Physical security - Expert commentary

Growing Need For Open Protocols In The Security Industry

If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security indus...

Fusion And Multi-Modal Biometrics Strengthen Physical Security Systems To Fight Against Terror And Crime

Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various...

Improving Security Decisions By Identifying Red Flags And Operational Inefficiencies Through Advanced Analytics

Access levels of individuals based on their roles can be cross compared with their normal access patterns, it is also useful to look for anomalies in device behavior Threats to an organization’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To combat this problem, security and IT professionals are fighting back with system upgrades and software solutions including advanced analytics. Using the analytics...

Wireless Tracking & RFID Enabled Real-Time Location System Protects Infants At Boston Medical Center

The Hugs Infant Protection Solution tracks the location of babies and provides protection anywhere the infant may be transported Wireless tracking and radio frequency identification (RFID) continue to improve dramatically in range and reliability, allowing Real-Time Location Systems (RTLS) pinpointing people, places and things with impressive accuracy. Systems integrator Advance Technology Inc. (ATI), Scarborough, Maine, recently installed a comprehensive, hospital-wide soluti...

Advantages Of Integrating Audio Monitoring And Sound Detection In School Security Solutions

Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this...

Deep Learning Technology Applications For Video Surveillance

The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...

Security Companies Embrace Corporate Social Responsibility To Improve Environmental & Social Impact

CSR applies to the security industry in many different ways and can be practised by small or large businesses What exactly is Corporate Social Responsibility (CSR) and how does it apply to the security industry? Let’s look at how two very different companies – Axis Communications and FGH Security – each put CSR at the heart of their operations. Corporate Social Responsibility means different things to different people, and is often used as a catchall for one...

Should Security System Integrators Embrace Robotics As A Differentiator?

The age of robotics is fast approaching. To be successful, security systems integrators need to understand how these machines fit in the security of their clients, according to industry experts. “The integrators did not begin this trend,” says Bill Bozeman, President and CEO of the PSA Security Network, cooperative of security product suppliers and system integration companies. “They did not say, ‘Oh boy I can’t wait to introduce robotics into my portfolio'. This i...

ASIS International Inaugurates Security Week To Give Back To Orlando Community

Security Week is designed to give something back to the Seminar’s host city in exchange for its hospitality The 62nd ASIS International Seminar and Exhibits will run from September 12 to September 15 in Orlando, Florida. ASIS estimates that the Seminar may attract more than 20,000 security professionals to the Orlando Convention Center, where the event is being held. Giving Back To The Host Community The Seminar always has a major economic effect on the host community...

Web And Social Media Intelligence Transforms Security And Safety Planning

Web and social media platforms offer vast array of information for enhancing security, investigating breaches, and streamlining operations Over the course of the last decade, we’ve seen a blurring of lines between cyber and physical security concerns. Whether it’s the hacking of corporate information or the use of social media for nefarious activities, it’s clear that these once-separate security disciplines are often tied together. As a result, various orga...

Shooting Incidents Highlight Importance Of Hospital Security

Hospital security always counts. Patients may arrive from a crime scene and someone has to make sure they weren’t followed by trouble. Doctors, nurses and other medical personnel may come under blame for the death of a loved one and need protection. Heightened Security Needs Think for a minute, though, about the elevated need for security when the victims of a massacre — such as the Orlando massacre — arrive at the hospital. On the heels of the shooting at the Pulse Nightclu...

Technology Streamlines And Improves Visitor Management At Healthcare Facilities

Part 4 of our Security in Healthcare series    Secure visitor management integrated with physical access control systems (PACS) is increasingly popular Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-c...

Empowering Next Generation Smart Buildings With Data Correlation

The market for smart buildings has expanded exponentially to greater benefits including life safety, security, and intelligence Much like the term “Internet of Things” or “IoT” the concept of “Smart Buildings” brings to mind many different ideas -- from programmable thermostats to touchless faucets to other green-building initiatives, with a focus on environmentally-friendly and energy efficient designs.  While the early days of smart b...

Open Standards Simplify Integration And Enhance Performance Of Cloud-Based Access Control Systems

The rate of adoption of mobile credentials will progress quickly, because of its exciting value proposition Cloud computing has been around for some time now, starting with the formal public Internet in 1990. But the nature of it has changed and evolved quickly and dramatically. Now, the cloud is becoming foundational to many emerging security applications, including mobile credentialing involving Near Field and Bluetooth communications, with the Internet of Things (loT) poise...

Evolution Of Revolving Door Security: Teaching Old Doors New Tricks

Revolving doors have been around for well over 100 years since their invention by Theophilus Van Kannel in 1888. As the story goes, Van Kannel, working in a lobby during a cold winter in Philadelphia, complained about the unpleasant effects of the swing door at the main entrance: “Every person passing through [the exterior door] first brings a chilling gust of wind with its snow or rain, and the noise of the street; then comes the unwelcome bang!” Van Kannel decided to do something...

IFSEC Day 1: H.265, Apps And Cybersecurity Shine Through Other Security Innovations

H.265 compression, apps and the inherent security of security systems were some of the themes to be gleaned on the first day of IFSEC International. Almost every video exhibitor I saw on day one of the show mentioned that many of their products use H.265 compression in these days of high definition, bandwidth-hungry cameras. Over at Vivotek’s stand, for example, Emilio Sanchez, project consultant, spoke of the company’s H.265 Smart Stream compression algorithm. He said this saves an...

Unease About Security Of Members Of Parliament Escalates After Cox Tragedy

There is a contrast between high levels of security inside Westminster and little to no security outside the safe environment The fatal attack on 41-year-old Jo Cox, a Labour member of the British Parliament, on the street in her district in West Yorkshire in Northern England, is increasing calls for greater security of Members of Parliament (MPs). Cox was stabbed and shot to death June 16th outside a library in Birstall, where she was meeting with constituents. There have be...

Frank Cannon To Educate IFSEC Attendees On Employee Security Awareness Program

A security awareness program is an educational process to help employees observe events or people through a “security lens” Organizations have a duty of care to protect their employees wherever they work. But in the increasingly complex world that we all live in, the ability to deliver a risk-commensurate and cost-efficient security program that adds real value to a business is extremely challenging, according to IFSEC International 2016 speaker Frank Cannon....

Impact Of Convergence Of Internet Of Things And Physical Security On VMS Offerings

IPVideo Corporation, Bay Shore, New York, recently announced a new OEM agreement with Milestone Systems Inc., Beaverton, Oregon, in an effort to provide deeper and wider options in its portfolio of video management solutions. According to Steve Rice, Director of Business Development, the partnership will allow the company to reach a broader number of enterprise customers and provide them with distinct choices – and two completely different video management system (VMS) offerings. On the t...

Positive Signs Point To New Systems And Applications For Video Analytics

Multiple trends point to a maturing video analytics market that is poised to meet or even exceed customer expectations Systems that use video analytics, also known as video content analysis, have a checkered history in the security market. Since the technology was introduced amid much fanfare a dozen or more years ago, opinions about video analytics have sometimes been undermined by systems that did not live up to the initial hype. In fact, early failures continue to taint per...

Resources For Helping Physical Security Professionals With Cybersecurity

There are resources to help guide an organization’s management of cybersecurity risks, most prominently from the National Institute of Standards and Technology (NIST) and the U.S. Department of Homeland Security. NIST defines cybersecurity as "the activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.&rdquo...

Avoiding The Cybersecurity Risks Of Cloud-Based Security Solutions

Cloud connectivity can provide a linkage between the mobile users and the facilities and systems they want to interact with From enterprise applications to small businesses, schools, health care facilities and beyond, investments in physical security systems provide valuable resources to help protect people, property and assets – and ultimately the financial security and well-being of the organization. As need and demand for better security has dramatically increased ove...

Why Surveillance Professionals Find H.265 Video Compression So Appealing

Though primarily developed for consumer electronic devices, the advantages ofH.265 compression technology make it ideal for the world of physical security Ever since digital video systems were introduced the race was on to develop compression technologies to reduce runaway bandwidth and storage consumption. We’ve watched the industry roll out MJPEG, MPEG and H.264 advanced compression standards in direct response to each innovation. With adoption of HDTV and 4K solutions...

Next Generation PSIM Solutions Widen Scope For Traditional Command And Control Systems

 PSIM systems extend their value beyond emergencies by including routinemanagement tools, that provide value during daily operations, such as automatingmaintenance activities Physical Security Information Management (PSIM), an acronym termed to describe a family of software platforms that claim to replace traditional command and control (C&C) systems, primarily used to provide situation awareness in control and monitoring centers of Critical Facilities. Traditional C...

Surveillance Industry’s Higher-Megapixel Migration Impacts Processing Power, Bandwidth Consumption And Storage

From a network performance perspective, adding higher megapixel camerasaffects bandwidth utilization The quest for higher megapixel, high-definition and high-resolution video imaging continues, only now, it has become a marathon of sorts. That’s because the migration will progress decidedly – extending into the foreseeable future and beyond – as technology advances and becomes increasingly affordable. Ultra-high-resolution video is finding its niche, even am...

Benefits And Challenges Of Omnidirectional Cameras In Video Surveillance Market

As the technology in omnidirectional cameras continues to improve, they are becoming increasingly more affordable to a wider segment of the video surveillance market Just a few years ago, omnidirectional cameras were a novelty. Today, however, this technology has taken the leap to the mainstream. Think about how ubiquitous Google’s Street View is, and you can gain a better idea of the power of omnidirectional cameras. Even consumers are starting to see many forms of omn...

How Smartphone Access Control Credentials Strengthen Security And Minimize Risk To Organizations

PIAM solutions ensure that credentials are onboarded to all the right systems The number of credentials people are carrying is on the rise. At any given time, an individual may be carrying badges, cards or other ID devices for their office, the gym, public transit and more, not to mention credit cards and government-issued identification. The more credentials people carry, the greater the challenge of managing and tracking these credentials poses, and the more likely that they...

Misguided Trust Leads To Increase In Security Risks And Potential Attack From Intruders

Stringent security policies are necessary in an organization to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin...

Developing Innovative Aviation Security Technologies To Prevent Future Terrorist Attacks

What effect will the attacks in Brussels have on aviation security? Screenings inpre-security airport areas have been uncommon, but may become standard practice Will the Brussels airport attack herald a new era of aviation security? Like the bombing of Moscow’s Domodedovo Airport in 2011, the Brussels attack took place “landside”, meaning that security precautions would have been low-key and limited to spot checks and the general watchfulness of police office...

ISE Emphasize Need For Improved Hospital Security Program To Avoid Attacks On Specific Targets

ISE’s research shows that healthcare facilities & hospitals security programsto ward off determined attackers going after specific targets A well-known security axiom posits that an effective security program can discourage would-be attackers, causing them to move on in search of softer targets. But it doesn’t always work that way. Take healthcare facilities such as hospitals, for example. Prospective attackers with no particular target in mind may see a w...