Hotels, leisure & entertainment security applications - Expert commentary

IFSEC Day 1: H.265, Apps And Cybersecurity Shine Through Other Security Innovations

H.265 compression, apps and the inherent security of security systems were some of the themes to be gleaned on the first day of IFSEC International. Almost every video exhibitor I saw on day one of the show mentioned that many of their products use H.265 compression in these days of high definition, bandwidth-hungry cameras. Over at Vivotek’s stand, for example, Emilio Sanchez, project consultant, spoke of the company’s H.265 Smart Stream compression algorithm. He said this saves an...

Gunfire Detection Technologies For Hospitals, Retail And Office Buildings

The unfortunate reality in today’s world is that everyday places in our communities that were once thought of as safe – hospitals, schools, shopping malls and office buildings – are now places where people are at an increased risk for being injured by gun violence. Increase In Gun Violence Shocking incidents of active shootings have become all too common where we work, learn, relax and recuperate.  In the wake of the Orlando Pulse shooting, it’s hard to forget that...

SourceSecurity.com Technology Report - HDCVI 3.0: Re-Empowering The Analog Coax Infrastructure For Intelligent UHD Video

What's The Technology Report About? This SourceSecurity.com Technology Report will describe one of those analog HD-over-coax technologies, HDCVI 3.0 by Dahua, which is poised to have a dramatic impact on the video market in the next several years. New capabilities of HDCVI 3.0 include broad compatibility with a range of other (even competing) technologies; higher resolutions including Ultra HD (UHD) or 4K; and intelligent functions comparable to those available in IP...

Frank Cannon To Educate IFSEC Attendees On Employee Security Awareness Program

A security awareness program is an educational process to help employees observe events or people through a “security lens” Organizations have a duty of care to protect their employees wherever they work. But in the increasingly complex world that we all live in, the ability to deliver a risk-commensurate and cost-efficient security program that adds real value to a business is extremely challenging, according to IFSEC International 2016 speaker Frank Cannon....

Impact Of Convergence Of Internet Of Things And Physical Security On VMS Offerings

IPVideo Corporation, Bay Shore, New York, recently announced a new OEM agreement with Milestone Systems Inc., Beaverton, Oregon, in an effort to provide deeper and wider options in its portfolio of video management solutions. According to Steve Rice, Director of Business Development, the partnership will allow the company to reach a broader number of enterprise customers and provide them with distinct choices – and two completely different video management system (VMS) offerings. On the t...

Nextchip Disrupts Analog Surveillance Market With HD Technology Amidst Growing IP Trend

Some companies, like Nextchip, have continued to develop technology foranalog solutions despite the IP trend The growing sales of IP-based solutions in the surveillance market is a well-discussed topic. Security companies are rushing to grab a slice of this lucrative pie. However, at the same time, analog surveillance systems have continued to retain their appeal for many end users. Aware of this demand, some companies have continued to develop technology for analog solutions...

Non-Invasive Security Strategies For Soft Targets Such As Theaters And Other Public Facilities

A public facility with too much security or the wrong kind of security can discourage the public from visiting (Photo credit: Steve Williams Photography) The lethal November 2015 terrorist attacks against several soft targets in Paris have inspired changes in security at facilities considered soft targets across the United States and around the world. Today’s security directors well understand that “it can happen here.” To be clear, it probably won’t....

Leading The Way To A Safer Digital World - Hikvision Presents Cybersecurity Best Practices To Curb Online Criminals

Hikvision website’s “Security Center” provides cybersecurity informationand tools for integrators and end users The time is now to address the impact of cybersecurity threats on the IP video market. In the case of video surveillance systems, the main motives of cyber-attackers are usually to either cover up video evidence of crimes or to gain access to video that should be private. “The use of video surveillance is growing across North America, not j...

A Brief History Of ONVIF: How The Global Industry Standard Has Grown

ONVIF's 1.0 Core Specification debuted in 2008 at Security Essen The adoption of the ONVIF protocol by manufacturers continues to grow. Last year, the number of member companies in the ONVIF forum exceeded 500 and more than 5,000 products are currently certified on the ONVIF website. How did ONVIF achieve this amazing result and experience this wild adoption? More than a decade ago, every manufacturer was defining their own protocols and pushing for Video Management Software...

End-To-End Solutions Are A Dead End: The Road To The Future Is OPEN

The landscape for end-to-end solutions is not designed to address thelong-term evolving needs of customers The video surveillance industry has reached an important crossroads where manufacturers can choose to continue in one direction that solely focuses on their own products and profits, or to move forward in another direction that emphasises building partnerships for the greater good of the community. On one side lies the short road of end-to-end, proprietary solutions fro...

Resources For Helping Physical Security Professionals With Cybersecurity

There are resources to help guide an organization’s management of cybersecurity risks, most prominently from the National Institute of Standards and Technology (NIST) and the U.S. Department of Homeland Security. NIST defines cybersecurity as "the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.&rdquo...

Avoiding The Cybersecurity Risks Of Cloud-Based Security Solutions

Cloud connectivity can provide a linkage between the mobile users and the facilities and systems they want to interact with From enterprise applications to small businesses, schools, health care facilities and beyond, investments in physical security systems provide valuable resources to help protect people, property and assets – and ultimately the financial security and well-being of the organization. As need and demand for better security has dramatically increased ove...

Why Surveillance Professionals Find H.265 Video Compression So Appealing

Though primarily developed for consumer electronic devices, the advantages ofH.265 compression technology make it ideal for the world of physical security Ever since digital video systems were introduced the race was on to develop compression technologies to reduce runaway bandwidth and storage consumption. We’ve watched the industry roll out MJPEG, MPEG and H.264 advanced compression standards in direct response to each innovation. With adoption of HDTV and 4K solutions...

Lost For Words? Automated Lip Reading Technology Deciphers Speech In Silent CCTV Images

Automated CCTV lip reading is challenging due to low frames rates and smallimages, but the University of East Anglia is pushing the next stage of this technology Scientists at the University of East Anglia in Norwich, England, are working on the next stage of automated lip reading technology that could be used for deciphering speech from video surveillance footage. The visual speech recognition technology, created by Dr. Helen Bear and Professor Richard Harvey of UEA’s...

SourceSecurity.com Technology Report - Meeting The Cybersecurity Challenge Of IP Video Systems

What's the Technology Report about? This SourceSecurity.com Technology Report will look at how cybersecurity risks of video surveillance systems can be minimized, and highlight the role manufacturers, installers/integrators and end users should play to make IP video systems as safe from cyber-attack as humanly possible. Manufacturers, in particular, are stepping up to drive the industry’s efforts, and Hikvision USA is a leader in educating the market to address...

Next Generation PSIM Solutions Widen Scope For Traditional Command And Control Systems

 PSIM systems extend their value beyond emergencies by including routinemanagement tools, that provide value during daily operations, such as automatingmaintenance activities Physical Security Information Management (PSIM), an acronym termed to describe a family of software platforms that claim to replace traditional command and control (C&C) systems, primarily used to provide situation awareness in control and monitoring centers of Critical Facilities. Traditional C...

Pelco By Schneider Electric CEO Sharad Shekhar To Revive Pelco Global Video Security Business

Joining Pelco in late 2015, Sharad Shekhar is responsible for the entire global video business and is leading the charge to reinvigorate the Pelco brand with system integrators Back in the day, you literally couldn’t speak with a security company about a video surveillance project without the Pelco name coming up. It had a loyal following and an extremely large installation base. Over the years, that changed and the fervour with which integrators referred to the brand se...

Surveillance Industry’s Higher-Megapixel Migration Impacts Processing Power, Bandwidth Consumption And Storage

From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilization The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...

Manned Guarding Equipped With Latest Technology Improves Security And Threat Detection

Technology solutions enhance and make manned guarding moreeffective and efficient the quickest way Most companies believe manned guards can help mitigate disturbances and neutralize situations, while at the same time reducing the chance of criminal activities and/or accidents occurring. However, people cannot be omnipresent or always be in the right place at the right time. When combining manned guards with the power of today’s technology, the results are unmatched. Dev...

Modern Mass Notification Systems Adapt To Evolving Technological Innovations

If anyone tells you that the use of Mass Notification Systems (MNS) is a new trend, it is likely that they do not fully understand it. You have been impacted by mass notification your whole life. Surprised? Every time there is a fire drill at an elementary school, or a bell chimes noon or a blinking light announces a snow-related parking ban, an MNS is being deployed. Ultimately, mass notification is just mass communications. What has changed is the distribution methodology, the granularity and...

Developing Effective Security Applications For The Operational Technology Environment

Many operators don’t know what’s actually transpiring on their OT networkand, even if hacked, have no knowledge of the assault Innovation in the oil and gas, utility, healthcare and transportation industries is heavily reliant on connectivity - between devices and systems, machines and data, people and processes. This connectivity is great for productivity upstream, mid-stream and downstream, but is also exposes these systems to greater cyber threat. Furthermore, a...

Remote Power Management Of Networked Systems Offers Uninterrupted Security Services & New Business Opportunities

By adding remote monitoring to service contracts, dealers and end users bothbenefit from substantial cost savings while reducing potential downtime Whether upgrading an existing surveillance and/or access system from analog to IP, or installing a completely new system using structured cable, the ability to communicate, monitor and control IP devices delivers significant operational and economic benefits. The vast amounts of data these systems generate are useful in many ways &...

Benefits And Challenges Of Omnidirectional Cameras In Video Surveillance Market

As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...

Live Finger Detection Technology Reinforces Future Of Advanced Biometric Authentication

Awareness against fake fingerprints prevent fingerprint from becomingthe choice of biometrics despite their benefits Apple’s refusal to the US government’s request to unlock Syed Rizwan Farook’s iPhone has triggered public interests in personal and information security. Ever since the introduction of Touch ID by Apple, fingerprint technology has been implemented into more and more mobile devices by different manufacturers. It is being adopted as the authentic...

How Smartphone Access Control Credentials Strengthen Security And Minimize Risk To Organizations

PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...

Misguided Trust Leads To Increase In Security Risks And Potential Attack From Intruders

Stringent security policies are necessary in an organization to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

CCTV Budget Cuts Reduce Video Surveillance Expenditures And Camera Counts Across The UK, Except In London

Nationally from 2012 - 2015, there has been a decrease in the money spent on theinstallation, monitoring and maintenance of CCTV compared to the period 2009-2012 The UK has often been referred to as the world’s most watched country in terms of the scale of CCTV surveillance. But a new report claims that UK local authorities have reduced spending on the installation, maintenance and monitoring of public space CCTV systems, while the number of cameras being used is also do...

New Technologies Empower Visitor Management Systems To Improve Physical Security Efficiency And Cost-Effectiveness

Access control and visitor management are evolving and becoming more rooted in an organization’s overall physical security structure Government regulations are driving increased security levels for visitor management. Private industry, where the need to manage and monitor visitors is an equally high security priority, is following suit. As a result, access control and visitor management are evolving and becoming more rooted in an organization’s overall physical sec...

Top 4 Indicators That An Access Control Vendor Is Customer-Service-Centric

Customer service is a vital part of any vendor’s business approach – from theplanning stages, to installation to maintenance of the access control system In today’s highly competitive and technology-rich security marketplace, an organization’s customer service is as important as the product solution they offer. Let’s face it, you will always remember if the customer service was terrible – or if it was great. Do they go the extra mile or do t...

High-Security Portable Crash Barriers Offer Security Integrators And Dealers New Expansion Opportunities

Portable crash barriers & traffic access control systems allow security integrators to expand their deployments for municipal surveillance and critical infrastructure The Pope does it. The Democratic and Republican National Conventions do it. Leading universities and police departments do it. Just what does this diverse list of people and organizations have in common? They have all used high-security portable barriers at their events with good success. According to manufa...