Healthcare security applications - Expert commentary

Moore’s Law Drives Future Security Industry Predictions

The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data ne...

Rethinking DIY: New Opportunities For Recurring Revenue

According IHS Technology, more than 11 million consumer and DIY network cameras will be shipped worldwide this year Perhaps we should start looking at do-it-yourself (DIY) systems such Google’s Nest and other devices as an opportunity for existing security contractors – those that are open-minded anyway – to bring in additional customers and new streams of recurring monthly revenue (RMR). DIY systems continue to proliferate in the marketplace and are availab...

The Role Of Storage In Video Surveillance Applications

Maricopa County installed a fully integrated security controls system, featuring a VMS Larger IP video systems require plenty of storage, and several high-profile applications help to demonstrate the value of storage in today’s networked video environment. Maricopa County Security Project One example is the Maricopa County (Ariz.) Sheriff’s Office, which is nationally recognized for its zero tolerance toward crime and unwavering focus on innovation in law enforce...

Insights From More Than Two Decades Of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Designing Security Systems: Project Management Techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

Growing access control adoption for residential and commercial security: key drivers

Access control growth is driven by several factors A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are helping drive the rapidly growing adoption of access control systems in both the residential and commercial security markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these contributing factors as Linear LLC looks towards the futur...

Optimizing Hospital Security With Physical Access And Identity Management Software

Centralized PIAM provides necessary security and operational reinforcement Similar to schools, airports and other semi-public facilities, hospitals and other healthcare facilities are grappling with the new reality that dictates stronger and more enforceable access restrictions. In these new circumstances, the need for security must be balanced with the individual’s need to easily move about the hospital by allowing medical staff, visitors or contract workers to go a...

Improving Security System Installations With Acceptance Testing

Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, in...

Fault Tolerant Access Control For Business Continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...

Redefining Access Control With NFC-enabled Smartphones

Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Furth...

Improving wide area surveillance with panoramic megapixel cameras

Panoramic view megapixel cameras simplify and lower overall video surveillance cost High definition megapixel cameras can cover larger areas with fewer surveillance cameras while delivering superior detail and improving overall security operations. This translates into lower security infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video surveillance systems with megapixel cameras while achieving better performance...

A Long-lasting Alliance Between System Integrators And Customers Promises To Be Favorable For Both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...