Remote monitoring security applications - Expert commentary

Insights From More Than Two Decades Of Attending ISC West

Daniel Budinoff, president of Security Specialists, Stamford, Conn., is almost a fixture at trade shows, especially ISC West. He attends some six to seven trade shows per year, but finds ISC West most applicable to his company, his product research needs and his networking endeavors. In fact, he has attended ISC West for more than 25 years, only missing perhaps one or two shows during that time period. With this year’s show just around the corner, April 10-12 in Las Vegas, it’s a gre...

Designing Security Systems: Project Management Techniques

Access control and video surveillance technologies are expensive to buy and install. So it’s important that end users make sure they get a system that works the way it is supposed to work and the way they want it to work. To that end, the principles of project management can help end users find an integrator and to manage the work of installing or upgrading security systems. If you are experienced with security technologies, you might consider managing the project yourself. If not, consi...

Growing access control adoption for residential and commercial security: key drivers

Access control growth is driven by several factors A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are helping drive the rapidly growing adoption of access control systems in both the residential and commercial security markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these contributing factors as Linear LLC looks towards the futur...

Improving Security System Installations With Acceptance Testing

Endless possibilities for security deployment have been made possible with technological advancements Significant technological advancements have created endless possibilities in how security is not only deployed, but also leveraged by the end user – the customer. For example, customers can now view surveillance at eight different offices in eight different states from a single, central location. A security director can manage an enterprise-wide access control system, in...

Fault Tolerant Access Control For Business Continuity

The principals of fault-tolerant access control are designed to limit the chances of system catastrophe by hardware failure Today, fault-tolerant security systems have become a necessity in several high-security environments as they ensure that security is not compromised in the event of some hardware malfunction. The availability of competitively priced fault-tolerant access control systems also make them attractive for security installers as well as end-users. In this articl...

Redefining Access Control With NFC-enabled Smartphones

Comprehensive and robust security programs and policies are required for adequate data security Over the last decade, we have entered a new era of physical and logical access control. We are now living in an increasingly mobile world where our phones do more than just make a simple call – employees can now open doors and enter secure areas, as well as access computers, corporate data networks and associated information assets with just a single mobile device.  Furth...

Improving wide area surveillance with panoramic megapixel cameras

Panoramic view megapixel cameras simplify and lower overall video surveillance cost High definition megapixel cameras can cover larger areas with fewer surveillance cameras while delivering superior detail and improving overall security operations. This translates into lower security infrastructure costs and improved overall return on investment (ROI), enabling users to deploy less expensive video surveillance systems with megapixel cameras while achieving better performance...

A Long-lasting Alliance Between System Integrators And Customers Promises To Be Favorable For Both

Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...

Unifying Identity Management And Access Control

For many companies, the current state of their access control infrastructure is best described as being fractured For many companies, the current state of their access control infrastructure is best described as being fractured. Multiple disparate physical and logical access control systems and cumbersome manual processes are all too common. Standardizing one system throughout a company might address part of the problem, but replacing multiple systems may require large amounts...

IP Network Requirements For Video Surveillance/physical Security

IT networks are expanding to include more users and applications The use of corporate IT network infrastructure for physical security applications such as video surveillance presents unique challenges. Jack Fernandes, President & CEO of American Fibertek, makes a case for separate networks using specialized equipment and technologies specifically designed for video surveillance which could also integrate other physical security functions. In today’s business world, c...

Accurate And Cost-effective Outdoor Video Security

Technologies are now available that are specifically designed to accurately detectbreaches in a range of environments Designing a surveillance system that is accurate and cost-effective for the outdoors has been a significant challenge for the security industry. However, time-proven technologies are now available that are specifically designed to accurately detect security breaches in a wide range of outdoor environments while addressing the core issue of n...

Security Guard Company Selection - A Checklist

The security officer is the first responderand therefore the backbone of anyorganization's security stature Customers should carefully consider multiple important factors beyond price when choosing a supplier of security guard services.  In this article, Drew Levine – President of G4S Secure Solutions USA, provides a checklist of points to consider when evaluating security manpower suppliers. From historical reputation and size of the workforce to the professional...

Power Supplies: Critical Component Of Security Solution Effectiveness

Security integrators prefer to standardizetheir choices of system components such as power supplues using security manufacturers they are familiar with Power supplies may be inconspicuous and literally out-of-sight however, they play a critical role in the effective functioning of security solutions. Selecting and using the right power supply is an important aspect of ensuring that the installed security system delivers the desired outcome and of course, a good ROI. In th...

Video Systems: Delivering Value To Enterprise Business Intelligence

Video surveillance solutions can work alone to deliver intelligence or integrate with other business systems and optimize operations If you think of video surveillance as an instrument of the security department, you risk overlooking the broader benefits of video. The fact is, video is much more than a security tool, it is a business intelligence (BI) tool. In this article, Gadi Piran President of OnSSI discusses how video systems can be used as an effective BI tool in a...

Security System Implementation: "bleeding Edge" Versus Leading Edge Security Technologies

Choosing between "bleeding edge" and leading edge technology is critical when deploying a security system The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge prov...

Fiber Optic Transmission In Security And Surveillance Solutions

  Fiber optics enhances the operation and business bottom line of surveillance solutions Designers and end users of security systems, integrators and installers must consider and balance the functionality required of a video surveillance camera with its methods of transmission. This is the first of a 3-part examination by Mark Wilson, Marketing Vice President of Infinova, of how chief security officers (CSOs), directors and managers can understand the benefits of and...

Axis Communications Considers The Future For The Security Industry

SourceSecurity.com took the time to catch up with the CEO and President of the company that invented the network camera more than 10 years ago, Axis Communications, to ask him whether the era of IP-based surveillance had arrived and what obstacles remain in the way of more widespread adoption. SourceSecurity.com: Do you think IP-Surveillance has finally come of age? Ray Mauritsson: Yes and it is not just Axis saying this.  You only need to look at the growth of sales of the network...

Security Smoke Systems

In the first of two articles, Matt Gilmartin of Concept Smoke Screen introduces the idea of using artificial smoke as a final - and telling - barrier against burglary, and explains the basics behind this wildly under-reported technology. Around twenty years ago, a dramatic increase in the amount of smash-and-grab and "ram-raid" style burglaries made it apparent that for a lot of premises, the three layers of "conventional" security measures were no longer enough: Physical security...