Banking & Finance security applications - Expert commentary

What Will Changes To Data Privacy Legislation Mean For Security And Surveillance Companies?

In the UK there is a new data reform act working its way through the legislative process. As the law changes, the market changes – so this year will see many companies trying to read the tea leaves and adapt their offerings to take advantage of the emerging changes. The security marketplace is, apparently, constrained by the need for great privacy – it appears to be a zero-sum game – you can have privacy, or you can have security, you can’t have both. In the second half...

Finding The Right Integrator For Enterprise Organizations

Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally...

Talking Total Cost Of Ownership With True Cloud Video Surveillance

Integrators need to be well versed in Total Cost of Ownership (TCO), when discussing video surveillance options with their customers. Business leaders are looking for the best, most economical technology that will address their security needs, and they also want to avoid being blind-sided by unplanned technology operations and service costs. While most folks understand that the initial cost of a video surveillance system is not the same as the total cost of ownership, many might be surprised to...

The Right To Privacy In The Age Of Digital Eyes

Back in 1890, Samuel Warren and Louis Brandeis published a ground-breaking article in the Harvard Law review called ‘The Right to Privacy’. To this day, it is regarded as one of the most influential essays in the history of American law and is widely regarded as the first publication in the United States of America to advocate a right to privacy, articulating that right primarily as a ‘right to be let alone’. In this essay, the authors questioned whether the arrival of p...

Want The Benefits Of True Cloud: Look Beyond The Cloud Marketing

Many people, quite correctly, point to Salesforce.com—which launched in February of 2000—as the first example of cloud computing. In the years following, the term ‘cloud’ became so popular and was applied to so many products and service offerings, that it became almost meaningless. The result was cloud confusion in the business world and in the media. In one stark example from 2008, Oracle CEO Larry Ellison described news stories about cloud as, ‘complete gibberis...

OPINION: School Safety – It’s Time To Accelerate The Adoption Of Security Tech

We must leverage existing technologies like social media monitoring, gunshot and weapons detection, and real-time watchlist alerting. We owe it to our children. The recent news of the Dallas elementary school shooting absolutely gutted me. It’s a tragic and incomprehensible loss of life. A question I hear being asked again and again – could technology have made a difference? From my experience, modern technologies can help schools mitigate some of the damage and provide an early w...

True Cloud Video Surveillance: Do We Need Cloud Police?

Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing. The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning...

Illumio - Securing The Supply Chain Against Cyber Attacks

Trevor Dearing, the EMEA Director of Critical Infrastructure Solutions at Illumio, said “It is encouraging to see NIST releasing updated guidance acknowledging the increase in cyber-attacks targeting the supply chain and the consequent necessity to bolster the supply chain’s cyber security. We can no longer turn a blind eye to the exponential increase in attacks on the IT systems of manufacturers, logistics companies and organizations, which ultimately target the operational part of...

What Physical Specifications Play A Role In Integrating Card Reader

One key aspect of hardware design is choosing an appropriate form factor for your product. In today's world, form factor not only defines your product's size and shape but also includes its aesthetic appeal. While size and shape are important, another aspect that is prominent when dealing with RFID card readers (including NFC and BLE mobile credential readers) is the reader's location within the end device and the size of the RF antenna. This article focuses on some key considerations relating...

Eleven Considerations For Embedded System RFID Readers

Today, RFID readers can be found in numerous devices requiring user authentication, authorization and access control, from doors to multi-function printers to point of sale terminals to computers and more. RFID is a simple, secure and convenient access control solution for end users and original equipment manufacturers. RFID readers/writers come with a broad range of form factors, capabilities and configurations. Choosing the right RFID reader When choosing a reader to embed into a system or d...

‘Your Data, Your Choice’: Why Identity Management Is A Vital Cybersecurity Strategy

Every day, millions of people worldwide use their personal credentials to prove their identity and access a range of services, from databases in their workplace to the banking app on their smartphone. But while this ensures only authorized people have access to certain systems, the use of this personal data opens users up to cyber risks, primarily in the form of identity theft. On Identity Management Day, Source Security spoke to seven IT and cybersecurity experts to discuss their experiences a...

Creating A Balanced Co-Existence Between Privacy And Security

Most individuals have strong opinions about what is more essential to our civilization: personal privacy or security. After more than a decade of technology enabling greater and greater amounts of Personally Identifiable Information (PII) and data harvesting, now the pendulum is swinging towards a society that places more emphasis on individual rights and privacies. This shift is manifesting in a variety of ways, quickly changing the technology, security and cyber security landscapes, and requi...

ACaaS — The Future Of Access Control Systems

Software as a Service (SaaS) provides computer equipment, OS, and software customized to the user’s purposes as a service. Access control can work in the same way. If you work in the physical security industry, especially concerning access control, you have probably heard about the term ‘ACaaS’ recently. ACaaS is a combination of ‘access control’ and ‘SaaS’ (Software as a Service). From a semantic point of view, ACaaS means providing cloud-based access c...

New Physical Security Tools, Information Overload, And The Big Picture For Corporate Teams

Technology continues to transform the physical security industry, helping companies become more aware of the full spectrum of risks their organization faces. Our new survey provides strong evidence that the use of these tools is solving some problems, but their implementation may create new challenges. In our 2022 State of Protective Intelligence Report, 93% of respondents said their company was actively adopting new threat intelligence, monitoring and alerting solutions for physical security,...

Why Dual Factor Sensors Are Essential For Accurate Gunshot Detection

Most of the assumptions you’ve made about gunshot detection could be wrong. To those security professionals who stay on top of their homework, this is probably not true, but the ‘you’ in this context is directed to the collective security industry reader that, when looking into indoor gunshot detection products, sees terms like concussive force, percussion, or shockwave and wonders if these are important differentiators – or something the marketing department decided woul...

Vascular Recognition Technology: The Next Biometric Security Standard

This is an era of digital revolution and with it comes dozens of new security dangers. Every gadget, from our smartphones to our security cameras, need some kind of protection from external hacking. However, how can we assure the safety of our devices, workplaces, etc.? Biometric security is one such security method that has emerged, since it is both efficient and perceived foolproof. It offers an additional layer of security for businesses and personal security systems. Biometric security syste...

Oosto Offers 10 Reasons To Switch To Frictionless Access Control In Commercial Buildings

Access control for buildings is nothing new. Early forms of security access for business security systems were introduced in the 1960s, as business owners and managers looked for alternatives to keys, as a result of needing to frequently replace them, when there was a change in personnel. It’s only in recent years that the urgency to implement smarter, more efficient, and convenient forms of access control has increased, in the context of public and private sector digital transformation....

The Future Of Fingerprint Biometrics

Fingerprint biometrics is hugely relevant in the current landscape. Even amidst other newer developments, fingerprint authentication provides convenience and affordability. There are talks rife about how the coronavirus pandemic has changed the outlook towards fingerprint biometrics. What is currently the most used authentication technology is being speculated to be unsafe, when compared to other touchless biometrics and that its usage in the future would decrease significantly. However, the adv...

The Role Of Private Security In A Hybrid Working World

COVID-19 has undoubtedly impacted all industries, leaving its mark for years to come. Multiple lockdowns forced businesses across multiple sectors to reassess the way they worked, with many adapting to working from home due to the various stay-at-home orders. Data from a 2021 ONS survey revealed that 25.7 percent of the UK workforce, or 8.4 million people, worked from home during the pandemic, more than doubling the 2019 figure of 12.4 percent. A further nine million people were placed on furlo...

How Security Pros Can Leverage Clients’ Trust Into Bigger Jobs And New Revenue Streams

Business owners know the security of their properties is one of their most important daily concerns, and that leads many of them to work with professional security integrators who can design and deliver robust systems that provide protection and peace-of-mind through modern technologies and services. That’s why security integrators, by their very nature, have an invaluable tool that can be leveraged into bigger jobs: clients’ trust. As highly-trusted partners with extensive experien...

Identity And Access Management In 2022 - What Will The Future Look Like?

As we enter into 2022, there is still a level of uncertainty in place. It’s unclear what the future holds, as companies around the world still contend with the COVID-19 pandemic. Remote working has been encouraged by most organizations and the move to a hybrid working system has become ‘business as usual’, for the majority of businesses. Some have reduced their office space or done away with their locations altogether. Following best security practices With all this change in...

Ensuring Connectivity 24 Hours A Day, Every Day Of The Year, For Your IoT Security Devices

There is no denying that the COVID-19 pandemic has radically changed the way we work. In May 2021, 31% of the countries workforce was still working remotely, with 71% of businesses in professional, scientific, and technical industries remote-working. Work patterns shifting Although the conversation often focuses on office workers, the COVID-19 pandemic has impacted the way many other, non-office sectors operate. In the security industry, since the introduction of lockdowns and social distancin...

Supply And Demand: The Ways Cloud Supports A Stronger Supply Chain

Cloud-based applications and platforms revolutionize supply chain management, helping stakeholders scale operations from small businesses to complex enterprises. Cloud supply chain solutions are showing significant increases in implementation – so much so the sheer number of organizations with a cloud solution outpace or far outnumbers the ones that don't. But there is one area that has still not made the switch to the cloud, most often the security department. But the advent of using vid...

IP Video - Simply Modular And Modern

They say nothing stays the same for long, and this has never been truer than in today’s world of technology and innovation. The 21st century has seen rapid changes and every day brings a new update in one of the many segments of technology. Technology is evolving at such a rapid rate, due to a phenomenon dubbed accelerating change. Each new improvement is now a stepping stone, enabling stronger and better generations of technology, at faster speeds. Accelerating change evolving across all...

Why Cellular Connectivity Is The Smart Choice For CCTV Deployments

Businesses large and small rely on their CCTV systems to deter intruders and provide recorded evidence of security incidents. Overtime, CCTV has evolved to offer real-time intrusion detection and monitoring, and businesses now expect easy, secure and anytime access to cameras, and data. For that, they need connected CCTV systems. These modern installations can benefit from cellular connectivity, helping businesses protect their sites, while also supporting enhanced capabilities for CCTV to deliv...

Fix Up Look Sharp

Metal theft is nothing new, but the impact of the pandemic has left many in financial uncertainty, couple this with the rising price of metal, and one result is an increase in the level of acquisitive crime. It seems there is no limit to the types of materials stolen. Just recently, lead stolen from church roofs has caught the media’s attention again, but this type of theft reaches to more commonplace materials too, including steel, cast iron, and aluminum, and even items like street sign...

‘We Want To Become Better Known For Access Control’ - Q&A With Bosch Building Technologies’ Gregor Schlechtriem

Gregor Schlechtriem has worked in the access control market for over 20 years and is now responsible for the Access & Intrusion Business Unit at Bosch Building Technologies. In this interview, the expert talks about key industry trends, the impact of the COVID-19 (Coronavirus) pandemic, technical innovations and his company’s strategy. Mr. Schlechtriem, you have many years of experience in the security technology market. What is your background and what are your responsibilities as Se...

Insider Threats Are On The Rise – Even In The Virtual Workplace

More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organization, are posing a major security problem for businesses. This is pa...

How AI And Security Guards Work Together Using Video Analytics

How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilize. How can video analytics he...

Protect Physical Assets From Cyber-Attacks

Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognize an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage...