Government & public services security applications - Expert commentary

Biometric Security: Growth And Challenges In Fingerprint Technology And New Devices

Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years, the growth of biometric security technology has faced challenges of cost and pushback from users. Prices have been higher than more traditional technologies. In addition, users did not advocate storage of their personal biometric data by employers or the government. “I believe this is changing,” says Rueben Orr, CPP, vice preside...

Security Integrators Face Tough Competition In Smart Home Market

What does it take to be a success in the rapidly expanding home automation sector? For large and small security companies, making the jump from providing traditional security services to enabling the new Smart Home means dealing with competition. Security Firms v/s Cable And Telco Giants The market is filled with providers of all kind who want a piece of the action. In addition to security companies, cable and telco giants have all rolled out a home automation platform – usually on top o...

Securing Los Angeles From Criminal Activity Through Public-private Partnership

Today, the once crime-ridden area of Los Angeles is a flourishing shopping and tourist mecca Los Angeles struggled with a rising crime rate. Constant crime plagued the historic area with its well-known tourist attractions, which include TCL Chinese Theater and the Walk of Fame. Criminal activity ranged from major to minor, from felonies to prostitution, public drunkenness, trespassing, vandalism, theft and on and on. Time and budget constraints had forced local police officer...

Honeywell New Fire And Life Safety Solution Announcements

New notification appliances from Silent Knight provide code-required low-frequency output Just before the National Fire Protection Association’s (NFPA) World Safety Conference and Expo, June 22-25 in Chicago, Honeywell unveiled new solutions and features designed to boost life safety and provide more intuitive installations. S3 Series Control/Communicator A “virtual press conference” unveiling the announcements was kicked off by Beth Welch, manager of publi...

Assessing Cyber Security Risks And Vulnerabilities

Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...

GPS And RFID Tracking To Boost Integrator Revenue

Wi-Fi, real-time location tracking and security sensors are important elements of IoT solutions The tracking of people, processes and things continues to grow, and that’s good news for systems integrators, who can add these services to their arsenal of offerings and boost their levels of recurring monthly revenue (RMR). Real-Time Location Tracking Global Positioning Systems (GPS) and Radio Frequency Identification (RFID) are great ways to not only add security, but ope...

ESX Conference Connects Integrators, Manufacturers And Association Members

ESA opens the 2015 exhibit show floor with a ribbon cutting ceremony The Electronic Security Association (ESA) wrapped up ESX 2015, June 24 to 26 in Baltimore, Md., drawing integrators, manufacturers and association members from across the country to attend the annual educational, exhibits and networking event. Security Integration Companies Celebrating its eighth year, the show is jointly owned and sponsored by ESA and the Central Station Alarm Association (CSAA). ESX inclu...

The Challenge Of Keeping Contraband Out Of Prisons

The technological resources from the physical security sector available to prisons dealing with contraband threats are effective For those outside the security industry, the idea of prison contraband rarely extends beyond the old gag of a file inside a cake. In fact, contraband at prisons and other custodial premises is a major challenge: deterring and detecting it occupies many man-hours, and manufacturers devote much R&D activity to the problem. Contrabands In Prison T...

Day One At IFSEC 2015: Security And Beyond

Security beyond its traditional boundaries is a big theme at IFSEC 2015 The security landscape is changing. Touring exhibitors on the first day of IFSEC International in London, it seems an increasing number of vendors are offering products that go beyond what may be termed "security," offering solutions for applications such as health and safety and data collection. They are also offering more smart technology with mobile phones and tablets, and are selling smarter by tailori...

Moore’s Law Drives Future Security Industry Predictions

The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data ne...

Rethinking DIY: New Opportunities For Recurring Revenue

According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should start looking at do-it-yourself (DIY) systems such Google’s Nest and other devices as an opportunity for existing security contractors – those that are open-minded anyway – to bring in additional customers and new streams of recurring monthly revenue (RMR). DIY systems continue to proliferate in the marketplace and are availab...

The Role Of Storage In Video Surveillance Applications

Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa County Security Project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognized for its zero tolerance toward crime and unwavering focus on innovation in law enforce...

Insights From More Than Two Decades Of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Designing Security Systems: Project Management Techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

ASIS President outlines industry-changing trends for 2015

 “Winners” in 2015 will be multinational security solutions companies and recruiters for mid-to senior-level employment placement ASIS International 2014/2015 Review and Forecast: Spending on security systems was up in 2014: In general, it seems that there was an increase in capital projects for 2014. Two likely contributing factors are a slightly better economic outlook, and the previous capex holding patterns of many organizations wanting to move out of tha...

Growing access control adoption for residential and commercial security: key drivers

Access control growth is driven by several factors A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are helping drive the rapidly growing adoption of access control systems in both the residential and commercial security markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these contributing factors as Linear LLC looks towards the futur...

Improving Security System Installations With Acceptance Testing

Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, in...

Fault Tolerant Access Control For Business Continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...

Redefining Access Control With NFC-enabled Smartphones

Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Furth...

Improving wide area surveillance with panoramic megapixel cameras

Panoramic view megapixel cameras simplify and lower overall video surveillance cost High definition megapixel cameras can cover larger areas with fewer surveillance cameras while delivering superior detail and improving overall security operations. This translates into lower security infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video surveillance systems with megapixel cameras while achieving better performance...

A Long-lasting Alliance Between System Integrators And Customers Promises To Be Favorable For Both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...

Unifying Identity Management And Access Control

For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts...

Getting The Most Out Of Your Emergency Call Box Investment

Acquiring emergency phones is an effective way to improve security and safety Call boxes / emergency phones play a very important role in improving security. Not only are they important communication tools in the event of an emergency, but they can also serve as effective deterrents to crime or prevent security threats.  In this article, Sam Shanes, Chairman at Talk-A-Phone, gives five valuable tips to significantly enhance the capabilities of the call box / emergenc...

Biometrics Security Solutions- Everything You Need To Know

Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of...

IP Network Requirements For Video Surveillance/physical Security

IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world, c...

Managing Physical Security Systems & Information In A Multi-Building Campus

Multi-building campuses face unique problems in implementing a total physical security solution The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research faciliti...

Accurate And Cost-effective Outdoor Video Security

Technologies are now available that are specifically designed to accurately detectbreaches in a range of environments Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of n...

Security Guard Company Selection - A Checklist

The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services.  In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...

Power Supplies: Critical Component Of Security Solution Effectiveness

Security integrators prefer to standardizetheir choices of system components such as power supplues using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In th...

Video Systems: Delivering Value To Enterprise Business Intelligence

Video surveillance solutions can work alone to deliver intelligence or integrate with other business systems and optimize operations If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a...