms, access cards and video analytic solutions. Systems integrators who want to add new s...
(Click to see larger image) The ASIS Foundation & the University of Phoenix College of Security and Justice's Enterprise Security Competency model Are you competent in your security job or profession? How do you know? According to research carried out by the ASIS Foundation, security has begun to evolve beyond guarding doors, checking IDs and screening briefcases and purses. Today, something called Enterprise Security Risk Management (ESRM) is subsuming the tra...
The Protection Bureau is one of the top-10 security integrators in the US You really can’t talk about The Protection Bureau, Exton, Pa., without discussing its founder, the late Keith Ladd. If you’ve been in the industry any length of time, you probably had a chance to meet him. I certainly did. In fact, when I was a cub reporter with one of the first security publications I ever worked for, my inaugural visit to a customer and central station was to The Protection...
School security has increasingly become an area of focus among school boards and municipalities. Officials are constantly seeking to implement or improve security and safety policies, procedures and technologies to offer the highest level of protection for students, staff and visitors. Every second counts in an emergency or crisis, making it imperative that schools have policies and procedures in place that make it possible to lock down buildings instantly while simultaneousl...
A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by smuggling mock explosives and weapons past checkpoints. With admirable transparency, U.S. Office of Inspector General (OIG) has described how so-called “Red Teams” posed as regular passengers and exposed inadequate measures at some of the busiest airports across the United States. The revelations came a few days before Body Search 2...
Many security dealers and installers are expanding their offerings to include home automation equipment The growth of home automation and “smart home” technology has created a unique opportunity for security companies of all kinds. With security systems already in about 20 percent of American homes, many security dealers and installers are expanding their offerings to include home automation equipment. Internet Connected Devices After all, why just offer monitori...
Just how big is the home automation industry? One way to tell is by looking at the sheer number of companies – large and small—that have rushed to enter this fast-growing space. They include some of the world’s largest corporations – Apple and Google – along with the nation’s biggest cable and telecom companies – Comcast and AT&T. It includes big names in security like Honeywell and ADT. Then there are less known, but fast g...
Security beyond its traditional boundaries is a big theme at IFSEC 2015 The security landscape is changing. Touring exhibitors on the first day of IFSEC International in London, it seems an increasing number of vendors are offering products that go beyond what may be termed "security," offering solutions for applications such as health and safety and data collection. They are also offering more smart technology with mobile phones and tablets, and are selling smarter by tailori...
Readily available security technology can help officials take control of their campuses Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, president of RETA Security, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but that value is almost completely realised in terms of forensics – reactin...
Audio systems can enhance liability protection. Recently, a large regional convenience store chain with units across the Midwest and South supplemented its video surveillance security system with an audio monitoring system. Retail stores with Louroe audio system: The technology has been installed in more than 700 of the convenience retailer’s locations. The Louroe Electronics systems feature omni-directional capability and sensitivity and pick up sound within a 15-foot...
Online wireless locks enable real-time online access control functionality Organizations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customized system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...
Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
- View more Intercom Systems
- Aiphone Intercom Systems
- BPT Intercom Systems
- Fermax Intercom Systems
- Videx Intercom Systems
- Bell Systems Intercom Systems
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises
Delta Scientific MP100 Portable Barricade Solution