Remote monitoring security applications - Expert commentary

Physical Security in 2021: Post-Pandemic Solutions

In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organizations are still engaged primarily in “anywhere oper...

Trends And Challenges We Will See In The AI-driven Security Space In 2021

For decades, the nature of global safety has been evolving. From physical security threats like large-scale terrorist attacks and lone actor stabbings to chemical threats such as the Salisbury poisonings and even microbiological threats such as COVID-19, new challenges are constantly arising and the threat landscape we operate in today is constantly changing. Compounding the complexity of the security issues is the complexity and nature of attacks. With the economic downturn, there is the tradi...

Access Control and Door Entry Management: How Technology is Driving Change

Access control and door entry is a huge responsibility, and challenge, for local authorities and housing associations UK wide. For councils, they’re accountable for the security and safety of many public facilities such as leisure centers, libraries as well as residential housing developments which are often large scale and home to hundreds of people. Housing associations manage affordable rental housing which also means they’re responsible for the appropriate access control managem...

Private Security: A Shift In Industry Responsibility

The role of physical security has expanded and grown rapidly over recent years. Below are some of our observations, particularly throughout the pandemic, and a look towards the changing times ahead.  The new era of physical security The role of private security has shifted dramatically over the last decade and beyond. Historically, the focus was on protecting assets such as property and goods, but more frequently now the sector is being asked to play an even bigger role in protecting the...

Securing Your Business While Working Remotely

It's a very common purchase for people to seek a smart security camera to remotely link them to their home while at work. Now the emphasis has shifted, with a lot more people working from home, business owners should consider a surveillance device to deter would-be thieves, protecting valuable equipment crucial for businesses to operate successfully. A robust security camera setup can aid existing security staff, and give business owners peace of mind out...

Moving to Sophisticated Electric Locking

In part one of this feature, we introduced the shotbolt – a solenoid actuator – as the workhorse at the heart of most straightforward electric locking systems. Shotbolts remain at the core of most sophisticated electric locking solutions as well. But they are supplemented by materials and technologies that provide characteristics suited to specialist security applications. Here we look at some more demanding electric locking applications and contemporary solutions. Preventing forced...

Evaluating And Selecting AI Video Analytics Solutions For Your Organisation

As the multi-billion-dollar market for artificial-intelligence-based video analytics continues to grow, so does the number of video analytics solution providers. In Q3 of 2018, Stockholm-based consulting company Memoori identified 128 active companies in the supply chain for AI video analytics [i]. This list is far from exhaustive, considering how analytics has been gaining interest and becoming mainstream in 2020, with users expecting more accurate alerts based on object detection instead of m...

Fighting Illicit Trade With Artificial Intelligence

AI has opened doors to many transformation opportunities and increasingly minimised many risks  -- personal and economic -- that are alarming today. And illicit trade is one of those pains AI can offer a promising solution against. Illicit trade is a serious threat and problem that affects governments and societies on every level. While governments lose financial funds in tax revenues, thriving businesses are losing potential customers, and customers are getting tricked into purchasing cou...

Optimising Business Security During COVID-19

Many businesses will already have some form of security in place, but what is often overlooked is the need to assess whether the protection is suitable enough for the nature of their business, or efficient enough for the premises they are utilising. As the country continues to face unprecedented times, it is crucial than ever to protect your business, particularly outside working hours or if at present the majority of your workforce is working remotely for the foreseeable future. So, what can y...

Fingerprint, Facial And Iris: Defining Which Biometrics Work Best For You

Recently contacted by your credit card company because of a data breach or were you a victim of identity theft?  Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction...

AI In Security: The Crystal Ball You’ve Been Waiting For

One of the biggest trends in security and technology today is centered around solutions that take advantage of the wealth of connected security systems and devices powering the organizations all over the world. As the number of cloud-powered systems and sensors have massively grown in recent years, security leaders in the private and public sectors have started to look at ways to leverage the data from these devices to better the lives of employees, customers, and residents. But while the drea...

Building Security: How Audio Tells the Whole Story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and see...

AI Deployed To Safeguard Cities: How, Where And What

The threat landscape we operate in today is changing all the time. Around the world, pressures on law enforcement bodies remain incredibly high as they face the challenge of rising international threat levels and a backdrop of intense political, social and economic uncertainty. It is a challenge that demands a considered, proactive and dynamic response. It’s clear that new technologies, such as Artificial Intelligence (AI), can dramatically improve the effectiveness of today’s physi...

How Thermal Technologies Improve Facility Security And Workforce Safety

Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures—these are common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less—that expand situational awareness, overall system functionality, and real-time response capabilities while generating cost-savings. By leveraging technology like thermal imaging, this is...

Pandemic-proofing your Proptech Stack to Address Top Safety Concerns

A recent survey compared how employees, tenants, property owners and managers, and developers feel about returning to the workplace, and what would make them feel safer. Among the responses from employees and tenants, 63% don’t feel comfortable returning to work, and cited their own health and safety, as well as the safety of their loved ones, as the main cause for concern. However, 73% of business owners said they plan on reopening as soon as possible, within 2-4 weeks. How can we fix the...

Can 5G Boost Innovation in the Smart Home Market?

We still have some way to go before we see 5G service rolled out as a UK-wide service, but we can discuss future implications of 5G, and how it can improve device capabilities once its widely accessible.  The impact of 5G lies within the increase in the amount of data that can be transferred between smart home devices through a cloud-based system. By utilising the cloud’s mass com...

Secure, Pinpoint Location with UWB-Enabled Indoor Positioning

Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an...

Security Considerations for Embedded System RFID Readers

In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user i...

In a Cybersecurity 'Wild West', Look for the Sheriffs!

As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in...

Why the Touchless Office is Another Argument for Going Passwordless

Security experts have discussed the demise of the passwords for years. As early as 2004, Bill Gates told the RSA Security Conference that passwords “just don’t meet the challenge for anything you really want to secure.” Change has been slow, but the sudden increase in remote working and the need for enterprises to become touchless as they try to encourage teams back to the office is increasing traction. Here we look at the future of passwordless authentication - using the examp...

Why RMR is More Important than Ever for Security Integrators

The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is,  during economic uncertainty, businesses will find...

In Pursuit of Providing a Safe and Secure Environment in the Workplace

All public properties are faced with a diverse and complicated set of safety and security risks, from health and safety to violence, terrorism, natural disasters, fires, political and environmental. Reducing safety and security risks requires the hands-on support of all operating teams, not just the security team, each playing their part in the pursuit of providing a safe and secure environment for all customers and staff. The challenge is twofold, one many still rely on antiquated logbooks, ch...

Finding Missing Persons Collaboratively Through AI

Smart cities, airports, stadiums, hospitals and other organizations are now liaising with government bodies and law enforcement to propel a new dawn of collaborative security and communication. The influx of new technology coupled with the ever-changing political and social landscapes has meant security is having to evolve. Artificial Intelligence is now allowing law enforcement, security personnel and organizations to a transformational method of fighting crime, maintaining public security and...

Home Office Security: Keeping Your Data Safe

Since lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it’s been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the “next normal” there remains a great deal of uncertainty around what the next twelve months hold...

Smart Cities: Deploying Threat Detection Platforms

Today, 55% of the world’s population lives in urban areas. According to estimates from the UN, this number is expected to increase to 68% by 2050. As urban areas become more densely populated, the ability of law enforcement to uphold law and order becomes ever more critical to public security. It’s a challenge that must be constantly reviewed, and issues addressed where needed. One such area is the detection, identification and interception of physical threats, which has traditiona...

How To Prevent Your Surveillance Camera System From Being Hacked

IP cameras for video surveillance has been a trending topic amongst enterprises across the world due to rising concerns for security and safety. IP CCTV cameras are revolutionizing security measures, and technology has evolved to allow for a more diverse security monitoring system through high resolution, larger digital storage options and compatibility for integrated analytical software. According to Global CCTV Market Forecast 2022, analysts expect the market for global CCTV to grow at a CAG...

The Benefits of LiDAR for Security and Surveillance

Security and surveillance applications require accurate, scalable, and cost-effective solutions. However, traditional security technologies pose many risks and challenges including frequent false alarms and high costs—both for system installation and ongoing maintenance. Because of the shortcomings of these technologies, many organizations have adopted 3D LiDAR-based security solutions to improve reliability, reduce false alarms, and streamline their operations. Integrated with cameras a...

Introducing Medical Health Checks To Access Control

What many security professionals are yet to realize is how COVID-19 has led to fundamental changes in security policies that will ultimately affect them. The introduction of medical technology, such as thermal scanners, to access control implementations is a new phenomenon. The coronavirus pandemic has propelled a new requirement onto organizations to conduct health checks – specifically, body temperature checks – at the door before an employee, contractor or visitor is given access...

Providing Fast and Secure Access in Life-Threatening Emergencies

A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those pr...

Edge Computing, AI and Thermal Imaging – The Future of Smart Security

Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. With 4K-compliant cameras projected to make up over 24% of all network camera...