Security access systems - Expert commentary

Key To IoT (Internet Of Things) Success: Scalable Computing Platforms

A true IoT platform is the confluence of Internet, business and sensory data The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on data-center resources and accumulating at a rate faster than anyone can process. Is the proliferation of sensory data simply evidence of an increasingly intrusive world, or can IoT be used for the improvement and development of intelligence-equipped cities...

Importance Of Upgrading Physical Security Systems

Regular upgrading ensures all systems communicate correctly  In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent upgrading isn’t even a choice anymore – it’s a must to avoid losing valuable time and data. In this article, Dirk Kappert, IT specialist and CEO of the German company ACEA, explains about the relevance of upgrade assurance and how it applies to phys...

Addressing Business Goals For Transportation

Many purpose-focused stand-alone systemsaddress business goals aside from security Transportation gets passengers and goods to their destination safely and in a timely manner. Making transportation possible are purpose-focused stand-alone systems – many that address business goals and others that achieve safety/security goals. Some systems can impact both business and security goals. For example, access control can eliminate the expense and maintenance of locks and keys...

Design CPTED From The Start – Don’t Try To Add It Later

CPTED focuses on designing crime prevention into buildings and campuses In recent years, jurisdictions across the United States have enacted ordinances or codes requiring the use of Crime Prevention Through Environmental Design (CPTED). Enforcement of these measures arises through required jurisdictional review and approval of CPTED measures in the design drawings. CPTED has emerged in recent years as an effective crime prevention and security technique that focuses on design...

Workplace Violence Is Declining, But Employers Still Need Guidance

While the number of incidents is falling, hundreds of thousands of workplace violence incidents still occur every year More than 572,000 people met with a violent crime at work during 2009. In addition, workplace violence caused 521 homicides in 2009. The Bureau for Justice Statistics (BJS) reported these numbers (the most recently updated) in a study of workplace violence between 1993 and 2009. That is a lot of violence. Surprisingly, though, those numbers show a significant...

After Military Service, Many Bring Their Skills To Security

As more veterans exit the military at the end of tours, an increasing number will likely be turning to security firms for employment You can identify the military veterans among private security guards by the way they wear their uniforms, according to one security company executive. Each veteran looks comfortable in the uniform and exudes a confidence you don’t often see among those without a military background. It comes as no surprise that security companies like to h...

Future Optimistic For Enhanced Usage Of Security Systems In Transportation

Better, faster networking plays into the optimistic outlook for the transportation vertical Our market has plenty of reasons to be optimistic about the future of security systems in the transportation vertical. “Given the advances in processing power and technology, we can only imagine what the capability of an IP camera will be in five years,” comments Anthony Incorvati, business development manager, critical infrastructure and transportation, Axis Communicat...

The Internet Of Things: What Does It Mean To Installers And Integrators?

loT will assist installers and integrators to position themselves as total solution providers and professional connectivity consultants to consumers  The buzz over the Internet of Things (loT) isn’t likely to subside anytime soon, given recent developments over consumer adoption of network-connected technologies. According to the 2014 State of the Internet of Things Study from Accenture Interactive, 69 percent of consumers plan to buy an in-home device in the next...

Need Help Choosing An Access Control System?

Decision-making and investigations are faster if operators don’t have to navigate among different applications Overwhelmed by too many choices for an access control system? Where do you start? Always seeking to help, SourceSecurity.com asked access control suppliers to describe what differentiating characteristics set their systems apart from others in the market. AMAG: Easy Migration, Simple Pricing Model AMAG’s Symmetry platform includes access control, photo...

Challenges Of Convergence With Fire Systems

The obstacles preventing convergence with fire systems appear substantial The IT network began as a dedicated structure within a building or facility. From this starting point, we have seen telephones, HVAC, access control and increasingly CCTV/video residing on the same platform. If today’s facility managers were offered a new building with separate networks for each type of subsystem, they would react with incredulity. The exception is fire protection, where the life-...

US electric grid: Exposing complexities that make it vulnerable

The smarter the grid becomes, the more risks it will encounter Hollywood collided with couch-dwelling gamers this Christmas because of the hack on Sony’s computer system, allegedly committed by North Korea. Immediately, security experts began to wonder if a nation state or a terrorist group might try and hit the U.S. electric grid. The answer is likely yes, but it wouldn’t be the first time or the last, and the grid, smart or not, is extremely complex and interwove...

Q&A: Integrator Weighs In On The Security Of Web-based Services

Cloud-based computing is here and is heavily marketed as a revolution in the security industry Dealers and integrators still have questions about cloud-based services, so we asked Service Manager Michael Troiani of Idesco Corp. in New York City for his input. SourceSecurity.com: What is your opinion of the security of cloud-based services? Troiani: Cloud-based computing is here and is heavily marketed as a revolution in the security industry. Like any other service, cyber-se...

Researching Security Trends

Research report from ASIS Foundation and University of Phoenix declared that cyber-security would rank as top security risk for next five years Check out the research available from the ASIS Foundation. It is proving to be right on the button.When the Guardians of Peace hacked Sony Pictures Entertainment late in 2014, they crashed the studio’s email, leaked films and scattered personnel data across the Internet.  By mid-December, four class-action lawsuits had hit...

How To Succeed At Security Outsourcing

To succeed at outsourcing, the relationship between the organization and the outsourcing company has to be an equal partnership Can you save money on security by outsourcing? Maybe, maybe not, according to William J. Powers III, CIPM II, CIPI. “Considering the way I approach outsourcing, I’m not sure if it saves money,” says Powers. As director of facilities at the Sterling and Francine Clark Art Institute in Williamstown, Mass., Powers oversees facilities,...

Eyes On The Prize: Taking Full Advantage Of Continued Revenue Growth

2015 is shaping up to be a strong year for dealers and integrators The systems integration industry is abuzz. Access control is super-hot, and the product category continues to grow. IP video surveillance specifications are moving along at break-neck speed. New technology categories in the security market – energy management, home automation and interactive services – are helping savvy dealers and systems integrators grow their businesses. But do these companies r...

Access Control Keeps Schools Safe

Schools are beefing up their security, with access control their go-to technology Schools are back in session after the winter break, but security is a 24/7 matter any time of year. K-12 and upper education are on high alert, dealing with increased incidents of violence, crime and vandalism. Access control is often the chosen technology of this vertical market, pairing well with CCTV, emergency communications and lockdown. Integrators and dealers who understand the nuances of...

IP Solutions Provide Multiple Layers Of Access Control At Transit Hubs

Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas Airports, metro systems and other transportation centers must deploy multiple layers of access control for restricted areas. They need solutions that can accommodate high-volume traffic. Each transportation application has unique requirements, from systems that enable the use of multiple types of credentials on one reader, to reader options designed to ma...

“Phoning In:” Smart Phones Using NFC Can Replace Cards

NFC can strengthen security by turning smart phones into physical and logical access control credentials The trouble with access control cards is that people lose them, lend them to friends who use the cards, or lose them, or lend them to someone else. Losing a card is bad enough, but people that lose cards often make it worse: “When someone loses an access fob or card, he or she doesn’t always tell the security department right away,” says Paul Timm, pr...

Innovation At The Reader Disrupting The Access Control Market

More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...

It Takes A Security Village To End Deception

Unscrupulous companies reversing positive steps made by security industry to remove stigma of being known as "trunk slammers" ABC news report reaffirms need for industry action For the businesses that make up the electronic security industry, it’s an issue that undermines all the progress we have made to date. It’s deceptive door-to-door sales tactics, and it’s still having an impact on the alarm industry. It affects the entire industry – from large na...

Video Analytics: One Size Does Not Fit All

Security professionals and end users are eager to define video analytics In the era where “I” is king, video analytics have become a topic of excitement, confusion, and deliberation. All one needs to do is take a stroll through the latest security expo to recognize how popular the space is, and how difficult it is to find an adequate explanation of what they are and how they work. So what are video analytics? This is the question both end users and security profess...

Meet Dave Tyson - ASIS 2015 President

Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...

Uncertainty And Opportunity For Integrators Within Security Market

PSA Security Network is taking steps to help educate security professionals concerning both threats and opportunities related to cybersecurity PSA Security Network 2014/2015 Review & Forecast2014 was a year of great change and advancement in the security industry as a whole. We saw an uptick in DIY security solutions focused on residential and small commercial markets. Perhaps the biggest impact to the security market is that more pieces of security solutions are now cloud...

M&A Activity Likely To Continue In Dynamic Security Market

Success in the access control arena is enhanced if the business has a global presence Vanderbilt 2014/2015 Review and Forecast: In 2014, our industry continued to be quite dynamic. While there are several “conglomerates” in the industry, such as UTC and Honeywell, who have been consolidators, there are also other companies (like ours) that are focused solely on security. The industry moves in both directions—some companies consolidating and acquiring, while...

Security In The Cloud...and Beyond Cameras And Doors

Time will tell regarding how fast public cloud applications will be fully adopted in the security space Sureview 2014/2015 Review and Forecast:  The continued movement to “cloud” or “distributed” applications will further impact how security manufacturers and integrators market and position their solutions and offerings. To the traditional security organization, this brings an entirely new go-to-market and pricing strategy as well as a completely...

Growing Confidence In Security Industry As Business Leaders Look To 2015

The SIA Security Market Index rose to 74.6 in November 2014, up from 72.3 in September SIA 2014/2014 Review and Forecast: The Security Industry Association (SIA) has begun to conduct a bimonthly survey of select SIA members to measure confidence in the security industry through the SIA Security Market Index. Using a scale of 1-100, the SIA Security Market Index reflected growing confidence among security industry business leaders throughout 2014 and into 2015. The SIA Securi...

Quality And Service Will Transcend Price In Security Marketplace

A return to quality and service will transcend the overall desire for price in the marketplace in 2015 ACT 2014/2015 Review and Forecast: 2014 has proved to be a positive year that displayed an increase in activity. The perception of an expanding U.S. economy has provided the impetus for corporate America to release capital security projects that have been held in abeyance for an exceedingly long time. Also, large-scale capital expenditures have become available for the first...

Credentials On Mobile Devices To Accelerate In 2015

Credential form factors include mobile devices that provide a better way to open doors HID Global 2014/2015 Review and Forecast: High-profile credit card breaches during 2014 raised the profile of low-security solutions while highlighting the need for more secure smart cards. There were no real surprises, as the industry steadily continued its large-scale transition to access control platforms based on open standards. This transition sets the stage for unprecedented inno...

Making a Long-Term Investment in Security

Over the next year end users will push to get more value out of their investments  Frontier 2014/2015 Review and Forecast: One of the big trends we see playing out over the next year is a push to get more value out of the investments that end users make in their solutions. Certainly the solutions must meet the core needs of customers, but more focus is being applied towards how those solutions can improve processes, increase efficiency and provide better visibility...

More Interest In Physical Entrance And Mass Notification Systems For 2015

Interest in mass notification systems appears to be growing in the security community as a response to active shootings and workplace violence 2014/2015 Boon Edam Review and Forecast: The security industry seems very healthy and continues to experience solid growth. We have observed an increased level of corporate and government expenditures, which allows for expanding security upgrades in general. Looking ahead to 2015, I see interest in mass notification systems appears to...