Technology & Trends - Surveillance cameras
Monitronics’ ProShop offers sales and marketing materials to its dealer network as a valuable resource Monitronics Security, headquartered in Dallas, continues to stress the importance of professional monitoring services to its dealers and their customers as a critical component of recurring monthly revenue (RMR). “Traditional dealers need to emphasize the advantages of live, around-the-clock monitoring for anyone considering a non-traditional provider or do-it-yo...
As the home automation industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. Next-Generation Protocols: Bluetooth And Wi-Fi “Right now companies are releasing really i...
This article by Keith Jernigan Sr., General Manager - MOBOTIX Corporation states the enormous impact of smart surveillance on various sectors. Highlighting the changing trends of video surveillance, Keith talks about the several benefits of IoT. He mentions that the new era will see video surveillance companies as more than just video security cameras sellers. To summarize, IoT is forecasted to conjure up businesses offerings, reduce costs and hazards, create jobs and opportunities, thus leading...
Security and technology are rushing to offer home automation solutions and build out the Smart Home of connected devices and applications. As cameras, alarms, as well as, thermostats and other appliances become controllable and programmable using Internet-enabled smart phones, they are becoming part of a vast web called the internet of things (IoT). Achieving Greater Value Through Smart Data Exchange This network of physical objects or "things" embedded with electronics, software, sensors and...
Affiliated Monitoring’s UL-Listed monitoring center with a second floor dedicated to areas for security company meetings Central monitoring stations have innovative approaches to assist security installing companies in growing their account base, adding value and boosting recurring monthly revenue (RMR). These companies do much more than simply monitor accounts – today they provide a host of services to give security installing companies the added edge in an extrem...
Security-Net has grown significantly in stature as a global national accounts organization Back in the day, security companies kept their business close to the vest, didn’t collaborate and worked locally, without expanding beyond limited geographic boundaries. Security-Net™, Exton, Pa., came about in an effort to find a better way. So some 22 years ago, in 1993, the organization began a journey – one that would eventually establish it as a highly respected n...
For police, BWCs can significantly improve how evidence is collected by recording the visual and audio actions Body worn cameras (BWCs) are becoming common place in law enforcement. While the spotlight for body cameras is on police in the news, BWCs are also sought after in security-related contracts for airports, campuses, correctional facilities and for private security. It’s quite likely interactions with police or security guards will be recorded (people who re...
What does it take to be a success in the rapidly expanding home automation sector? For large and small security companies, making the jump from providing traditional security services to enabling the new Smart Home means dealing with competition. Security Firms v/s Cable And Telco Giants The market is filled with providers of all kind who want a piece of the action. In addition to security companies, cable and telco giants have all rolled out a home automation platform – usually on top o...
Today, the once crime-ridden area of Los Angeles is a flourishing shopping and tourist mecca Los Angeles struggled with a rising crime rate. Constant crime plagued the historic area with its well-known tourist attractions, which include TCL Chinese Theater and the Walk of Fame. Criminal activity ranged from major to minor, from felonies to prostitution, public drunkenness, trespassing, vandalism, theft and on and on. Time and budget constraints had forced local police officer...
New notification appliances from Silent Knight provide code-required low-frequency output Just before the National Fire Protection Association’s (NFPA) World Safety Conference and Expo, June 22-25 in Chicago, Honeywell unveiled new solutions and features designed to boost life safety and provide more intuitive installations. S3 Series Control/Communicator A “virtual press conference” unveiling the announcements was kicked off by Beth Welch, manager of publi...
When it comes to protecting buildings and property, traditional methods of security—such as structural barriers, security guards, and security cameras—have their limitations. Advanced laser scanning technology can overcome many of these limitations and provide a safe, reliable, and easy-to-use solution. Overview Of Laser Scanning Technology Laser scanning technology for building security applications utilizes the time-of-flight method, in which a sensor em...
When video analytics first emerged in the security industry about a decade ago, there were high hopes it would instantly transform the landscape of video surveillance. Problem was, the technology was not mature and, in essence, was oversold as far as its capabilities. Analytics such as heat mapping, directional and license plate recognition technology have improved, lending themselves to applications beyond security and into the realm of actionable business intelligence Integra...
Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...
Wi-Fi, real-time location tracking and security sensors are important elements of IoT solutions The tracking of people, processes and things continues to grow, and that’s good news for systems integrators, who can add these services to their arsenal of offerings and boost their levels of recurring monthly revenue (RMR). Real-Time Location Tracking Global Positioning Systems (GPS) and Radio Frequency Identification (RFID) are great ways to not only add security, but ope...
ESA opens the 2015 exhibit show floor with a ribbon cutting ceremony The Electronic Security Association (ESA) wrapped up ESX 2015, June 24 to 26 in Baltimore, Md., drawing integrators, manufacturers and association members from across the country to attend the annual educational, exhibits and networking event. Security Integration Companies Celebrating its eighth year, the show is jointly owned and sponsored by ESA and the Central Station Alarm Association (CSAA). ESX inclu...
The technological resources from the physical security sector available to prisons dealing with contraband threats are effective For those outside the security industry, the idea of prison contraband rarely extends beyond the old gag of a file inside a cake. In fact, contraband at prisons and other custodial premises is a major challenge: deterring and detecting it occupies many man-hours, and manufacturers devote much R&D activity to the problem. Contrabands In Prison T...
The ultimate goal is to predict violent incidents through analytical intelligence Potential deployments of video analytics, or my own preferred term “intelligent scene analysis,” are being worked on by some of the best minds at university campuses across the United Kingdom. Later this year I will visit Kingston University whose Digital Imaging Research Centre is one of the largest computer vision groups in Europe. Violence Prevention Through Analytical Intelligenc...
Today, a number of school districts are saying no to these kinds of realistic active shooter drills In the wake of the shootings at Columbine High School in 1999 — 16 years ago — and the school shootings that have followed, we have struggled to figure out how to keep students and teachers safe during such an attack. Protective Measures An approach to the problem that has grown controversial is armed assailant or active shooter drills. Six states including Arkansa...
The great increase in the amount of data is driving physical security to the cloud Physical security is migrating to the cloud — because it improves the performance of physical security technology while holding down costs. “Essentially what is happening is that physical security technologies are growing more powerful and generating more and more data,” says Steve Surfaro, business development manager and security industry liaison with Axis Communications, wh...
In the vast center of the hall almost none of the randomly shaped stands display their index number I enjoy IFSEC each year, spending three days walking the halls. I do feel frustrated by the acres of "me too" products prompting a "meh" response. So often I’m left feeling the "big news" is that hype and lies are growing and continue to drown out the truth. If companies' marketing budgets were simply given over to their product development departments, we would find thing...
When asking exhibitors at IFSEC International 2015 about what drives their markets, many cite system integration as a key factor. And they want more of it. Integration As Business “Driving Force” For example, John Davies of TDSI says customers are now seeking out system integration. “They want a solution rather than components, such as linking access control with building management systems or with an organization’s IT network to control access to its computers,”...
Security beyond its traditional boundaries is a big theme at IFSEC 2015 The security landscape is changing. Touring exhibitors on the first day of IFSEC International in London, it seems an increasing number of vendors are offering products that go beyond what may be termed "security," offering solutions for applications such as health and safety and data collection. They are also offering more smart technology with mobile phones and tablets, and are selling smarter by tailori...
Although in many cases CCTV has been an effective investigation tool, its full potential is not being realised It’s all very well installing CCTV cameras, but to be effective users have to know what to do to make images available to the police and courts, according to detective chief inspector Mick Neville of the Metropolitan Police. Although in many cases CCTV has been an effective investigation tool, its full potential is not being realised, says Neville, who is due t...
A retail banking tipping point is fast approaching with the state-side adoption of EMV technology Banking faces a challenge: to reconcile major security concerns with improving technology in order to reflect modern, mobile technology and the self-service solutions that customers have come to expect from their non-banking retail experiences. This is probably the number one issue I discuss with my bank clients. Banks need to make the technology in their branches more automated,...
This year's IFSEC International show in London will provide a reflection of the physical security industry's rapid growth, especially in the video sector, says one industry observer who is also a speaker at the show, coming up 16-18 June. “If we look at the overall trend, it is no surprise to anyone that IP is driving the growth and the future of the security business,” says Jim McHale, managing director of research company Memoori, and a speaker at IFSEC. Secur...
Security is a big concern for local government buildings, but there are measures that can make a difference Back in August of 2013, Rockne Warren Newell, armed with a rifle and a handgun, stormed a township meeting in the Ross Township Municipal Building in Saylorsburg, Pa. Witnesses say he fired through a wall into the meeting room and then burst into the room itself, guns blazing. Three people died, and two sustained wounds before citizens attending the meeting restrained hi...
Organizations are looking for ways to maximize resources and extract value from video security investment "There’s valuable information hiding within surveillance video. Extracting it can make a security department more efficient and provide a clear return on investment to their organization." - Dror Irani, CEO and President, BriefCam - The Video Synopsis company. Challenges Of Video Surveillance Video surveillance systems are a blessing to security. They are also a cu...
Managed and hosted services allow users access from a variety of connected devices It’s not about hardware anymore, although quality components are a must. Now, it’s about how technology performs. For the systems integrator, there’s also an opportunity to provide essential services to keep customers connected. As with many other businesses, the security industry is being “disrupted” and influenced by the cloud. Delivering outsourced security and...
The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data ne...
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic management of costs is especially important when considering video storage systems because storage accounts for such a large cost component of networked systems. Gartner’s Total Cost of Ownership (TCO) As enterprise products begin to dominate the video storage market, more attention needs to be addressed to Gar...
Browse expert commentaries
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises
Delta Scientific MP100 Portable Barricade Solution