Government & public services security applications - Expert commentary
Biometrics is most useful as an additional level of authentication — determining that you are who you say you are Over the years, the growth of biometric security technology has faced challenges of cost and pushback from users. Prices have been higher than more traditional technologies. In addition, users did not advocate storage of their personal biometric data by employers or the government. “I believe this is changing,” says Rueben Orr, CPP, vice preside...
What does it take to be a success in the rapidly expanding home automation sector? For large and small security companies, making the jump from providing traditional security services to enabling the new Smart Home means dealing with competition. Security Firms v/s Cable And Telco Giants The market is filled with providers of all kind who want a piece of the action. In addition to security companies, cable and telco giants have all rolled out a home automation platform – usually on top o...
Today, the once crime-ridden area of Los Angeles is a flourishing shopping and tourist mecca Los Angeles struggled with a rising crime rate. Constant crime plagued the historic area with its well-known tourist attractions, which include TCL Chinese Theater and the Walk of Fame. Criminal activity ranged from major to minor, from felonies to prostitution, public drunkenness, trespassing, vandalism, theft and on and on. Time and budget constraints had forced local police officer...
New notification appliances from Silent Knight provide code-required low-frequency output Just before the National Fire Protection Association’s (NFPA) World Safety Conference and Expo, June 22-25 in Chicago, Honeywell unveiled new solutions and features designed to boost life safety and provide more intuitive installations. S3 Series Control/Communicator A “virtual press conference” unveiling the announcements was kicked off by Beth Welch, manager of publi...
Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...
Wi-Fi, real-time location tracking and security sensors are important elements of IoT solutions The tracking of people, processes and things continues to grow, and that’s good news for systems integrators, who can add these services to their arsenal of offerings and boost their levels of recurring monthly revenue (RMR). Real-Time Location Tracking Global Positioning Systems (GPS) and Radio Frequency Identification (RFID) are great ways to not only add security, but ope...
ESA opens the 2015 exhibit show floor with a ribbon cutting ceremony The Electronic Security Association (ESA) wrapped up ESX 2015, June 24 to 26 in Baltimore, Md., drawing integrators, manufacturers and association members from across the country to attend the annual educational, exhibits and networking event. Security Integration Companies Celebrating its eighth year, the show is jointly owned and sponsored by ESA and the Central Station Alarm Association (CSAA). ESX inclu...
The technological resources from the physical security sector available to prisons dealing with contraband threats are effective For those outside the security industry, the idea of prison contraband rarely extends beyond the old gag of a file inside a cake. In fact, contraband at prisons and other custodial premises is a major challenge: deterring and detecting it occupies many man-hours, and manufacturers devote much R&D activity to the problem. Contrabands In Prison T...
Security beyond its traditional boundaries is a big theme at IFSEC 2015 The security landscape is changing. Touring exhibitors on the first day of IFSEC International in London, it seems an increasing number of vendors are offering products that go beyond what may be termed "security," offering solutions for applications such as health and safety and data collection. They are also offering more smart technology with mobile phones and tablets, and are selling smarter by tailori...
The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data ne...
According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should start looking at do-it-yourself (DIY) systems such Google’s Nest and other devices as an opportunity for existing security contractors – those that are open-minded anyway – to bring in additional customers and new streams of recurring monthly revenue (RMR). DIY systems continue to proliferate in the marketplace and are availab...
Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa County Security Project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognized for its zero tolerance toward crime and unwavering focus on innovation in law enforce...
Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...
Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...
“Winners” in 2015 will be multinational security solutions companies and recruiters for mid-to senior-level employment placement ASIS International 2014/2015 Review and Forecast: Spending on security systems was up in 2014: In general, it seems that there was an increase in capital projects for 2014. Two likely contributing factors are a slightly better economic outlook, and the previous capex holding patterns of many organizations wanting to move out of tha...
Access control growth is driven by several factors A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are helping drive the rapidly growing adoption of access control systems in both the residential and commercial security markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these contributing factors as Linear LLC looks towards the futur...
Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, in...
The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...
Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device. Furth...
Panoramic view megapixel cameras simplify and lower overall video surveillance cost High definition megapixel cameras can cover larger areas with fewer surveillance cameras while delivering superior detail and improving overall security operations. This translates into lower security infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video surveillance systems with megapixel cameras while achieving better performance...
Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...
For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts...
Acquiring emergency phones is an effective way to improve security and safety Call boxes / emergency phones play a very important role in improving security. Not only are they important communication tools in the event of an emergency, but they can also serve as effective deterrents to crime or prevent security threats. In this article, Sam Shanes, Chairman at Talk-A-Phone, gives five valuable tips to significantly enhance the capabilities of the call box / emergenc...
Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of...
IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world, c...
Multi-building campuses face unique problems in implementing a total physical security solution The requirements of a physical security solution for a multi-building campus are quite different from those for the security of a single building. Gadi Piran, President of OnSSi, lists the immense potential and benefits of implementing an integrated security solution and the key characteristics of an effective solution. Multi-building campuses such as universities, research faciliti...
Technologies are now available that are specifically designed to accurately detectbreaches in a range of environments Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of n...
The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services. In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...
Security integrators prefer to standardizetheir choices of system components such as power supplues using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In th...
Video surveillance solutions can work alone to deliver intelligence or integrate with other business systems and optimize operations If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a...