Healthcare security applications - Security beat

IFSEC 2017: Collaboration And Customer-centric Solutions Stand Out

With global events putting security at the forefront of everyone’s minds, IFSEC International 2017 was a chance for the industry to come out in force. Over 600 exhibitors and numerous seminars kept visitors informed on the latest innovations in security products, solutions and best practice. Despite the challenging heatwave, exhibitors were raring to go for the three mercifully air-conditioned days of the exhibition. SourceSecurity.com took to the show floor to check out what exhibitors we...

IFSEC 2017: Big Data And Artificial Intelligence More Than Buzzwords

A growing emphasis on the impact of data – storing it, analyzing it, and getting more value from it – was a common theme at this year’s IFSEC. Throughout the three days of the show at London’s ExCeL exhibition center last week, there were many conversations about the growing benefits of the data generated by today’s physical security systems. Industry embraces deep learning & artificial intelligence Video analytics increasingly critical Access control provi...

IFSEC 2017 Day 2: Exhibitors Shift Focus From Products To Solutions

Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several compani...

IFSEC 2017 Day 1: Trade Show Highlights Changing Security Needs In Europe

Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL center, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest inno...

ASIS International to be more transparent and inclusive in 2017

How do you make a 63-year-old organization even better? That’s the challenge for ASIS International as it continues an effort to be more transparent and inclusive, and to adapt to 21st century work environments. Transforming The Focus Of ASIS International “ASIS International is undergoing a tremendous amount of transition and reexamination, creating a lot of opportunities,” says Amy Fischer, Vice President of Marketing and Communications. There’s a new CEO and there h...

Diving Into AI And Deep Learning At NVIDIA’s San Jose Conference

A technology poised to transform the physical security market is deep learning, which is a neural network approach to machine learning, differentiated by an ability to train using large data sets for greater accuracy. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Phases Of Deep Learning I heard a lot about AI, including how it can transform the physical security marketplace, when I attended NVIDIA’s GPU Technology Conferenc...

Arecont Vision Project Registration Program Offers Liberal Discounts For Integrators

Project registration programs are a benefit manufacturers provide to systems integrators and security dealers who are bidding on an upcoming installation project. In effect, the integrator registers a project he or she is bidding on with a manufacturer, which offers pricing discounts to that integrator for that specific project. Such a program seeks to encourage an integrator to specify a manufacturer's products, while making it more difficult for a competing integrator to bid lower on a pr...

New 3D Printed Stealth Key Prevents Duplication

Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and informat...

Lively ISC West 2017 Addresses Industry Trends With Innovative Security Technologies

The enthusiasm of ISC West 2017 continued through to the final hours of Friday, reflective of a show jam-packed with new technologies to address industry trends. Exhibitors seemed happy enough with booth traffic, which held up even on the final day. Security Industry Trends Industry trends drove much of the technology. For example, cameras are getting less expensive, which means it’s more cost-effective to specify systems with higher camera counts. Also, cameras are providing more...

ISC West 2017 Day Two: Expanding The Value Of Video And Considering The Integrator

For all its value in the security market, one has to wonder: How much captured video is actually used for security? Among hours and hours of video, only brief segments here or there are ever actually viewed or used for security applications, such as to review an incident or to provide evidence in court. But what about all that other video, much of it stored for 30 or 90 or 120 days or longer? Does it have to be merely a costly consequence of providing the security benefits of video? Not necess...

New Security Technologies Driving Excitement On Busy ISC West Day One

ISC West in Las Vegas kicked off Wednesday with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of “the security industry.” Qognify QBlock And Cloudscann “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the...

ARA’s Asymmetric Sensor Approach Adds Focus To Perimeter Security

Using an asymmetric approach to perimeter security is more efficient and cost-effective. The approach, advocated by Applied Research Associates (ARA), involves strategic deployment of the company’s Pathfinder seismic-acoustic sensors. Asymmetric placement of the sensors is in contrast to typical perimeter security systems, which are linear: Sensors are distributed at specific intervals along a perimeter and require infrastructure to communicate back to a control center. Instead, asymmetr...