Articles by Larry Anderson
In-vehicle technology allows security officials to view live footage from the bus’ cameras during an emergency One of the biggest security opportunities in transportation is onboard surveillance for buses and trains. While most transit organizations have invested heavily in video security for facilities such as terminals and stations, far fewer have taken the next step and installed IP cameras on board vehicles, says John Recesso, strategic business development manager,...
Given a readily available supply of investment money to the security industry, might we see even more mergers and acquisition (M&A) activity in the coming year? Such appeared to be one message as the Security Industry Association (SIA) Investment Trends Committee presented an update on security-related capital markets, M&A and investment information. In the “middle market loan market,” where all but the top several security industry companies might look for money, there are...
The sale of Siemens’ Security Products to Vanderbilt is expected to close by the end of March, and already the owner-to-be is making good progress to form a new stand-alone company. Notably, the pending transaction is not a sale of company shares but rather a sale of assets, in this case product lines in the access control, CCTV and intrusion categories. In effect, a company is being created to manage those assets, and Vanderbilt has been working for the last several months to create the...
Education is always a hot vertical market, so Panasonic’s acquisition of Video Insight is not a surprise considering the video management system (VMS) supplier’s popularity among school professionals. Panasonic cameras have been installed in a lot of schools, too, and the Japanese conglomerate has several other product categories that also play in the school market, such as interactive white boards, audio systems, etc. The surprising aspect of the acquisition, announced this week, i...
Decision-making and investigations are faster if operators don’t have to navigate among different applications Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy Migration, Simple Pricing Model AMAG’s Symmetry platform includes access control, photo...
“The quality couldn’t be clearer – something the police hope will help capture the criminal you are about to see.” The local news report then shows an image from the surveillance camera video of an ATM robbery in Arlington, Texas. The video depicts a black Kia automobile rolling up to a Wells Fargo ATM, and the 21-year-old female driver makes a withdrawal. The video then shows a robber sneaking around the ATM and surprising the victim. He’s holding a cell phone in...
Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to ma...
The security landscape continues to evolve in new, complex ways for transportation customers Dealers looking to enter – or to expand their presence in – the transportation vertical must adapt to the unique needs of each transportation agency customer. Issues such as limited budgets/resources, aging technologies, operational challenges and safety issues must all be considered when designing a system to best meet an agency’s needs. Integrators should seek to...
I speculated earlier about an anticipated spike in demand for body worn cameras in response to the highly publicised shooting incident in Ferguson, Mo., last August. An analysis of a database of procurement activity and spending plans from more than 80,000 government entities in the United States confirms the continuing impact the shooting is having on the demand for body worn cameras. Reflecting what might be called the “Ferguson effect,” government data firm Onvia reports there we...
A lawsuit filed by the parents of children killed in the Sandy Hook school shooting in 2012 highlights how the best-thought-out security plans can fall apart because of details and/or last-minute changes. Before the tragedy unfolded, Sandy Hook Elementary had established protocols in place to cope in the event of an active shooter incident. However, some of the protocols broke down on the day of the shooting, and it’s possible that additional young lives were lost as a result. A lawsuit f...
ObjectVideo shook the industry a few years ago by launching a series of lawsuits against the industry’s big players, claiming infringement of ObjectVideo’s patents on the basic technologies of video analytics. Some of the targeted companies fought back, but in the end most opted to make the issue go away by signing a licensing agreement with ObjectVideo. The latest twist in the story is major video supplier Avigilon’s acquisition of those patents – and of the 19 related...
Klass Software’s acquisition of incident management software company PPM 2000 is the first step in an evolution to build a broad, unified software solution to manage multiple aspects of the security function. In buying PPM, Klass sought to obtain “a very good platform business and grow it with the existing team,” says Will Anderson, CEO of Klass Software (and now CEO of PPM). He sees expansion and enhancement of PPM as a “long-term project,” maybe 10 years. Klass S...
More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...
The recent terrorist acts in Paris defy any understanding or explanation. The events represent a level of mayhem that defies easy answers, emblematic of a global security threat that demands a unified, worldwide response way beyond what is achievable by any combination of technology gadgets. Simply put, the problem is not our industry’s to solve. It’s bigger than we are. Still, such events haunt the people in our market – dedicated as we are to protecting people, facilities and...
Cameras at airports today are often used for operations rather than (or in addition to) security Video cameras are great tools for security at airports, but increasingly cameras are offering operational benefits, too. Anthony Incorvati, business development manager, critical infrastructure and transportation, Axis Communications, says cameras at airports today are often used for operations rather than (or in addition to) security. For example, cameras mounted at departure gate...
Global positioning systems (GPS) have a role to play to combat shoplifting, especially in the fight against the growing trend of large-scale organized retail crime (ORC). Todd Morris, founder and CEO of BrickHouse Security, recently explained to me how GPS fits into the fight against retail crime. A variety of GPS devices – from small “micro” sensors to plug-in devices for cars to wired devices – can all be tracked using the same cloud-based service, which manages the de...
It has been interesting to read all the Review and Forecast articles we published over the last month. The holiday season was a perfect time to reflect on the previous year, and it is interesting to read about all the companies, their visions for 2015 and their accomplishments. It reminds me how lucky I am to be a part of an industry dedicated to protecting assets, people and facilities. The opportunity to report on a constantly changing business climate and a wealth of interesting technology is...
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...
2014 was a year for eye-popping merger and acquisition (M&A) activity in the security space. The big deals of the year included some of the largest names in the industry. One name is larger than any in the security market – Google, which made not one but two acquisitions this year that could impact the future security market. It was also the year that a smaller player in the video camera market (although a huge familiar brand overall) bought a large, open systems V...
The Metropolitan Atlanta Rapid Transit Authority (MARTA) has a lot of resources to protect. A network of video cameras view MARTA’s 38 stations, three rail yards, five bus garages and other infrastructure located within 30 or so different law enforcement agencies in and around Atlanta. The large number of existing fixed cameras will be augmented with about 1,000 additional cameras for a total of 2,200 or 2,300 cameras in the system in coming years. Cameras are connected using an Omnicast v...
When is an acquisition not really an acquisition but rather the “sale of shares by one corporate conglomerate to another?” Such is the core question in the aftermath of Samsung’s sale of its interest in Samsung Techwin to fellow Korean conglomerate Hanwha Holdings. Samsung announced sale in late November of its 32.4 percentage ownership in the video surveillance company (as part of a larger sale of its defense and chemical affiliates). The 32.4 percent of stock represents the...
Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...
Video walls are growing in popularity in security applications, providing everyone in a control room access to the same current information at the same time. They are a perfect way to display the “big picture” – literally. Video walls are often used in situations where several people are working together to create a coordinated effort, whether related to security, emergency response, process control or other discipline. In the security sector, video walls are commonly used in...
Continued training is critical to keep up with rapidly evolving access control technologies Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a seasoned veteran or still new to the industry, continued training and education are critical given that access control technologies continue to evolve at a rapid pace. System integrators who do not take advantage of manufacturers’ training s...
Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillance as it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...
A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...
Access control systems that leverage proprietary technologies severely limit system flexibility Access control’s ongoing transition from closed systems to more open integration provides benefits for integrators, and especially for end users looking to maximize their system return on investment. End users want greater flexibility, specifically in terms of hardware choice. As a result, more non-proprietary solutions are coming to market. For the integrator, offering more o...
Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...
January 5, 2015 is the deadline to suggest changes to the National Fire Protection Association’s two documents that serve the security marketplace. Anyone can provide public input into the standards through the NFPA website. NFPA 731: Standard for the Installation of Electronic Premises Security Systems provides guidance on how to install, test and maintain electronic premise security systems and their components. Its specific requirements are written so that they can be easily incorporat...
Cybersecurity is an ongoing concern in the realm of home automation and security systems. Joe Albaugh brought a unique perspective to the subject in July when he became Chief Security Officer (CSO) of Vivint, the second largest residential security and home automation provider in the United States. Albaugh’s approach to the cybersecurity aspects of home automation is based on his 20 years of experience including past positions as chief information security officer for three large, critical...
