Technology & Trends - Barricades

Why Open Matters In The Age Of AI

Artificial intelligence (AI) creates efficiencies throughout various industries, from managing teams to operating businesses. Key outcomes include faster investigations, fewer false alerts, automated operational checks, and quicker support experiences. These advancements free up valuable time for users, allowing them to focus on high-impact priorities that drive greater ROI. When it comes to surveillance, AI is most visibly powering a new generation of vision language-powered video analytics,...

Martyn’s Law Is Here: Is Your Organization Ready?

The terrorism threat in the UK is very real. In fact, since July 2019, the threat level has never dropped lower than “substantial” or “severe.” To ensure preparedness across public places and events, the UK government has introduced the new Terrorism (Protection of Premises) Act 2025, more commonly known as Martyn’s Law in memory of Martyn Hett, a victim of the 2017 Manchester Arena bombing. Overarching aim The new legislation requires operators of public spaces...

“Mission: Possible”—Stopping The Heist Before It Happens With LiDAR

Seven minutes. That’s how long the recent Louvre heist took. In broad daylight, a group of thieves rode up on a construction platform, smashed display cases, stole several historical jewels tied to the Napoleonic dynasty and escaped on scooters before anyone in the control room even realized what was happening. It sounds like a scene straight out of “Mission: Impossible.” Only this time, Tom Cruise wasn’t there. In movies, we often see tight webs of red laser beams guard...

Design To Finish: Approaching Access Control In Healthcare

The healthcare infrastructure is ever evolving. Facilities are no longer single entities for one, they are sprawling ecosystems that serve a wide range of users, from medical staff and administrators to vulnerable patients, visitors and maintenance personnel. Safeguarding their safety and security, while providing seamless operation is a complex challenge - one frequently solved by access control. Use of access control Today’s security solutions play a central role in protecting people...

Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity

The sheer volume of smart locks, lock management systems, connected readers and an increasing array of Internet of Things (IoT) devices complicates the issuance and management of certificates that are foundational to establishing trust between a device and the credential used to access it. That’s why more companies are turning to PKIaaS for IoT devices. But there’s another reason to consider PKIaaS: the rise of quantum computing. Secure digital communications Gartner predict...

GSX 2025: A Landmark Gathering Of Global Security Professionals

As the world’s security landscape grows ever more complex, the need for a dynamic, comprehensive, and globally minded gathering of thought pioneers and practitioners has never been more pronounced. Enter the Global Security Exchange (GSX) 2025, hosted by ASIS International, a signature event representing seven decades of commitment to advancing the security profession. This year marks a historic milestone, as GSX and ASIS International both celebrate 70 years of shaping the future of secu...

SVMS Pro & AI Edge Boxes: A Unified Intelligent Solution For Cost-Effective, Intelligent Video Management

Currently, in security surveillance, the application of intelligent analysis technology has two approaches: front-end intelligence and back-end intelligence. Front-end intelligence Front-end intelligence is typically implemented within the video surveillance camera itself, integrating AI edge algorithms into the camera. Its advantages include: acquiring video in real-time and performing video analysis and feedback results immediately. Benefits No consumption of network resources like bandw...

Open Source Intelligence For Maritime Surveillance: Safeguarding The Global Shipping Industry

The global maritime surveillance market is projected to grow from $21.9 billion in 2023 to $ 42.7 billion by 2033. This growth is being driven by increasing global trade, maritime security concerns, and the adoption of advanced surveillance technologies such as radars, drones, and satellite monitoring systems. Moreover, the global shipping industry is now on the frontlines of a new kind of conflict — one defined by economic coerc...

Day 2 And Onward: Increasing Security Investment Value Through Outsourced Consulting And Managed Services

Physical security isn’t a one-time project or a static system. It’s a dynamic, ongoing process and program that requires constant attention and management to remain effective. While the initial implementation of a security system — what we often call Day 1 — is critical, the ongoing maintenance, service, and adjustments made after systems are operational, or Day 2, are equally essential. Security program long-term Organizations that fail to focus on post-occupancy sec...

Moving Beyond Legacy Gunshot Detection: A Better Way Forward

Gun violence remains one of the most unpredictable threats in today’s physical security landscape. When it strikes, seconds matter. The ability to detect and respond to gunfire almost instantaneously can determine outcomes. Security pioneers and first responders know this, and yet too many gunshot detection systems in operation today are shackled by outdated assumptions and aging architecture. The demand now is not for incremental improvements, but for a complete rethinking of how these...

Beyond The Cloud: How Edge AI And Containerization Will Reshape Physical Security

The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralized access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issue...

Trespassers And Social Media Trends: How LiDAR Protects Railways From New And Existing Dangers

In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame seekers are finding new, creative ways to use the railway to court notoriety online. Earlier this month, a young man filmed himself laying on the tracks and allowing a train to pass over him. In another instance, two people were seen misusing...

Strengthening Community Safety Through Advanced Video Security Solutions

In 2021, New Orleans took bold steps to modernize its public safety strategy after experiencing a dramatic increase in criminal activity. The city invested $70M in advanced video security systems, placing smart cameras in high-risk areas like busy transit hubs and crowded public spaces to promote community safety. The cameras weren’t just traditional CCTV setups—they were smart security solutions equipped with real-time alerts that leverage AI-powered analytics, facial recogni...

Current And Future Use Of AI In Law Enforcement

Artificial Intelligence isn’t just a buzzword anymore. It has become part of our lives, and its uses and applications are growing every other day. Even the public sector, which usually is a late adopter of new technologies, has come onboard this new train. Law enforcement, in particular, has seen the advantages different AI technologies can offer to their work and has started to integrate them into their workflow and daily routines. But there is much more to come. Task automation: AI as...

How AI-powered Security Systems Tackle Shrinkage And Boost Operational Efficiency

For businesses today, loss prevention is no longer just about safeguarding inventory from theft. While retail theft makes frequent headlines in the United States, and is indeed the leading cause of shrinkage, The National Retail Foundation (NRF) has reported that process failures, operational inefficiencies and employee theft also drive significant losses. Legacy security systems In 2022, the shrink loss is estimated to be $120billion in the United States, and that’s for retail...

Celebrating Women In Security: Shaping The Future Of The Industry

March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its &ld...

Upskilling And Evolving: The Changing Role Of Systems Integrators

Technology advances in the security industry are transforming the way modern systems are designed and installed. Customers today are looking for greater scalability and flexibility, lower up-front costs, and operational efficiency. Cloud-based software as a service (SaaS) solutions, AI-enhanced tools, and IoT-enabled sensors and devices are increasingly in demand. The traditional role of the systems integrator is evolving as a result. While security integrators have always worked closely with e...

Mind The Gap: Addressing Cybersecurity At Every Phase Of Technology Management

In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorized access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their...

When Choosing An Access Solution, Make Total Cost Of Ownership A Key Part Of The Calculation

Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running, an...

Healing Through Innovation: Securing Healthcare In The Cloud

As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialized medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, adm...

Unlocking New Potential In Video Security Through AI

Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionizing traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basi...

Five Considerations To Make When Building A Scalable Security Program

Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organizations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organization. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology....

Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common...

Optimizing Modular Security Solutions

Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualized system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own busine...

Modernizing Your Identity Governance For Today’s Security Challenges

These days, business is more collaborative, adaptable, and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors, and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid, and cloud systems. Good security is built on solid identity...

ADT: Five Ways To Maximize Your Home Security

The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximize your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that bu...

The Evolving Role Of Access Control In Healthcare

Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications.  From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physi...

Bridging The Consumption Gap: A Guide For Systems Integrators

Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies.  Consumption ga...

Mastering Transportation Cybersecurity: The Comprehensive Guide

Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply cha...

How Schools Can Make Outdoor Learning Safe And Secure

Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilize outside space, rather than resort to closing schools. In the COVID-19 era, head...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems