Round table contributions
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
In many regards, 2018 was a turbulent year for the physical security marketplace, driven by evolving technologies and changing customer needs, among other factors. Year-end is a great time to reflect, so we asked our Expert Panel Roundtable: What caused the most disruption in the physical security marketplace in 2018?
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panelists explain. We asked: What new technologies are helping video systems overcome concerns about privacy?
When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system’s health is much easier, and a variety of systems can be deployed to ensure the integrity of a system’s operation. We asked this week’s Expert Panel Roundtable: How can remote monitoring of a security system’s health and operation impact integrators and end users?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How can attendees maximize the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?
Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
“Don’t try this at home.” It’s a common warning, but how does it apply to security systems? With today’s systems becoming easier to install, and with customers becoming more tech-savvy, there is a growing market for “do-it-yourself” or DIY home security systems. The trend also extends beyond the home security market: Business end users may also think they can forgo a professional installer and handle installation in-house. The customer may save money by installing a system, but at what risk? We asked this week’s Expert Panel Roundtable: What are the pitfalls of “do-it-yourself” when it comes to security systems?
Even the most effective technologies usually require some level of human involvement. What new technologies do, generally speaking, is change the nature of a human’s role. Most jobs in today’s world are vastly different than 50 years ago, in many cases because of the changing role of technology. In the physical security world, what specific impact does technology have on the human element of systems? We asked this week’s Expert Panel Roundtable: Have recent developments in security systems made manpower more, or less, important to the equation? Explain.
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?
Technology is changing at a break-neck pace, and the security marketplace is currently being bombarded by a wealth of new capabilities and innovations. But what will be the impact? Which of the currently-hyped new innovations will have a major impact, and which will fade over time? And even acknowledging the long-term significance of various technologies, what can we expect to be the more immediate effect? We asked this week’s Expert Panel Roundtable: What new security technology is poised to have the greatest impact in the second half of 2017?
As part of Johnson Controls continued commitment to providing customers with the most advanced and innovative solutions, the company is introducing Magos Systems perimeter protection radar to the North American commercial security market, which will be showcased at ASIS International’s 63rd Annual Seminar and Exhibits in Dallas, TX. This radar technology is suitable for a wide variety of security applications and can be implemented in facilities ranging from oil & gas production sites, utility substations, campus environments, ports, to smaller sites such as data centers, warehouses, car lots and construction sites. Cost Efficient Perimeter Protection Solution While radars traditionally were affordable only to governments, militaries, and highly budgeted entities, now Magos can provide a cost-effective solution to commercial security clients, that is simple to implement and works in all weather conditions. The cutting-edge technology helps reduce false alarms, cut down on the number of security cameras and eliminate the need for constant monitoring. “We recognized a need from our customers in North America for a low cost and effective perimeter protection solution,” said Joe Oliveri, Vice President and General Manager, Security, Johnson Controls’ Building Technologies & Solutions, North America. “After carefully examining options for superior perimeter protection solutions, we determined that Magos offers the most robust and lucrative technology and can become a game-changing offering. Johnson Controls teams evaluated the system through a series of customer-pilots for over a year, and results exceeded expectations. We are confident this revolutionary product will improve the efficiency of security systems for our customers.” Real-Time Detection Drexel University, a leading global research university located in Philadelphia, Pennsylvania was looking for ways to mitigate risks and deter unwanted visitors on their sport fields. “We are always looking for innovative efficient solutions to meet our security challenges and Johnson Controls introduced us to Magos to address perimeter protection issues,” said Joseph Spera, Director of Operations, Drexel Public Safety. “With our previous solution the area was vulnerable to unwanted visitors and damage, and real-time detection was impossible. With the new solution, including a Magos radar unit and a PTZ camera, we are notified of breaches as they occur and are now able to effectively deal with issues and mitigate risks, dispatching patrol when needed.” The reselling, distribution and integration agreement with Magos emerged from Johnson Controls Open Innovation, a program launched to foster collaboration between the company, customers and cutting-edge technologies by startups.
SourceSecurity.com’s Expert Panel covered a lot of ground in 2016 about a variety of topics in our Roundtable discussions. The very most-clicked-on Roundtable discussion in 2016 was about how to choose between a cloud-based system and a server-based system. Other hot topics that made the Top-10 list of Roundtable discussions included edge-based video storage, the challenges of commoditization, and mistakes customers make when buying and installing security systems. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2016 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2016, including the quotable panelists named below! 1. What factors should a customer consider when choosing between a cloud-based system and a server-based security system? "Invariably the choices will be driven by security processes in place within the corporate environment and by ensuring the remote system is as impenetrable as the corporate network. Both options potentially leave the corporate network vulnerable to a determined cyber attacker, so the systems and access points to the network need to be sufficiently hardened to deter or prevent attacks.” [John Davies] 2. What is the most unusual application of surveillance cameras you have seen recently? "The most unusual application I’ve seen is the use of 360-degree fisheye cameras mounted on mobile poles for security along a marathon route. The poles were mounted on mobile units that contained power and communications infrastructure. Multiple mobile units were driven and placed along the route so that the entire route was constantly under surveillance. " [Jumbi Edulbehram] 3. What is the biggest mistake you see your customers make when it comes to buying or installing security or surveillance systems? "Too many businesses fail to take full advantage of the breadth of services available for maximizing tools like remote diagnostic services, for example, which allow customer service teams to regularly and proactively check equipment quality and make repairs remotely." [Joe Oliveri] A number of major security companies are offering cloud video surveillance solutions apart from the traditional server-based systems, but which is best for the customer? 4. How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense? "The industry commonly holds that 20 pixels/foot is enough for general surveillance, 40 pixels/foot is the minimum for facial recognition and license plate identification, and 80 pixels/foot is used for higher detail like reading logos, names embroidered on a shirt, etc. " [Jason Spielfogel] 5. What is the value of edge-based storage and in what specific applications? "Recording at the edge frees up network bandwidth and PC processing power, allowing users to view and manage video feeds and store applicable images for later use or transfer to the network when necessary. " [Dave Poulin] 6. How can security integrators replace revenue in the age of commoditization? "The integrator community needs to learn to embrace what hundreds of other contractor businesses have. They need to improve their predictable cash flow and margin by offering contracted services. Call it what you like – RMR, managed services, monitoring – the description makes no difference. The integrator community simply needs to get off their butt and make it happen. " [Bill Bozeman] 7. How successful was ISC West 2016? Did it meet your expectations? "It was unanimous that 2016 ISC West was the best show we have participated in Arecont Vision history! Activity on the first two days was especially strong with Systems Integrators, Dealers, Distributors, End Users, and A&E/Consultants. These people all came to see our new product line and were especially interested to see the product performance improvements and ease of installation and setup." [Scott Schafer] More of us are depending on social media smart phone apps as a source of information, providing new levels of immediacy that dovetail well into security, specifically in areas of emergency notification 8. What are the physical security challenges of "safe cities" applications, and how is the market meeting those challenges? "One of the challenges is, of course, to make systems from different manufacturers work together. Interoperability is important not only from an operator’s point of view, but also in how cities and their internal divisions should respond to incidents reported by the security systems. " [Per Björkdahl] 9. How should integrators/installers differentiate themselves or make themselves stand out in today’s market? "In today's market, it's all about customer service. Almost every integrator has good product – and most of these products do a lot of the same things – but what sets integrators/installers apart is the level of value-added support they are providing to their accounts. Increased support through training, follow-up, open communication and keeping them informed on emerging technologies can really speak to the needs that end users have and why they will remain loyal.” [Mitchell Kane] 10. What role can social media play in the security marketplace and/or as a tool to promote better security in general? "Social media has weaved its way into our daily lives and is an integral part of our interaction with customers in the marketplace. Social media outlets bring the human element to interfacing with our communities and customers. This humanization allows us to address sensitive topics like the recent events in Orlando and how to take preventative measures in the future." [Melissa Stenger] See the full coverage of 2016/2017 Review and Forecast articles hereSave Save
The ASIS show has not traditionally been a big forum for new product introductions -- those happen mostly at ISC West in the spring. Even so, there is plenty of technology to see at this year's show, and many exhibitors now say the products they were talking about last spring are now ready to ship. On Day Two of the show, it seems a lot of the attendees are ready, too. Video Camera Technology The technologies of video cameras march on, and Hanwha Techwin America has embraced the new H.265 codec in a big way. All their cameras since last January have offered three different streaming options -- H.264, MJPEG and H.265. In addition, Hanwha offers its WiseStream smart compression. Combining H.265 and WiseStream enables video outputs that use 75 percent less data, according to Hanwha. The company is leveraging the better compression to enable cameras with higher resolutions (and at 30 frames per second). For example, at ASIS, they are introducing an 8 megapixel multi-sensor camera (four 2-megapixel sensors) that provides video at 30 frames per second at a manageable data level (in fact, according to Hanwha, combining WiseStream and H.265 makes the bandwidth comparable to a 1080p camera using H.264 compression). Hanwha is displaying a complete H.265 at ASIS, including the company’s own H.265 cameras, network video recorders (NVRs) and software Hanwha has been on a tear in the product development department, introducing 46 new products this year. Previously there were two camera lines; they now have five, including a mid-market line that falls between their existing lines, and new premium 4K cameras that include the new multi-sensor camera, fisheye cameras and multiple form factors. Features like simplified focus make the cameras easier to install. Detractors of H.265 say the technology creates a costly processing burden on the server side. In answer to detractors -- and to prove the viability of H.265 to a market where implementation has lagged -- Hanwha is displaying a complete H.265 at ASIS, including the company’s own H.265 cameras, network video recorders (NVRs) and software.Ensuring Reliable Solutions But not all end users want to be at the cutting edge of technology. Many prefer to stick with tried-and-true solutions. “Technology moves very fast in this channel, but I think as fast as we think it’s moving, there’s also a moment of ‘hang on, we’re talking about technology and security,’” says Minu Youngkin, Market Manager at lock manufacturer Allegion. “There’s no history to this technology yet. I know wireless locks work, but users need a solution that’s reliable, and you can’t prove reliability with history if it’s new. As manufacturers, we owe it to ourselves to make sure we are constantly doing the due diligence, working with software partners, and taking into consideration the ‘what if?’” Allegion is introducing a new mortise lock in its Engage wireless technology platform. The LE Series mortise lock joins the previously introduced NDE Series cylindrical lock as Allegion continues to fill out its selection of wireless locks. Youngkin says end users, who are the predominate attendees of ASIS, tend to speak more broadly about complete solutions, not as specifically about products, which integrators tend to do. And the levels of technology understanding vary widely among ASIS attendees. Most of the Allegion booth visitors at ASIS are looking for retrofit solutions to existing installations, she comments. Tyco-Johnson Controls Merger I spoke briefly with Joe Oliveri, Vice President and General Manager of Tyco Integrated Security, about Tyco’s merger with Johnson Controls, which was recently finalized. He noted that Johnson Controls’ and Tyco’s complementary branch structures will offer opportunity for both companies to leverage each other’s customer bases. “We can sell more to existing customers,” he commented. Tyco Integrated Systems will keep its name, and other high-profile Tyco brands such as Software House and SimplexGrinnell will also continue under the new combined company, named Johnson Controls. "It’s really about being bold and nimble and innovative, I don’t want to just be a security player, I want to bring new technologies to customers" Oliveri sees technology innovation playing a big role in the market, especially as a differentiator for integrator companies like TycoIS. “It’s really about being bold and nimble and innovative,” he says. “I don’t want to just be a security player, I want to bring new technologies to customers.” TycoIS operates innovation labs in Tel Aviv and Silicon Valley, vetting security solutions for some of the biggest end user customers in the world. At ASIS, they are highlighting innovative technologies such as Magos ground-based radar that enables protection of wide areas inexpensively. Another technology is Convexum’s proactive counter-drone cyberfencing -- it identifies the frequency of intruder drones and then lands them safely outside a protected zone. Many of TycoIS’ customers are early adopters of such technologies. TycoIS is also highlighting its ability to view systems data remotely, and to solve problems remotely without needing to roll a truck to a site. Working With Data Data increasingly has a role helping to secure a facility, and several companies at ASIS this year are introducing new ways to use data -- both for security and also for other business purposes. An example is Qognify’s Operations Intelligence Center, which enhances the abilities of Qognify’s Situator software management system. Situator ties together multiple sensors into one interface that enables detection and guides and tracks response. The Operations Intelligence Center extracts and analyses data from Situator about threats and responses, and presents customized dashboards to inform users about issues such as response times. Data can be analyzed and filtered according to specific information or time intervals, and then compared to external metrics or information such as occupancy or company sales. The resulting analysis can provide valuable insight about a business -- and how it can be more efficient, effective and/or profitable. The goal is to analyze security information in terms of how it affects overall business operations and success. It's intelligence that can enable a security department to make money rather than cost money.
Iris Identity Authentication Technology expands TycoIS access control portfolio with EyeLock Tyco Integrated Security (TycoIS), one of the leading security systems integrator, today announced it will partner with EyeLock LLC, one of the market leaders of iris-based identity authentication solutions, to offer Iris Identity Authentication Technology to its customers.Through this partnership, TycoIS will help provide its high-security customers with the additional protection and peace of mind provided by advanced access control. EyeLock's technology represents a breakthrough in proprietary software, security, algorithms and optics, and delivers the most secure, reliable and user-friendly capabilities available in the market today.“TycoIS is committed to offering innovative solutions and advanced technology to meet our customer’s unique needs,” said Joe Oliveri, Vice President and General Manager, Tyco Integrated Security.“EyeLock’s technology is a welcomed addition to our access control offerings. It helps provide more accurate identification and authorization of personnel, which can be integrated and operate on our platforms, offering the potential for greater value and confidence for our customers.”Mobile-Enabled Authorization Of PersonnelThe iris authentication technology looks at more than 240 unique iris characteristics, and is one of the only in the world to utilize dual-eye authentication. In addition to its outstanding security features, EyeLock’s portable template allows mobile-enabled users the convenience of hands-free and true two-factor authentication. As users get within range, the mobile device automatically sends their template to the reader via Bluetooth and access is granted if their iris is matched. The combination with TycoIS’ proven experience in access control integration can help provide more safety and security benefits for customers.“For EyeLock, this partnership marks a major milestone in the growth and widespread market adoption of iris-based identity authentication as the game-changing biometric measure in the field of security and access control,” said Anthony Antolino, chief marketing and business development officer, EyeLock. “We are excited to offer our Iris Identity Authentication Technology to TycoIS customers and showcase the benefits of next-generation security solutions.” Save
Available via a unified GUI, Total Security allows users to remotely manage more than 20 security tasks in real time, from anywhere on any Internet connected device Tyco Integrated Security (TycoIS), the leading security systems integrator, announced the availability of Total Security, a solution including access control, IP video surveillance and intrusion detection. Available via a unified graphical user interface (GUI), Total Security allows users to manage multiple security tasks on any Internet connected device. With real-time alerts, remote arm/disarm capabilities, access management and live video look-in, Total Security provides new ways to help improve workplace safety, security and business operations. "Today's always-on, always-connected workforce was a key driver in building out the Total Security solution for our customers," said Joe Oliveri, Vice President & General Manager at TycoIS. "By combining best-in-class video surveillance, access control and intrusion detection, organizations can save time and money on system maintenance better spent concentrating on core business functions." Scalable Structure Total Security enables business owners and security managers to remotely manage more than 20 security tasks in real time, from anywhere. Tailored for mid-size businesses, the solution scales to larger environments as business and operations grow. Solution components include: Kantech Intevo and Exacq /AD Illustra for video integration Kantech KT Series for access control DSC NEO intrusion detection EntraPass Web and Go mobile application Convenience And Efficiency The solution's out-of-the-box integration makes it easy to implement and operate multiple components of the security system with minimal effort. Total Security provides one app view for access control, video surveillance and intrusion detection, which helps users avoid spending time and resources contacting multiple providers for questions, software upgrades, service and administration. Additionally, the simplified solution is available on any Internet connected device, making it ideal for business leaders on the go.