Industrial & commercial security applications - Expert commentary

Enterprise Command Software Integrates Data Sources To Analyze Security, Business And Risk Profiles

The role of today’s security leader continues to evolve as they are faced with an ever-expanding risk environment that includes active shooters, crime, natural disasters, liabilities and cyber threats. Most recently, the terrorist attacks in Paris and the active shooter violence in California once again served as reminders of the threats organizations face on a daily basis.   Intelligent Technologies For Proactive Security Management Over the past year, the increased fo...

ID Cards As Preventative Solution For Shooters And Emergencies In Schools, Despite Budget Constraints

Budget becomes a major constraint for any school and organization while addressing safety of their students and staff. IDSecurityOnline, the leading provider of photo identification services will provide customers its innovative ID card solutions irrespective of their budget. The development of cloud-based services and mobile platforms has offered more options to organizations all around the United States in 2015. In the meantime, scare tactics have been the go-to marketing strategy for many se...

Falling Prices And Open Security Systems See Increased Competition Amongst Security Providers

Ups and downs tested the staying power of security system providers in 2015, which was a dynamic year for the security market. A key development in the security industry has been the acquisition of VMS leader Seetec by OnSSI, which has enabled it to serve customers globally. The security market in 2015 also witnessed a growing trend towards supporting diverse security systems from different manufacturers. Falling Prices And Increased Competition On the bright side, while the economy has not ye...

Increased Understanding And Focus On Data Analysis Allows For Widespread Predictive Security And Identity Management

2015 was a notable year for Quantum Secure, culminating with the company becoming part of HID Global. Growth was seen in several sectors for us, led by the adoption of our SAFE software solutions in the finance and aviation markets, among others. For the industry in general as it relates to Quantum Secure, predictive security became a more prevalent theme as organizations were tasked with not only providing more data but making sense of the data for use in improving security operations. Another...

Situational Awareness And Emergency Response Solutions Strengthen Security Infrastructure

The security environment is unsettling and continues to require focus and continuing vigilance to increase security measures. Sensors in active technology systems play an important role in situational awareness, which helps in identifying and responding to emergency situations.   As of October 2015, there were 45 school shootings in the United States. There continues to be grave concern about potential “lone wolf”-type events for individuals and businesses. Situati...

Security Projects Capital Spending Grew In 2015 Amidst Larger Adoption Of Thermal Cameras And Analytics

Capital spending continues to open up in 2015, providing funding for security projects that may have been delayed from prior years. Overall, it was a solid year for the security industry. From a SightLogix perspective, we have seen an increased rate of repeat business as existing customers expand the number of assets they need to secure.      Smart Thermal Cameras Provide Ideal Outdoor Intrusion Detection 2015 saw an accelerated adoption of thermal cameras with video analytics...

Pure IP Access Control To Gain Significant Strength In 2016

In April of 1775, Paul Revere rode fearlessly through the streets of New England warning the town of Lexington that “The Red Coats are Coming!” It was both a warning and an announcement that a powerful force was upon them. If Paul Revere were alive today and in the security and access control world, he would probably be tweeting, posting, and blogging that “IP access control is coming, and it’s coming faster than you’d expect!” Just as in 1775, it is both a...

IoT-Based Key Management Systems With Access Control Strengthens Risk Management Strategies

Although 2015 seemed like the year of data breaches, it was also the year that the Internet of Things (IoT) achieved real traction. Key management systems and most other advanced security solutions can now be integrated with the networked security system (i.e. identity management, access control, IP video surveillance, intrusion and other systems) to strengthen risk management strategies. Specifically, Morse Watchmans’ KeyWatcher Touch can now be integrated with Lenel’s OnGuard Acce...

ASIS 2015 President Dave Tyson Sees More M&As And Futuristic Trends Impacting The Security Market

From my vantage point, it would appear that the acquisition of goods and services related to security controls and measures remains healthy at the end of 2015. Although the time associated with evaluations and overall procurement processes, I am told, has become a bit lengthier.   Mergers and acquisitions of both security industry providers and the merger of national and international companies are the biggest unexpected things to have an impact this year. Forbes reported that &ldquo...

Security And Video Opportunities To Bloom Amidst Global Threats And Migrant Crisis

As the world faces new threats and challenges at the end of 2015, the security market looks more and more attractive for companies and employees around the world. Digital technology increasingly is replacing a traditional physical security approach, upgrading old-school analog alarms and CCTV. Attractive Security Projects From AxxonSoft’s point of view, security projects seem very attractive because they normally can bring up to 30% profit for a standard security system installation. IT...

3xLOGIC On The Value Of “Dark Data” Collection From Video, Access Control, Intrusion And Biometrics

2015 was one of the more stable of the last five years. We’re seeing a fundamental increase in confidence that is freeing up capital spend. There’s a good bit of pent-up demand, and larger projects are being funded. We’re seeing more M&A deals, not an explosive change, but a marked increase and more quality deals. These deals reflect an interest and demand for services and solutions. The commoditization of cameras and NVR/DVRs is putting pressure on long-term players as we...

5 Basics For Implementing Effective Physical Security

Deadly terrorist attacks on buildings have highlighted the need of a well-designedand well implemented physical security program What constitutes a well-designed physical security program? Deadly terrorist attacks on buildings such as the San Bernardino Administrative Center, Riverside Countyin California., have highlight the need of a well-designed and well implemented physical security program. S.Steven Oplinger, Chair of the ASIS Physical Security Council, outlines 5 basic...

Networking And Advanced Integration Trend To See Large Technology Companies Enter Security Market In 2016

Overall, 2015 has yielded positive results across the professional security industry due to the global demand for enhanced and expanded security in response to greater risks and threats. Over the past year, Altronix has participated in the industry’s growth with new technology offerings and an expanded reseller channel. The need to effectively respond to system trouble and remotely manage devices has become increasingly important to maintain security around the clock. More Large Technolo...

Quality Video Stream, Longer Retention Time Boosts Performance For HD Cameras In 2015

How did the overall economy impact the security marketplace in 2015? In as much as security is more and more becoming a necessity, it would be difficult to gauge whether the economy had any direct effect other than at a budget level. With the introduction of 4K technology, video storage with longer retention time has become the need of the hour. Being a manufacturer of IP video storage solutions, BCDVideo has been able to work with security integrators and camera manufacturers from around the wo...

Matured 4K Technology And Growth Of Next Generation 4K In 2016

2015 has been a mixed year. There’s been aggressive competition in the security industry and difficult market conditions in some parts of Europe. The market has slowed down, but at the same time there is still a huge demand for new solutions coming into the market. As a manufacturer, we continue to see strong demand for innovative products. Overall, the industry has matured this year. The full HD market is established now, and more security professionals are now looking beyond that. 4K an...

Continued Growth Of Thermal Imaging Cameras For Perimeter Security

The security market was affected by the economic situation in 2015. However, the penetration of thermal products for security applications continues, and FLIR is seeing strong growth. The company saw the use of thermal imaging cameras continue to develop in perimeter security. End users and integrators are experiencing excellent results by combining high-quality thermal cameras with video analytics. The take up of thermal cameras is increasing for security applications as the industry recognises...

Security And IT Convergence Accelerates Technology Advancement And Innovation

We in the industry have talked about IT’s growing influence in security technology decision-making for a number of years. This year, we have seen the trend accelerate rapidly. Significant changes are occurring in data center infrastructure technology, creating major disruption to the large enterprise server and storage providers. This is fundamentally changing the way the security industry thinks about IT. 2015 Trend – Emergence Of Hyper-converged Infrastructure (HCI) One of the bi...

ONVIF On Profile Q And A 2016 Developments And Promoting Interoperability In The Security Industry

In the past year, ONVIF prepared the release of two new profiles, Profiles Q and A, which are currently in Release Candidate status, being fine-tuned by developers from member organizations. They are ONVIF’s fourth and fifth profiles, with Profile Q addressing easy set-up and advanced security features and Profile A encompassing daily tasks for access control. ONVIF also hit major milestones in 2015, reaching the 5,000-conformant product mark and maintaining a membership of more than 500 m...

KISI Keyless Smartphone Access Control System Captures Startup Technology Market

The KISI system has been installed in hundreds of tech startups in New York City and is currently targeting other areas of the US Based in Brooklyn, New York., KISI Inc. is a relative newcomer to the access control industry, targeting tech companies and co-working spaces for it cloud-based system. With its first round of funding secured in March 2015, the company partnered with Cushman & Wakefield to roll out its mobile access control solution at the real estate firm&rsquo...

Cybersecurity And Risk Management To Gain Traction In Security Market During 2016

Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defense and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge.   Securing The I...

Reactive To Proactive - Central Command Centers Transform Security Capabilities For Organizations

Command centers allow physical and IT security to collaborate for greatersituational awareness and responsiveness Conventional command centers focus on video and access control system monitoring. When something happens at a door, the video system reports the event to one monitor in the command center, while the access control system reports to another monitor. It is up to the operator to imagine the possibilities, draw the right conclusions, decide on a response and, if necess...

Surveillance Solutions Must Extend Beyond Security Applications Into Business Intelligence In 2016

2015 was positive for the security industry. In spite of economic volatility in many regions, the industry grew robustly throughout the year. Although a few countries went into recession, it did not negatively impact key players. We knew cameras with multiple sensors would do well; however, the rate at which these devices increased in availability was somewhat unexpected. The Avigilon HD Multisensor brings increased value because it uses multiple independently adjustable sensors for wide covera...

Mobile & Biometric Access Control To Build In 2016 With Increased Need For Perimeter Security

While the access control market typically moves at a near glacial pace, 2015 brought quite a bit of news to the marketplace, including the rise in advanced biometrics, the development of more and more mobile applications for access control and important acquisitions that put smaller manufacturers on the map. For Vanderbilt, 2015 was a big year as we brought the Siemens Security Products business into the fold, building our global brand and awareness of our award-winning solutions that have been...

Broader Range Of Vertical Markets Show Increasing Video Surveillance Needs

Hikvision USA enjoyed tremendous success in 2015, thanks in part to the continued growth of the security industry. As we see a broader variety of vertical markets showing an increasing need for video surveillance, security vendors must be versatile in their product offering. The products themselves must be highly scalable and must provide high performance at a competitive price. Hikvision has been able to accomplish all of these things with a product suite that includes high definition analog,...

ESA Leadership Summit 2016 - Transforming Security Industry Executives Into Rising Leaders

The ESA Summit is offering registration for “Rising Leaders” to gain valuableleadership skills and business tactics Leadership Summit presented by the Electronic Security Association (ESA), Irving, Texas, has penned the slogan: “Link. Learn. Lead.” for its 2016 event. Scheduled for January 31 through February 3 at the Wild Horse Pass Hotel & Casino in Chandler, Arizona, the ESA Leadership Summit is a testament to a quickly changing security landscap...

Increased Adoption Of Fingerprint Based Solutions, Two-Factor Authentication To Touch New High In 2016

The extraordinary global adoption of fingerprint based solutions, from mobile devices to credentials, will continue to expand and touch new markets in 2016. The trend to move away from passwords and PINs is really building momentum in logical and physical access. Widespread Use Of Biometric Security The security industry in 2015 continued to improve, along with the overall economy. Regulatory agencies are taking the lead as two-factor authentication is becoming a more mainstream concept. From...

The New Face Of Modern Security: Situational Awareness Through Citizen Engagement And Social Media

The nature of risk has changed, and there is a blurring of lines between cyber, physical and online security. These changes are spurring organizational changes as well. Most recently, the unexpected attacks against Paris have escalated the importance of security worldwide – and there’s an even greater focus on leveraging even more sources of information in an effort to gain greater situational awareness to react faster, more efficiently and effectively.   Changing...

IP Innovation Continues, But Interest For Analog HD Also On Rise

IDIS was a new name in the security market in 2015, and we asked the company to comment on interesting trends in the market at year-end. Here is that discussion.    SourceSecurity.com: How did the economy affect the industry in 2015? Keith Drummond, Senior Director of Sales and Marketing, IDIS America: The surveillance market had been quite resilient as it relates to the overall economy over the 15 years I have been in the industry, and 2015 has been no different. It s...

SourceSecurity.com’s 10 Most Click-Worthy Articles Of 2015

Many of the most well-trafficked articles posted at SourceSecurity.com in 2015 were those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2015 that generated the most page views. They are listed in order here with the author’s...

Open, Software-Based Security System Crucial For Dealing With Changing Security Demands

Many security solutions available today have the problem of being insufficiently open, offering very limited flexibility. Integrating third-party products is practically impossible. Customers therefore very often have to make a long-term bet on just one vendor. Upgrading or expanding security systems is often complex, expensive and time-consuming. But the industry is changing. Initiatives like open standards and cooperation between suppliers are emerging to help companies react faster to changin...