Healthcare security applications - Expert commentary

Smart Home Access Control Growth And The Future Of Door Security

There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the repor...

What Is AI Face Search? Benefits Over Facial Recognition Systems

When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it...

Importance Of Establishing Security Standards For K12 Schools

As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards...

ONVIF Profile T And H.265: The Evolution Of Video Compression

In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an im...

How To Move From Crisis Response To Crisis Management

Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms...

Why Security Customers Should Buy Products And Services From SMBs

In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're like...

How Artificial Intelligence (AI) Is Changing Video Surveillance Today

There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The Need For AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of...

Five Cyber Security Threats Your Enterprise Must Address

By now your organization should know the drill. To keep your enterprise safe from unauthorized access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vu...

The Evolution Of Facial Recognition: From Bodycams To Video Surveillance

Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies arou...

How To Choose The Right Storage Card For Video Surveillance Systems

With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data...

Six Reasons Security Integrators Should Adopt Cloud Technology Today

As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...

Integrated Security Systems For Medium And Large-sized Offices

If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access...

Five Best Practices For Protecting Video Surveillance Systems Against Cyber Threats

There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...

How To Optimize Mobile Access Control Authentication With Smart Devices

Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...

Enhancing Video Surveillance Data Storage With Active Archive Solution

By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall vid...

Impact Of Data-driven Smart Cities On Video Surveillance

The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...

Applying Biometric Authentication To Physical Access Control Systems

Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...

Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...

Physical And Cyber Security Precautions When Traveling

Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats....

Video Analytics Trends: Security And Business Intelligence

In the physical security space, video analytics have historically over-promised and under-delivered, often leaving end users sceptical about their capabilities. However, increased integration with security solutions and other business systems, as well as developments in deep learning and artificial intelligence (AI), have given video analytics a significant boost in recent years. Here, we take a look at the key trends putting video analytics in the spotlight, and how this opens up new opportunit...

Mass Transit Security Evolves With Modern Security Solutions

As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveler safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundr...

Are Mobile Credentials More Secure Than Smart Cards?

For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, al...

Artificial Intelligence (AI) Applications For Cybersecurity Automation

Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so far, machine learning is more hype than helpful for cybersecurity, but that does not mean you can’t automate some tasks to keep your...

Robust Security For The Cannabis Market Supply Chain

It's no secret that one of the next market segments to see exceptional growth nationwide is somewhat non-traditional: cannabis. The global cannabis market is projected to reach $60 billion by 2024, according to Ameri Research, fueled by the increasing legalisation and decriminalisation across much of the United States. It is estimated that 22 million pounds of marijuana are grown each year in the United States, with 80 percent coming from California, Tennessee, Kentucky, Hawaii and Washington,...

Mass Security Screening Technology For Large Events

Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulne...

Radar Technology Provides An Alternative For Smart Home Security

In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the...

The Benefits And Challenges Of In-Camera Audio Analytics For Surveillance Solutions

Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many state...

Integration Of Surveillance And Video Management Solutions For Safer Cities

A deep native integration of Bosch cameras with software from ISS proactively catalyzes the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS Secu...

HD Over Coax Provides Cost-effective Video Surveillance Upgrade

According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analog, many end users looking for high definition (HD) video qualit...

Artificial Intelligence (AI) Trends In Physical Security Systems

If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of appli...