Technology & Trends - Intruder Alarms

Making Security Easier For Integrators To Spec, Install And Program

Easy does it is the watchword of the day, as industry suppliers make their products more intuitive A common theme emerging from physical security manufacturers is a focus on making installation, setup and integration as easy as possible for the installer. With technology moving at break-neck speeds and the Internet of Things promising seamless device connectivity, manufacturing are doing their best to help systems integrators succeed. Of course, the manufacturer benefits...

How SIP-enabled Intercoms Open Up Communication With Security Departments

The trend towards greater unification is facilitated by an all-encompassing shift to IP technologies As more organizations are looking for ways to maximize resources and increase operational efficiencies, unification of multiple security and business systems is gaining popularity. From the central command center, there is significant time lost when operators have to jump from video surveillance to access control systems to analyze an incident and take appropriate measures. Eve...

Despite Benefit Of More Efficient 911 Responses, ASAP-to-PSAP Implementation Lags

ASAP-to-PSAP technology automates communications between alarm monitoring companies & PSAPs and dispatches emergency service In April 2015, Cary, N.C., adopted a technology called Automated Secure Alarm Protocol to Public Safety Answering Point (ASAP-to-PSAP), but currently they are among only a handful of emergency 911 call response locales that use ASAP-to-PSAP technology in the United States. Commander Scott Edson of the Los Angeles County Sheriff’s Department, sp...

Technology Contributes To Holistic Security Approach At K-12 Schools

Honeywell recently helped the Penns Valley Area School district in Pennsylvania design and implement a custom security system Security systems are just part of the solution to protecting K-12 schools. Technology can contribute to a broader, holistic approach to security that is customized to meet the needs of each educational institution. Honeywell has helped many schools customize security systems to meet each school’s unique needs, says Bruce Montgomery, Business Deve...

Security Needs Persist Despite Budget Challenges Of K-12 Education Market

Beyond the need to install new systems, often overlooked is how schools are going to pay for security upgrades Limited financial resources are a common pain point for K-12 schools looking to implement cutting-edge security technology. But security needs persist despite scarce resources. All school administrators want to do everything in their power to secure their facilities against threats. More schools are recognizing the benefits and, in some cases, requirement of upgradin...

Integrity Matters For Business Success, Not Gender, Says Chicago-based Integrator

Wong was the first Asian woman to obtain the Alarm Contractor License Mun C. Wong, PSP and president of VinTech Systems Inc. in Chicago, is a successful entrepreneur who has brought new technologies and a knack for superior service to her integration business.  In fact, at the age of 29, she was the first Asian woman to obtain the Alarm Contractor License from the State of Illinois and its Department of Financial and Professional Regulation. But she doesn't focus on gend...

Wireless Fire Technology Offers New Installation Opportunities At ISC West

SWIFT is a wireless fire detector line offered by Honeywell Fire Systems Honeywell Fire Systems, Northford, Conn., continues to enhance its line of wireless fire detectors, announcing new updates to its Fire-Lite® Alarms Smart Wireless Integrated Fire Technology (SWIFT™) at ISC West 2015 in Las Vegas. The SWIFT line of wireless fire alarm detectors and modules – which includes smoke, heat and pull stations – integrate with new and existing Fire-Lite...

Education-centric PSA-TEC 2015 Show To Focus On Integrators And Installers

It’s that time of year: show season! And for systems integrators and security installers, PSA-TEC is one of the quintessential annual conferences, offering hundreds of hours of education and training during the May 4-8 show (exhibits are May 6). Hotel registration at the Westin in Westminster, Colo., is due on or before April 16. PSA Security Network was established in 1974 as the Professional Security Alliance, Inc. dba PSA Security Network and is now the world’s largest electronic...

Illinois Association Works To Quell Proposed Fire Alarm Legislation

Anyone who questions the value of participation in local and national burglar and fire alarm associations need only look at the ongoing activities of the Illinois Electronic Security Association (IESA) to validate the reason for membership. Just last week IESA members and lobbyists traveled downstate to Springfield to show support and testify against two new bills, up for debate in a senate committee hearing, that would ultimately prove harmful and create a competitive disadvantage for licensed...

Impact Of School Shootings On Demand For Security Systems

School administrators are now choosing products that make the biggest, long-term impact on campus security Well-publicised events such as the U.S. school shootings at Columbine and Sandy Hook lead to an increased demand of security equipment to protect kindergarten through 12th grade (K-12) education campuses. But do they also result in buying decisions made on impulse that don’t necessarily meet a school’s most pressing security needs? Increase In Demand For Secu...

Insights From More Than Two Decades Of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Addressing False Alarms In Video Analytics

Improvements in the technology have lowered – but not eliminated – concerns about false alarms False alarms have plagued the video analytics market since the beginning. Improvements in the technology have lowered – but not eliminated – concerns about false alarms. Companies providing video analytics systems say the question isn’t whether false alarms can be eliminated, but rather how they can be managed. “We’re still very far away fro...

Is Home Automation Driving A Security Renaissance?

According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...

Security’s New Job - Managing Supply Chain Risks

Supply chain risk management involves identifying and dealing with supply chain uncertainties that pose a threat to business continuity Today’s complex world needs risk managers, business people that think about the bad things that might happen and lay plans to eliminate or at least mitigate those risks. This article explains the need to identify and respond to risks involved in a supply chain. Manufacturers should make efforts and develop strategies to enhance supply ch...

Key To IoT (Internet Of Things) Success: Scalable Computing Platforms

A true IoT platform is the confluence of Internet, business and sensory data The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on data-center resources and accumulating at a rate faster than anyone can process. Is the proliferation of sensory data simply evidence of an increasingly intrusive world, or can IoT be used for the improvement and development of intelligence-equipped cities...

When security breaks down, organizational resilience steps in

Organizational resilience takes all appropriate actions to help ensure the organization’s continued viability In this day and age, the traditional components of security officers, cameras, access control and alarm systems aren’t enough to protect a company or organization. No matter how good your preparations, security sometimes breaks down, and bad things happen. That can take a toll on a business. Today, security’s role extends to organizational resilience...

Security Identity Crisis: What’s In A Name?

Whether you are a contractor, installer, dealer or systems integrator depends on where you live and how you are perceived by the real world Because I have been in the industry for a considerable amount of time, I have seen quite a few changes, albeit the bulk have come over the last five or so years. Before that, the advent of the digital dialer was our big innovation – that tells anyone with any history in the industry just how far back I go! But today, change is fast a...

Multiple High-value Markets Are Embracing Video Analytics

The aviation and transportation industries are using video analytics to provide operational cost savings and performance enhancement Video analytics are now increasingly being used for the critical infrastructure, airports, transportation and city surveillance sectors, among other high-value markets. These markets need robust video analytics solutions that can be integrated into an overall security solution to deliver totally reliable results without any significant level of n...

Camera Apps Usher In A New Era In Surveillance System Design

Camera apps ensure that surveillance systems meet specific needs, provide compliance, and deliver enhanced versatility Of the many benefits offered by new and advanced IP video surveillance cameras, the ability to easily customize these devices with third party apps has the potential to change the landscape in video surveillance system design and implementation. By providing the ability to customize individual cameras with the specific functionality desired for every specific...

Researching Security Trends

Research report from ASIS Foundation and University of Phoenix declared that cyber-security would rank as top security risk for next five years Check out the research available from the ASIS Foundation. It is proving to be right on the button.When the Guardians of Peace hacked Sony Pictures Entertainment late in 2014, they crashed the studio’s email, leaked films and scattered personnel data across the Internet.  By mid-December, four class-action lawsuits had hit...

How To Succeed At Security Outsourcing

To succeed at outsourcing, the relationship between the organization and the outsourcing company has to be an equal partnership Can you save money on security by outsourcing? Maybe, maybe not, according to William J. Powers III, CIPM II, CIPI. “Considering the way I approach outsourcing, I’m not sure if it saves money,” says Powers. As director of facilities at the Sterling and Francine Clark Art Institute in Williamstown, Mass., Powers oversees facilities,...

IP Solutions Provide Multiple Layers Of Access Control At Transit Hubs

Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to ma...

Dealer/Integrators Face Obstacles In The Transportation Sector, But It’s Worth It

The security landscape continues to evolve in new, complex ways for transportation customers Dealers looking to enter – or to expand their presence in – the transportation vertical must adapt to the unique needs of each transportation agency customer. Issues such as limited budgets/resources, aging technologies, operational challenges and safety issues must all be considered when designing a system to best meet an agency’s needs. Integrators should seek to...

It Takes A Security Village To End Deception

Unscrupulous companies reversing positive steps made by security industry to remove stigma of being known as "trunk slammers" ABC news report reaffirms need for industry action For the businesses that make up the electronic security industry, it’s an issue that undermines all the progress we have made to date. It’s deceptive door-to-door sales tactics, and it’s still having an impact on the alarm industry. It affects the entire industry – from large na...

A Pivotal Year For Security Dealers: More Changes In Store For 2015

Reinvention of go-to-market models proves integration business is place to be Suffice it to say 2014 was a pivotal year for the majority of alarm dealers and installers. Many have had to change their way of thinking and their method of doing business, while adapting to ever-changing technology. But those who continue to reinvent their go-to-market model prove that the integration business is the place to be – and there’s money to be made, albeit it not in simply...

Open Standards And The Digital Technology Revolution

Access control and alarm worlds are going digital and plugging into the network Open tech standards are integrating diverse security technology systems — and security people — into the corporate mainstream The digital technology revolution has begun to course through the public and private worlds of government and commerce, replacing old analog technology. Chief among the many benefits of digital over analog is the ability to integrate diverse technologies into si...

Cannabis And Security: Technology Solutions Provide Protection For Emerging Legalized Marijuana Industry

The growing market for legal marijuana (now available in some form in 24 states) has also generated a demand for security products and service to protect the industry from illegal activities. “For the most part, companies are looking for what we call the traditional surveillance systems whereby you have visible deterrence,” says Monty Henry, president of DPL-Surveillance-Equipment.com LLC in Ventura, Calif. Many companies are seeking more sophisticated systems t...

Marshall Marinace: At The Helm Of The Electronic Security Association

Marshall Marinace is on a mission - to continue to infuse value into ESA If you haven’t met Marshall Marinace, you probably will soon. He’s the new President of the Electronic Security Association (ESA), and he’s instantly likeable. He’s a homespun security dealer with decades of service who knows that the new world of systems integration requires change and involvement of every member at the association level. Marinace was sworn in as the 41st Preside...

Meet Dave Tyson - ASIS 2015 President

Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...

Strategically Expanding Security’s Role In The Enterprise

Organizations are looking to emerging technologies to enhance security and communications Verint 2014/2015 Review and Forecast: The overall economy was solid in 2014, with large regions and industries continuing to grow and emerging markets revealing even greater opportunity. We are seeing emerging signs of strength in industries like Higher Education that are expanding their security horizons, or taking note of global events. Additionally, security organizations continue to...

Related videos

CLIQ Connect

DNAKE Access Control Terminals: Minimalist Design, Maximum Security!

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems