TDSi News

How Does Technology Innovation In Security Systems Impact The Skillsets Needed By Security Operators And Officers?

Going back to the days when we asked our children to program our VCRs, many of us are challenged by the intricacies of technology. However, a benefit of newer inventions such as smartphones and tablets is that they are easier to use and “intuitive” – whatever that means. Security and video surveillance systems are becoming more complex in lockstep with consumer electronics, so we asked this week’s panelists: How does technology innovation in security systems impact the sk...

IFSEC 2015: TDSi's MIFARE And Proximity Reader Versions To Be Introduced

The new versions are all compatible with MIFARE Plus and DESFire for added security and flexibility Integrated security manufacturer TDSi will be introducing the benefits of its new range of readers to visitors; on stand F1100 at IFSEC International 2015. The new range, which includes new versions of its MIFARE and Proximity Readers, are all compatible with MIFARE Plus and DESFire, for added security and flexibility. The new range of readers is an important addition to T...

TDSi’s Access Control Solutions Protect Students And Property At Arts University Bournemouth

Network Security drew up detailed suggestions to protect the facilities, residents, staff and visitors Arts University Bournemouth - AUB (formerly the Arts University College Bournemouth and the Arts Institute at Bournemouth) is a university that specializes in art, performance, design and media, which is based in Dorset. Initially established in 1885 as a specialist institution, the university is one of a small number of higher education institutions in the UK devoted solely...

What Are The Benefits Of Extended Service Contracts?

Seeking to manage uncertainty is part of the core mission of security professionals. When it comes to the technology systems they depend on every day, extended service agreements are a tool to manage uncertainty as it applies to system operation. We asked our Expert Panel this week to comment on how extended service contracts benefit users, integrators and/or suppliers. Their answers effectively enumerate multiple benefits to all parties involved. Ongoing service and maintenance help to ensure c...

TDSi's Fully Integrated Security Solutions To Be Showcased At IFSEC International 2015

TDSi will be showcasing new version of its EXgarde security management software, on its newly designed stand at the event Integrated security manufacturer TDSi will be showcasing its fully integrated security solutions, including the new version of its powerful EXgarde security management software, on its newly designed stand at IFSEC International 2015. TDSi will be on stand F1100, from 16th-18th June at the ExCel London Exhibition center. Demonstrate Versatility Of TDSi Pro...

How Does Globalization Impact The Physical Security Marketplace?

There’s almost no such thing as a local business anymore. Even the smallest of entrepreneurs find they have immediate access to a global marketplace via the Internet, and larger companies continue to find new ways to maximize their successes throughout the world. We asked our panelists this week to comment on how they see globalization impacting the physical security market. Their broad-ranging responses emphazis the opportunities and challenges of succeeding the global marketplace.

The Internet Of Things Presents New Cyber-vulnerabilities

Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...

What Are The Cybersecurity Vulnerabilities Of IP Based Systems?

Cybersecurity vulnerabilities of IP physical security systems have long been the industry’s “elephant in the room.” Perhaps as a function of salesmanship, the possibility of a cybersecurity attack on a physical security system has sometimes been downplayed or dismissed. However, video from hacked cameras streaming on the Internet cannot be ignored, nor can the possibility that an enterprise’s system could be hacked using back-door entry through an unprotected physical sec...

How should manufacturers engage with end user customers?

If we didn’t have manufacturers, integrators wouldn’t have anything to sell. But what is the role of manufacturing companies when it comes to taking those products to market? Effectively managing the sales channel – helping resellers be successful without somehow undermining their efforts or (heaven forbid!) selling direct to an end user – is an ongoing and delicate challenge for manufacturers. They want to do everything in their power to ensure success of their products...

How To Avoid Counterfeit Security Products?

“Buyer beware” is always good advice in the security marketplace – or in life for that matter. But the age-old warning is more timely than ever in our age of global commerce and given our fragmented market with thousands of products manufactured all over the world. Complicating the picture: our market is also inching toward commodization and facing downward pricing that shrinks margins for manufacturers. So the question becomes: When is an item merely a good deal or somehow &ld...

Does It Matter Where A Security System Component Is Manufactured?

We live in a global market, and goods can easily be manufactured anywhere in the world and then shipped anywhere else. For many years, companies have taken advantage of the consequent flexibility to save costs and increase profits by manufacturing products around the world, especially in low-cost areas such as China. Historically, goods made in China (and some other locales) have been characterized as somehow lower in quality, and yet many of the top companies (such as Apple, for example) have m...

What is the most underutilized technology in the security marketplace and why?

We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximize the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilizing existing technology capabilities are a waste of money, aren’t they?

Looking At Security In Light Of The Paris Attacks

What lessons, if any, are there to be learned from the recent attacks in Paris? Recent events in Paris highlight the deadly and changing face of terrorism in 2015. Two gunmen armed with AK-47 assault rifles attacked the Paris offices of satirical magazine Charlie Hebdo on 7 January, killing 12 people in all, including eight Charlie Hebdo employees and two national police officers. Two days later, the terrorism continued with a hostage crisis at a printing firm at Dammartin-en-Goel&nbs...

Security Is Better Than Ever! The Industry Is Optimistic Looking To 2015

Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...

Measuring Value Of Security Systems - Price Versus Benefits

Value Isn't Always Just About Monetary Worth In any sales conversation, price will inevitably be one of the points of discussion. When it comes to large investments such as security systems, customers want to ensure that their money is well spent. Where price is concerned, systems and solutions providers would want to impart the worth of their products. At the end of the day, in the consumer world, customers want the best value for the least amount of money po...

How does commoditization impact the security market? How should manufacturers and/or integrators differentiate themselves?

How do you stand out in a world of commoditization? We live in a world of commoditized consumer goods. You probably own at least one item which would be considered "commoditized" by the majority of the population today, but you can probably also remember the days when it would have been described as "new" and "unique". Think about smart phones: most people you know are likely to own a smart phone. But remember when not everyone even a regular cell phone? Now they'r...

What is an acceptable life cycle for a physical security or video system? Are you seeing a trend toward systems being replaced more or less often?

Just like many things, security systems have their own life cycles.  Most end users would say that a "good" system should last a certain amount of time. Each system or device has a generally established and expected life span, and anything that falls short of its life expectancy is generally deemed as "poor quality." We asked some of our panellists to reflect on the life cycles of security systems. We wanted to get their insights on trends they have observed i...

How are security systems misunderstood by the general public? What unrealistic expectations surround our market’s systems?

The general public often has misconceptions about security systems. How should security industry experts educate the general public to better understand security systems and their capabilities? As security industry professionals, our panellists are more than used to explaining security systems to customers and other members of the general public. As experts in the field, it is their prerogative to help set the records straight when it comes to what people understan...

Why is (or isn't) company longevity important when choosing a security supplier?

Customers sometimes look at how old or new a company is when having to decide between different security suppliers. But should they? There are several decision-influencing factors in the security industry. Other than the actual technical specifications of the security systems and solutions, there are several other factors people take into consideration such as customer service, technical support offered, product warranties and interoperability, just to name a...

Tradeshows can be overwhelming. What advice would you give attendees so that they can get the most out of a large trade show?

Information overload. That's how tradeshows can seem. You're being fed lots of information by several different people in a short amount of time. It can all be very overwhelming. So what do you do? It's relatively easy to create a plan for smaller shows. But with larger events such as Security Essen, IFSEC and ASIS, it's far easier to become overwhelmed by the amount of choices and options.With Essen and ASIS just behind us, we asked some of our panellists to reflect on...

What app does the security market need most and why?

In today's world of mobile devices, the number of apps available to the general public is increasing daily - apps that are designed to make our lives simpler and help us be more efficient. With about three-quarters of the world's population having access to a mobile device, it's no surprise that the range of different types of apps available today is so wide and varied. For the general public, there's an app for nearly everything. You can do your banking, order grocerie...

Which technologies in the last five years have been the most overhyped? What has been the impact on supplier credibility in the market?

How often have you been caught in the midst of animated chatter and swept up in the anticipation of "the next big thing in X", only to look back and think it was all overhyped? It happens everywhere and with everything, from pop culture movies and new budding artists, to aspects in professional industries such as new consumer products and technology. The security industry certainly has its share of overhyped technology. We asked some of our Panellists on their...

TDSi Protects The Healthcare Sector Through Integrated Access Control

The Healthcare sector is a vital one which affects everyone at some point during their lives. Equally, by its very nature the healthcare sector is highly susceptible to security threats, so ensuring secure access control is an essential element of most medical facilities. TDSi, a global leader in access control systems, offers a range of solutions that cater for the numerous and often demanding access control needs of the healthcare industry, whilst respecting the need to provide for greater val...