Denmark News

Security Industry Benefits From Greater Public Sector Spending & Market Growth Despite Fears Of Economic Stagnation

Overall 2015 has been a year of increased public sector spending (as the UK economy continues to emerge from the recession), which has been highly beneficial to the security industry. This trend has been particularly evident in the healthcare and education sectors, which are key markets for TDSi. Nobody could have predicted the significant number of international security and terrorism threats this year. Undoubtedly this will result in even closer ties among the security industry, police and se...

Building A Quality Security Team Demands Deep Resources And Employee-Friendly Practices

An increasing trend, and one that will become even more pressing in 2016, is an expanded focus on personnel. This includes the recruitment, selection, training, engagement and recognition of the individuals who are assigned to help create and maintain safer and more secure environments.   The tightening labor market has propelled this pressing need to the forefront. With fewer candidates for security officer openings – and openings in most industries – the competit...

SourceSecurity.com’s Top 10 Expert Panel Roundtable Discussions In 2015

SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions.   Not surprisingly, the discussion topics that have generated the most interest (in terms of how much visitor traffic they generated) are the same hot topics we hear about every day in the industry. Our very most-clicked-on Roundtable discussion in 2015 was about the impact of video on privacy rights. Other hot topics that made the Top-10 list of Roundtable d...

Video Surveillance Market Shines In 2015 With Integrated Systems, IP Security And 4K Resolutions

Video surveillance technology continues to evolve at a strong pace with improvements in resolution, integration, intelligence and bandwidth utilisation – all of which contribute to better overall security and cost-efficiency. As the video surveillance category continues to grow, we spoke with Jeff Whitney, Arecont Vision’s Vice President of Marketing, about some of the factors driving the market.   Maturity of Integrated Systems There continues to be a great deal...

2015 Sees Rise Of Drone Detection Systems And The Convergence Of Physical And Cyber Security

Physical and cyber security convergence, perimeter intrusion detection systems and fiber optic-based sensors were some of the security trends that picked up pace in 2015 and will continue to grow in the coming year as well. The beginning of 2015 started out slowly as the implementation of security projects by a number of organizations was postponed for various reasons. Mid-year picked up momentum, and the year is ending on a strong note. A significant trend was the gradual progression of conve...

Security Market Consolidation Trending For 2015; Cloud, IoT And Home Automation Set To Grow Further In 2016

2015 was a year of consolidations: The spring of 2015 recorded the highest acquisition rate for a six-month period in 10 years. There were single-digit market growth rates reported in video surveillance due to price erosion affecting revenues. Video solution providers are expanding into access control, and both are slowly but steadily moving into the cloud. Users want the efficiency benefits of converging access control with video verification and unified operation. There are more cloud offering...

How Does The Consumer Market Affect End Users' Expectations Of Security System Features?

The connected workplace, increase in “bring you own device” environments and even the rise in telecommuting have served to blur the lines between an employee’s private life and his employment. The idea of an executive’s obsessive need to check his Blackberry while on vacation has crept into the popular culture and is now a familiar cliché that is as old as, well, Blackberries. The blurring of lines has also created a blurring of expectations. Now employees expect t...

Security Industry In 2016 To See Higher Megapixel Cameras, IT Security Strengthening And Adoption Of New Technologies

The year 2015 has been notable in several ways. Industry changes include a rise in Chinese manufacturers in the mid- to low-end market, more mobile devices providing video surveillance, and the rise of omnidirectional and higher-megapixel cameras. Unexpectedly, the industry also saw an increase in popularity of do-it-yourself security systems and the speed with which Chinese companies saturated the marketplace with “good enough” products. Omni-Directional Cameras Oncam welcomes th...

Aftermath Of The Paris Attacks Highlights Required Tradeoff Of Privacy In Counter-Terrorism

Second guessing is to be expected in the wake of terrorist attacks like the recent tragedy in Paris. After such attacks, security and intelligence professionals are prone to soul-searching – and to speaking out on the public airwaves –to address important questions: Could we have prevented it? What should we have done?  There tend to be two categories of second-guessing. The first centers on the idea that the intelligence community should have known about the planned attack and...

IP Access Control Moves Beyond Door Control Solutions, Evolves Into New Roles And Applications

Rapid expansion of access control into new roles has been fueled by panel-less architecture Our world has changed and our industry has changed with it.  Data now rules, and the network is king. The Internet of Things has driven customer expectations in how data is received and can be acted upon.  Advances in panel-less pure IP technologies have allowed our customers to redefine the applications of access control. These two colliding forces have put us all in the bus...

Cloud And Mobile Credential Offerings To Overtake Market For Card-Based Identity Systems In 2016

Throughout 2015 the security industry saw the appearance of numerous mobile credential offerings, signaling the “beginning of the end” of card-based identity, and strengthening of mobile offerings in general. Overall, the security industry enjoyed healthy growth throughout 2015, as reflected in the better-than-index performance of most publicly traded security company stocks.  Cloud companies, in particular, saw the market turning their way, as a number of security vendors hav...

2016 Promises More Widespread Video Analytics And Easier Installation For The Security Industry

As 2015 comes to a close, it’s a good time to look back at how our industry has changed this year and what we can expect for 2016. Specifically in the area of video surveillance, the trend toward higher resolutions continued this year. Whereas a few years ago, 720p was the most popular resolution for HD cameras, 1080p has now become the standard choice, and even higher resolutions, such as 4K ultra HD cameras, are seeing increased sales. Integrators are also using a broader mix of cameras...

Value And Quality To Drive Security Market Growth In 2016; Axis Expansion Plans

The security industry continued to grow in 2015, although it was a bit slower than expected. Most noticeably, we saw a lot of M&A activity throughout the industry, including our own new ownership under Canon. Business continues as usual, and we have and will maintain our separate brand. The industry also experienced more price pressure on hardware than in previous years. Axis U.S. Expansion Plans 2016, IP Video, IoT The discussion of price versus value will be a common one in 2016. There...

How Security Plans With Reliable Policies And Procedures Deliver Improved Operational Effectiveness

Automated procedures reduce manual errors & help meet regulatory requirements End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective securi...

The Role Of Security Integrators In Preventing Tailgating

Prevention makes tailgating impossible or extremely difficult due to the full height of an entrance Findings from the 2014 Tailgating Survey by Boon Edam Inc., Lillington, North Carolina, found that more than 85 percent of the 250 integrator and end-user respondents were not tracking the number of tailgating incidents. In the access control industry, tailgating is when an unauthorized person follows an authorized personnel through a controlled entrance. More than 50 percent...

Paris Attacks Shift Focus On Securing Soft Targets Against External Threats

Soft targets are civilian-centric places suchas churches and retail centres, where securityis not as fortified The terror attack on Paris on Nov. 13 lasted just 23 minutes. The bombers and gunmen split up and attacked seven sites: the soccer stadium where it all began, four restaurants, a bar and a concert venue. All told, they killed 130 people and injured 368 in the time it takes for a coffee break. This situation has raised questions about the security management for conce...

Implementing Security Market Technologies To Help Highway Authorities Deal With Wrong-Way Drivers

Technology can safeguard other motorists, and help highway authorities to communicate with wayward drivers to avoid accidents There has been a spate of accidents worldwide in which cars have been driven either knowingly or unwittingly against the flow of traffic and into oncoming vehicles. Existing and imminent technology from the security sector can prevent such occurrences, alerting responsive drivers to their error and safeguarding other motorists. I write this shortly af...

How Windows 10 Enhances ATM Security By Protecting Against Cyber Attacks

Speaking at ATM Security 2015 in London, Pat Telford, principal consultant at Microsoft Canada, summarized the software threats to ATMs and the features to combat them when migrating to Windows 10. ATM security is compromized by physical attacks on the cash, physical attacks on the card, replacement of the ATM computer (black box), and malware attack (where normally a person visits the ATM and adds malware). According To Telford, There Are Certain Immutable Laws Of ATM Sec...

IHS Report Examines Growth Of Body-worn Video Surveillance Market

IHS expects third party storage of data from body-worn cameras to become the majority portion of this market The world market for body-worn video surveillance within law enforcement is growing. In 2014 IHS estimated the total world market for body-worn video surveillance equipment and service in law enforcement was worth $60 million. However, interestingly the service portion of the market will grow to become a larger proportion than the hardware market by 2019; this is accord...

Risk Based Security Solutions – A Holistic And Balanced Approach To Security Management

Risk, in a security context, is the product of threat, vulnerability, and consequence Security as a discipline has been an important feature of society since cavemen started using the environment around them to protect themselves and their families.  As a discipline, security has developed exponentially and that trend is continuing; however, somewhere along the way key elements of physical security design have been forgotten. All too often solutions are deployed in a pre...

How To Protect The Internet Of Things' Vulnerabilities From Hackers

Hackers probably take more interest in your home computer and information about your identity stored there As the Internet of Things (IoT) grows, so does the hackable universe. Equipment designers need to start thinking about security in the first steps of manufacturing products, and companies and individuals need to start implementing secure coding practices to avoid hacking incidents. Last July, for instance, two security researchers hacked the computer in a Chrysler Jeep a...

How To Achieve High Quality Video With Lowest Bandwidth And Storage Needs

A lower bitrate reduces bandwidth andstorage requirements High definition and megapixel cameras provide more detailed images with more useful information, but this can come at a cost. The volume of data being transported and stored rises significantly. The bandwidth demand that this places on the network and the increase in required storage capacity adds significantly to the total IP system costs. The best place to reduce these costs is at the source – in the camera &nda...

What Is The Continuing Role For Server-Based Video Analytics?

Video cameras are smarter than ever. Video analytics functionality is available inside most cameras now on the market. Smarter cameras enable a system with distributed intelligence and also help to manage bandwidth and storage – on-camera intelligence can determine what video is important enough to tie up network resources and to eventually be retained or viewed. But on-camera video analytics have their limitations, and additional video intelligence at the server can add a new range of fun...

The Impact Of Smart Video Surveillance Technology And Analytics On Home Automation Systems

Modern home security systems have come of age with innovative technologies that enable homeowners to have complete control over every aspect of the system. MOBOTIX’s Keith Jernigan Sr. and Hunter Fort explore the immense capabilities smart video surveillance technology to make a huge impact on the home automation systems by driving down energy costs as well as storing massive amounts of data. Home automation is not as new as most people would imagine. It has been around for several decade...

Role Of Advanced Security Technologies In Enhancing Exhibits And Visitor Experience In Museums

With every technological advance that canbenefit museum management comes anotherthat may assist thieves  When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as m...

Rising Interest In Drone Detection And Tracking Due To Lack Of Regulations

  Williams Meredith recently stepped out of his Kentucky home to see a drone hovering over his porch, videotaping his young daughters by the family pool. It wasn’t the first time one of these small flying devices had wandered over to take a look, but it had never gotten so close. So he did what any red-blooded American would do when confronted with a home invader – he blew it from the sky with a single shotgun blast. The confrontation is another example o...

Breakthrough In Smart Phone Technology To Replace Proprietary Biometrics Hardware In The Next Few Years?

Are smart phones poised to replace all biometrics hardware in the next several years? That’s the bold prediction of Hector Hoyos, CEO of Hoyos Labs, one of the pioneers of biometrics technology who owns 59 patents (pending and issued) related to the field. The advent of the smart phone, which amounts to everyone carrying a computer in the palm of their hand, provides all the ability anyone needs to capture biometric information to use for verification, he says. Breakthrough In Technolo...

Ethernet Switches – Powering IP Surveillance Systems The Smarter And More Economical Way

Ethernet switches are often overlooked andsometimes deemed a cheap connectivity pointwith little to no importance The Ethernet switch is a critical link between cameras, network video recorders (NVRs) and computers that need access to video feeds. The Ethernet switch not only provides the data connectivity but often the power to the IP cameras via Power over Ethernet (PoE). Ethernet switches are the fundamental backbone of a Local Area Network (LAN) and the critical connectivi...

IoT Intelligent Building Systems Expose Security Threats And Challenges

The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organizations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...

Combating ATM Security Risks With Innovative Security Technology Reduces Costs

Recycling ATMs, which can reuse deposited cash to supply withdrawals, are another way in which ATM-associated crime can be reduced With some 3 million automated teller machines (ATMs) around the world, they are bound to be seen as attractive targets by some criminals. Banks need to ensure customers do not fall prey to skimming and other malicious attacks from criminals, by having an effective ATM security in place. The advent of contactless technology has eliminated the need...

Related videos

Time Challenge: Installation Of Battery Powered Aperio Cylinder

HID Powers Secure Mobile Banking For Santander International With HID Approve

Top-Of-The-Line Intercom Systems By DNAKE