IP security solutions - Expert commentary

Using Better Security Management Systems To Overcome Retail Industry Challenges

With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to...

How To Reinforce Your Cybersecurity Strategy

We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from in...

Four Emerging App Security Challenges Every CTO Needs To Know About

In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR wor...

Looking To The Future With Edge Computing

Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. I...

Ushering In A New Wave Of Video Surveillance Capabilities

Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras &mda...

Getting The Most Value Out Of Your ISC West Experience

Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as o...

Why Ease Of Installation & Flexibility Matter For Video Surveillance

There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of...

7 Steps To Make VMS System Design And Installation Easier

For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way...

Large Security Installations And What You Should Expect From Your Vendor

When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of the...

Beyond Cyber Security: Why Physical Security Must Be A Key Element Of Data Protection

Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorize him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth...

Data Security Experts At Bosch And Genetec Discuss Impact Of GDPR On Video Security

Today, more and more video security cameras are increasingly connected to the internet and transitioning into intelligent sensors that collect significantly more data than video security images alone. However, as this level of connectivity and collection of business-sensitive data becomes more widespread, the threat from cybercrime also rises. This is clearly an issue that affects everyone. After all, nobody is immune from cybercrime, not even the experts, which raises the question: What is the...

Shifting Focus: Internet Of Things (IoT) From The Security Manufacturer's Perspective

The term Internet of Things (IoT) has almost been beaten to death at this point, as more and more security integrators, manufacturers and customers take advantage of the ability to increase connectivity between devices (and therefore take on the dangers this introduces). But the methods by which we interact with the IoT and protect its devices are still catching up, which means security manufacturers must take part in shifting their focus toward safeguarding data, engaging in vulnerability tes...

Enhance Traditional Security Systems Within Your Smart Home

Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have at...

Five Best Practices For Protecting Video Surveillance Systems Against Cyber Threats

There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...

Impact Of Data-driven Smart Cities On Video Surveillance

The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...

Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emergi...

Are Mobile Credentials More Secure Than Smart Cards?

For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, al...

Artificial Intelligence (AI) Trends In Physical Security Systems

If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of appli...

Open Platform Security Solutions: Managing Customer Expectations

It’s not hard to see why more and more locations are requesting security solutions that operate on an open system. Selecting products and platforms that utilize open standards—Session Initiation Protocol (SIP), HTTP, IEEE, RESTful APIs, etc.—provide additional levels of interoperability, scalability and versatility that give organizations the flexibility they want to be proactive with safety and security. Unfortunately, creating the right solution today isn’t quite as si...

Impact Of Sophisticated IT Technologies On The Security Market

Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being l...

Security At Sea: Where Technology Benefits Marine Environments

The term ‘marine’ comes from the Latin mare, meaning sea or ocean, and marine habitats can be divided into two categories: coastal and open ocean. Video surveillance (VS) applications can cover both types of marine environment with system for ships, maritime ports, onshore and offshore installations, etc. We should want to further analyze VS for ships and try to explain the types of ships on which it can be used, the ways in which VS can be used on ships, the typical certificat...

Why Scalable Intelligent Communications Will Be At The Forefront In 2018

During 2017, we witnessed as the end-user came to realize that an intercom can be a silo if not properly integrated in with access control, video management, and their existing VoIP-based systems as well as designing intelligibility into every device. We believe the next generation of communication in the Age of Voice has accelerated beyond anyone’s expectations, and we will begin to see more and more attention on highly intelligible, interoperable and scalable intelligent communications...

How The Cloud Is Bringing Change Into The Security Market In 2018

  In January of 2017, ISONAS forecasted that the year would be a transformational year in access control with strong movement to IP access control, and that the adoption of IP access control hardware and software would significantly outpace the growth of the overall industry. In retrospect, our forecasts were on point and accurate. The industry has seen robust growth in the high single digits, while IP access control is seeing growth rates of up to 30-35%. The market drivers...

Learning To Combine The Cloud And On-Premise Security In 2018

This time last year, we predicted 2017 would be the year digital identities began transforming trusted access and other interactions in physical and online environments. Continuous Authentication Experience Demand grew for unified identity and access management systems supporting both cards and cellphone devices. Trusted identities began bridging the gap between connected workers and smart buildings. We saw new IoT use cases that employ location services technologies to create a continuo...

IP Convergence And IoT Drove Security Camera Market In 2017

This year has unfolded generally as predicted. Complete solutions have enabled IP video to further penetrate the small to medium business markets. IP convergence opened up new fast-growing markets for IP intercoms and IP audio systems. The preponderance of IoT devices has driven cybersecurity efforts to new heights. In addition, lower prices, along with the increasing investment needed in R&D to keep pace with rapidly changing technology, have led to market consolidation. IoT Creates Oppor...

Security System Interoperability To Become Standard In 2018

At ONVIF, we believe our perspective for 2017 turned out to be reasonably accurate. We did see an increasing interest for interoperability all the way to system-to-system level; not only within the security industry, but also in neighbouring industries where the prospects for IoT have drastically improved. I believe the industry as such has matured in its relation to IoT and today we can imagine how IoT will play a part of smarter and safer system deployments. Increased Cybersecurity Threat T...

AI, Cybersecurity And SaaS: 3 Key Security Trends For 2018

Global economic expansion and technology improvements continued to drive demand this year for IP cameras, network video recorders (NVRs), access control and other security technologies.   A Strong Year For Security Overall, 2017 represented another strong year for the security industry. A combination of falling prices and improved IP camera performance helped drive camera sales during the year as the migration from analog to IP continued to pick up momentum. Advancement...

2018 will see the start of advanced applications of video analytics in the security industry

Video surveillance solutions have come a long way in recent years, including this past one, with IP-based imaging solutions delivering incredible resolution and detail to provide higher levels of situational awareness, information and overall security. In 2017, we also witnessed how video surveillance serves an emerging need and desire to acquire greater business intelligence. Today’s cameras and VMS are able to truly deliver on the promise of IP video without requiring end users to break...

How Live Streaming Video Adds Security, Safety And Business Intelligence For End Users

End users can add security, safety and business intelligence – while achieving a higher return on investment at their protected facilities – with live streaming video. It can be deployed effectively for IP video, network video recorders (NVRs) and body-worn cameras. The growing use of streaming video is resulting in vast technological developments and high-end software that promotes reduced bandwidth, high scalability and lower total cost of ownership (TCO). Here’s how users c...

Download: Safeguarding Food Production With Video Surveillance

When we contemplate where and how our food is made, cleanliness and hygiene are typically at the top of the list of necessities. And when it comes to production facilities, strict regulations and sanitation requirements are in place to ensure that the highest levels of food safety are met.  This white paper by Oncam explores the different aspects of food safety and defense in the production, manufacturing and catering environments. It also offers practical guidance to the types of food cer...