Hotels, leisure & entertainment security applications - Expert commentary

Biometric Authentication Offers Greater Security Advantages Over Traditional Identity Verification Systems

Accurately confirming a person’s identity is one key to improving security forour workplaces, communities, and our nation Perhaps I’m sensitized to the term, but it seems to me that I’m hearing the word “identity” a lot lately.   Identity comes up in current news stories about Syrian refugees, for example. Candidates for the U.S. presidency debate how long it should take to confirm the identity of immigrants before allowing them to ent...

ISONAS Global VP Of Sales Robert Lydic Highlights Importance Of IP Open Platforms For Access Control

IP hardware is enabling customers to break free from proprietary security systems,to embrace the system integration available on open platforms Proprietary, closed systems are the bane of security. Yet they still exist. Robert (Rob) G. Lydic, Global Vice President of Sales for ISONAS, Boulder, Colorado, addresses the importance of open platforms in access control and what it means to systems integration in this exclusive Q&A. Trends In Access Control Technology SourceSec...

ISC West 2016: Physical Security Industry Focuses On Incorporating Audio, Video And Other Safeguards In An Integrated Approach

Access control now includes a strong focus on the data integration sideof the business, as showcased at this year’s ISC West When the category of physical security emerged many decades ago, it was literally all about locks, hardware and creating barriers such as fences to keep people out. Fast forward to ISC West 2016 in Las Vegas this week, where the focus is on intelligent solutions, smart data, cloud-based access control and incorporating audio, video and a wide r...

Top 4 Trends Shaping The Future Of Physical Security Information Management (PSIM)

Many transformations have occurred that have caused PSIM’s true definition to be misunderstood and miscategorized The evolution of Physical Security Information Management (PSIM) over the past ten years has been rapid and transformative. In fact, according to a recent report from marketsandmarkets.com, the global physical security market, estimated to be $65.41 billion in 2015, is expected to reach $105.26 billion by the year 2020. At the forefront of this movement...

Impact Of The UK’s ‘Brexit’ EU Referendum On European Border Control And Other Security Measures

UK citizens will vote on June 23rd 2016 on whether to remain within the European Union A significant aspect of the four-month operation leading to the capture in March of Salah Abdeslam, Europe’s most wanted man, is that French and Belgian police worked alongside each other with minimal protocol complications since the countries are not only geographical neighbours but members of the European Union. Abdeslam was arrested for his alleged involvement in the Paris attacks o...

ISC West 2016 - Educational Sessions And Opportunity To Grasp New Security Trends Attracts Systems Integrators

ISC West educational sessions bring into focus some of the challenges, issues and opportunities faced by systems integrators What will be the hot technology at ISC West 2016 this year? Devices to detect drones, more affordable biometrics, or cameras with 360 degrees of clear vision? You’ll probably see some of the above and much more if you’re attending the security industry’s largest trade show, scheduled for April 6 through 8 at the Sands Expo Center in Las...

Why Employing A Software System Is A Smart Way To Enhance Data Accuracy And Business Profitability

Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labor costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...

Building An Effective Video Surveillance Data Infrastructure For Enhanced Storage And Performance

Pre-existing networks are not usually designed to support IP video cameras, so aparallel network for their exclusive use is best when it comes to storage The video storage boom shows no signs of slowing down. The talk is not typically how much storage; but where and how to store. Locally-housed (on-premises) storage continues to be the most cost-effective, along with providing the most control over your data. However, prior to considering the storage, it is important to look a...

Adopting Smart Security Operational Methods For Greener Businesses

Energy efficiency extends beyond a company’s running costs vs. its carbonfootprint, to using security technological intelligently to the company’senvironmental advantage Even as manufacturers are becoming greener and innovation is reducing our industry’s carbon footprint , is there more we could be doing? Can we adapt our general operational methods to be smarter and help save the planet? Are we learning from other industries, do we absorb things quickly...

Vehicle Barrier Certification Sets New Standards For Vendors With Stringent Testing Measures

Barriers certified by the U.S. Department of State can be trusted to withstand specified weights and speeds This time of year, in the early spring, there pops up a plethora of trade shows in which security vendors can present their newest marvels to potential customers. Not to be outdone are the barriers manufacturers. Their products will range from a large metal planter to be placed in an area where no traffic is allowed to movable barriers which lower to let a car drive over...

How To Cope With Environmental And Networking Challenges Affecting Video Surveillance At Remote Sites

Temperature, dusty and dirty conditions, along with limited access to networkingmakes remote location video surveillance extremely challenging Properly conducting video surveillance for any organization comes with several challenges. Not the least of which is how to architect a system that finds the right balance between quality, cost and bandwidth impact. This becomes even more challenging in non-traditional, demanding environments that are uncontrolled or highly dispersed, w...

Festival Security – Combining Security Personnel And Security Structures

Festivals bring together a huge number of people, often to large open areas andvenues, which requires a high level of security and protection fromthe organizers Festivals might be all about fun, but the fact that festival goers are out for a good time is an extra reason why the responsibility for safety and security lies predominantly with the organizers. Security during festivals plays an important role in ensuring safety of citizens. Since festivals witness congregation of...

Modern Public Security Systems Enhance Safety And Security For Citizens

It can be taken as proven that the trends in urbanization, the mobility of the population and the demographics, have had and will continue to have tremendous impact on our daily lives. These impacts were and are supported by disruptive technology changes (such as the evolution of the internet and mobile communication) and result in higher dependencies of almost all economic and social processes. Compared with former generations, we are spending most of our time in buildings or closed mobile con...

Technological Innovations In Security Industry Move Towards Greener Performance

The development of PSIM security systems and the move towards smart buildings and cities holds huge potential for environmental performance in the security industry Is the drive to give clients improved CCTV, perimeter protection, intruder alarms and access control making our industry any greener? Is technological innovation consistent with reducing security industry’s carbon footprint? In any case, green operating practices are more a side effect of current developments...

Formulating Background Check Strategies To Minimize Insider And Post-hire Threats

Employers are increasingly concerned about the risks associated with employees, temporary workers, independent contractors, and others who have the ability to wreak havoc on an organization from the inside. This is often referred to as “insider threat.” There are numerous types of insider and post-hire threats that range from embezzlement, theft of trade secrets, workplace violence or active shooters, and everything else in between. Potential insider threats are...

Biometric Solutions Bridge The Gap Between Physical And Logical Access Control

A biometrics-embedded tablet can tag a guard upon entering the building & feed videoof what’s happening beyond secure doors as he/she moves through the facility The best way to make the case for biometrics is to consider a physical and logical access control scenario, according to biometrics vendor SRI Identity, a program from SRI International, one biometrics company. With advances in security technology, access control systems have come to play a bigger role in org...

E-Passport Technologies Address Border Security Crisis And Ease Tourism

Led by European nations, there is a global shift to e-passports, with over 100 countries using these technologies With the number of global international tourist arrivals standing at over 1 billion and increasing migration in Europe, good border and passport security means having a layered approach and plenty of co-ordination among countries, says David Belchick, VP of Government Solutions at Entrust Datacard. Ever-Growing Border Security Challenges “More than one bil...

ROI For Biometrics – An Equation That Makes Biometric Security Systems Worthy Of Investment

Proving ROI, setting proper customer expectations and training is imperative tothe success of biometric implementation End user customers increasingly expect their security systems to provide measurable benefits beyond protection of people, facilities and assets. The biometrics sector is undergoing a similar shift in mindset: The benefits of using biometrics to drive business operations and other corporate functions are becoming part of the return on investment (ROI) “eq...

FirstNet Requests Proposals For Hack-Resistant Public Safety Network For First Responders

FirstNet’s network would provide dedicated support to law enforcement on the scene not only from a local standpoint, but from a Federal standpoint as well Someday in the not-too-distant future, first responders – from police to EMS will have access to a secure broadband network. It will keep them connected with other agencies while ensuring their data is protected even in the midst of natural and manmade disasters.   At least that’s the idea behind the...

Dismissal Of Lawsuit Against Traffic Light Camera Program In New York Highlights Divided Public Opinion

Some people contend that traffic light cameras are money-makers for localgovernments rather than a deterrent for dangerous driving These days, cameras are everywhere, and getting away with petty offences like running traffic lights has got harder. Citizens have got hot under the collar, and some have even gone to court to get rid of the automatic tickets generated by these robotic traffic enforcers. Traffic Light Camera Intersections Not Conforming To Federal Traffic Stan...

Optical Fingerprint Sensors In Smart Phones Paving Way For Biometrics Comeback?

More fingerprint scanners being embedded into mid-range smart phones willspur the growth in availability of mobile wallets When Apple included a fingerprint scanner on the iPhone, everything changed in the biometrics market. What used to be exotic or even dubious instead became normal and everyday. Any negative connotations about biometrics were wiped away in an instant. “Since the release of Apple’s Touch ID, and subsequent similar products from Samsung and...

Understanding Starlight Camera Technology And Low-light Applications In The Security Industry

Starlight camera technology is redefining low-light surveillance to new levels Starlight cameras are the latest products security companies are adding to their product line-ups, each camera boasting the most comprehensive ability to make darkness visible. While low-light surveillance capabilities have been around on the market for some time, starlight camera technology is redefining low-light surveillance to new levels. Sourcesecurity.com spoke to manufacturers to discuss this...

Security Industry Manufacturers Push For Environmentally Accredited Products With ISO 14001 Certification

Many security manufacturers are working towards ISO 14001, an internationally-recognized standard for the environmental management of businesses How green are security industry manufacturers? As innovation (much of it driven from home video and mobile phones) continues, it’s likely that our sector’s carbon footprint will decrease since compact products use up fewer raw materials. Even casual observers will note that integrators are falling over themselves to gain e...

How To Understand Security Metrics To Determine Success Of Security Programs

Done right, a good metric program will help tell the story of the security department Knights of medieval times are known for impossible quests and challenging missions seeking rare religious items. The quest for the Holy Grail is perhaps the most notable. Today’s security professionals are often on their own quest, seeking what sometimes feels like the impossible – the search for perfect security metrics! What are metrics and are they really that hard to find? M...

CSAA/ANSI Alarm Verification Standard To Improve Law Enforcement Responsiveness & Reduce False Dispatches

Improved alarm verification standards will help reduce the number of false dispatches of law enforcement officers The verification of alarms continues to progress with more affordable technology as well as an updated industry standard set for release as soon as the end of February 2016. The definition of alarm verification is getting a makeover in the standard, guided by a range of stakeholders including the security industry, law enforcement, associations and other intereste...

Access Control Manufacturers Address Biometric Myths & End User Misconceptions

A number of misconceptions exist about the capabilities and technology ofbiometrics, perpetuated in popular culture by films and TV Like many categories in the security marketplace, the biometrics market suffers its share of misconceptions, ranging from misunderstanding of the technology to underestimating its utility for a broad range of uses. Misunderstandings Created By Pop Culture Contributing to the problem of understanding is the popular culture. “Popular mo...

Security & Emergency Agencies' Cooperation Addresses Unique Sports And Stadium Security Challenges

On event days, representatives of emergency response & security agenciesare together and running sports venues as a unified group In the world of sports security, alliances are bringing together personnel and agencies that once only talked to each other during an emergency. Consider the recently announced agreement between the Security Industry Association (SIA) and the National Center for Spectator Sports Safety and Security (NCS4). This memorandum of understanding (MOU)...

Sophisticated Analytics Of High-Definition Video Security Systems Set To Drive Growth In Surveillance Market

Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from...

Stadium Security Protocols Tighten Amid Terrorism; Enhanced Physical Security Standards Improve Public Safety

Sports stadiums and leagues are constantly pushing for higher security standards & best practices to strengthen venues that may be perceived as "soft targets" Terrorism threats have focused the attention of sports security professionals like Paul Turner, Director of Event Operations & Security for AT&T Stadium in Arlington, Texas, on how to more effectively screen guests and ensure that fans and athletes are kept safe. It has made the sobering reality that stadiums...

Run, Hide Or Fight – Law Enforcement Veteran’s Tips For Surviving An Active Shooting Incident

Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and...