Government & public services security applications - Expert commentary

Sanitization, Safety And Getting Back To Business

You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic imp...

How To Maximize Your Body Temperature Detection Systems

There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system.  The first thing you should ask is “does my firm have a certified thermographer?”. If not, the firm are at risk of getting a low quality system that is being resold to make...

The Increased Role Of Video Surveillance Technology In Our Changing Environment

Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fee...

The Growth Of The Mobile Access Card Market In 2020

The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that...

Optimizing Large-Scale Event Security and Operations with Intelligent Video Surveillance

Large event venues spend significant resources on physical security, and the vast majority invest in video surveillance systems as a way of monitoring public areas such as parking lots, garages and seating, as well as “backstage” areas such as loading docks and offices. Even though the camera footage is often preserved for investigating incidents, for the most part, video footage goes untapped because – realistically – security staff cannot constantly and efficiently moni...

The Critical Factor Of Specialization In Improving IoT, Video And Business Practices

When considering new IT solutions to support today’s modern security and IoT challenges, the number of options to choose from can make finding the tight solution a daunting task. One important factor to consider is whether a solution was actually designed to solve the problem at hand. For example, many storage systems support video ingest from surveillance cameras, but many are not specialized for that very purpose. Instead, video is simply a use-case for a product that was designed for...

Face Recognition: Privacy Concerns and Social Benefits

News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powe...

Managing Security During Unprecedented Times of Home Working

Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network acce...

VSaaS And ACaaS: New Horizons Or An Existential Threat To The Security Industry?

Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solu...

What Is Artificial Intelligence And Should You Be Using it?

Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What Is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or rep...

Transforming Workplace Safety With The Internet Of Things

From drone fleets and autonomous transportation systems to smart homes with computer-controlled lighting, heating, media and security systems, a new group of highly-automated technologies is gripping the popular imagination. These technologies – made possible by the Internet of Things (IoT) – form advanced ecosystems of interrelated devices with the capacity to monitor, detect, communicate and act on the real world independently of human intervention. Promising to fulfil all of our w...

AI Is Not A Security Cure-All, Says CEO Of Identity Automation

With the start of the 2020s, many security industry experts are reflecting on the emerging technologies over the past decade and looking forward to what is in store in the future. Artificial Intelligence (AI) is a buzzword that has infiltrated everyday nomenclature throughout the past decade. Every industry from healthcare, to banking, to security has implemented some form of AI that is touted as the hidden key to maximizing productivity and/or security. However, AI technology is still in its in...

How Can You Be Sure Your Organization Is Protected When It Comes To Cyberphysical Security?

At ISC West this year, emerging technologies will be on display to help organizations manage their environments, from the building itself to who’s on the premises and what’s going on at any given moment. Top of mind this year is cybersecurity, compliance and management of security assets as threats rise and governing bodies put regulations in place that businesses need to react to. The good news is that the shift in approach to holistic monitoring of cyber and physical assets can mov...

How A Leap Year May Impact Your Access Control System

Leap years occur every four years as a way to help synchronize the calendar year with the solar year, or how long it takes the Earth to orbit the sun. While this is necessary, leap years require our security systems to account for an extra day, apart from its normal schedule. As a result, leap years create problems with computing and can cause major issues to access control system functionality if a provider is not leap year compatible. There are a few things to keep in mind as we near February...

Embracing Digital Transformation In The Security Industry

Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and be...

How Custom Solutions Meet Customer Needs For Access Control

The software-based technology running today’s access control systems is ideal for creating custom solutions for very specific end-user needs. Those needs may vary from delaying bar patrons’ access to a shooting range to reducing the risk of diamond miners pocketing precious stones. The ability to tightly integrate with and control video, intrusion, and other equipment puts access control at the heart of enterprise security. Often, off-the-shelf access systems provide most of the fea...

New VMS Features Worth Your Time and Attention at ISC West 2020

ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020....

How ISC West Has Changed The Game In Security Over The Years

Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights&rdq...

Demand Increases For Specialist IT Skills Among Security System Integrators

How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make...

Working 12-hour shifts: The Silent Killer Of A Happy And Effective Workforce

Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving center to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the video surveillance operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitor...

Genetec's Top 3 Security Trends For 2020

It’s not just a new year, it’s a new decade. And somehow this makes it feel bigger. Almost like we’re moving faster or reaching farther. Technology is certainly advancing at an unprecedented pace. While there’s a lot to talk about, there are three big security trends that we think will continue to have a huge impact in the year to come. 1. What is artificial intelligence and is it going to take over? We’ve seen countless versions of artificial intelligence (AI) in...

Entrance Control Vs Access Control: Similarities And Differences

Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security....

AI-based Security Software Is The Answer To Vandalism And Theft Prevention

On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandal...

Stay Ahead Of 2020's Trends With This Cyber Security Guidance

It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead. 1. There will be more clarity for installers about industry-standard for cyber secur...

What Is The Dark Side Of IoT?

As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistic...

Blending Physical Security With Convenience Is No Simple Task

Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’.  The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall succes...

Home Monitoring At The Edge: Advanced Security In The Hands Of Consumers

Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabili...

2019’s Most Popular Expert Panel Roundtable Discussions

Look who’s talking about the top issues in the physical security industry in 2019. Our website’s Expert Panel Roundtable discussions in 2019 reflected some of the most timely and important topics in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2019 was about the year before – reviewing what caused disruptions in 2018. The second most popular was about 2019, the year ahead. Other hot topics that made the Top-10 list of roundtable discussions incl...

Our Top-10 Click-Worthy Articles in 2019 Highlighted Changing Industry Trends

The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world o...

Top Ten Security Industry Mergers and Acquisitions of 2019

Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A s...