Security devices - Expert commentary
If your company has a facility or a current business meeting in Seoul, South Korea, you would want to know the details behind the recent knife attack on the U.S. ambassador to South Korea, Mark W. Lippert. You would want to know that the attacker belonged to a group promoting the unification of North and South Korea and that South Korean President Park Geun-hye called the event an attack on the South Korea-U.S. alliance. You would want to know where in Seoul the attack occurred as well as many...
With the industry’s largest security trade show just weeks away, we spoke with leading systems integrator Securadyne Systems, Austin, Texas, for their assessment of ISC West and how they use the show to benefit their organization. Terry King, vice president and regional general manager, shares his thoughts on what Securadyne Systems plans to accomplish at this year’s event. SourceSecurity.com: What is your take on ISC West and what do you get out of it? Terry King: ISC West has al...
Lost or damaged keys cost authorities thousands of dollars to replace Keys are a common element in any transportation department, and an automated key control system is a valuable tool. Key management systems offer multi-site transportation facilities increased security and control to help prevent authorized key access as well as reducing the number of lost or misplaced keys. As an example, road repair is often done at night and requires equipment, vehicles, lights, generato...
A true IoT platform is the confluence of Internet, business and sensory data The era of IoT - the Internet of Things - is upon us. A deluge of urban sensory data is flowing into data centers every minute, putting pressure on data-center resources and accumulating at a rate faster than anyone can process. Is the proliferation of sensory data simply evidence of an increasingly intrusive world, or can IoT be used for the improvement and development of intelligence-equipped cities...
PoE power is a complex issue in itself made even more complex by the lack of standardisation Standards are like a warm blanket on a cold winter night. They make us feel safe and warm. A standard tells us the devices we use within our systems will interact with each other regardless of manufacturer. For IP-powered PoE devices, we depend on standards such as 802.3af for devices requiring up to 15.4 watts and 802.3at for devices powered up to 30 watts. We depend on the devices...
The action of a voltage applied to a resistance element, draws power from the switch’s PoE port We often think about a power supply operating in a single format. A power source provides power to a device. You plug it into a wall outlet and that’s all that happens. PoE power is a far more complex. There is interaction between the source providing power and the device receiving power. This interaction is governed under the 802.3 AF and AT standards. These differences...
The number-one cause of most power outages in the U.S. is bad weather What does the industry consider to be its most severe threats the U.S. electric grid? There is no shortage of nightmare scenarios. According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure....
Drone is a toy with a bright future—until it causes a catastrophe Drones, or unmanned aerial vehicles, are today’s gizmo du jour. A recent Bloomberg article reported that Amazon alone is selling more than 10,000 a month, and with prices as low as $50, it’s a toy with a bright future—until it causes a catastrophe. Consider the January incident at the White House when a drunken National Geospatial-Intelligence Agency employee lost control of a quad...
NFC can strengthen security by turning smart phones into physical and logical access control credentials The trouble with access control cards is that people lose them, lend them to friends who use the cards, or lose them, or lend them to someone else. Losing a card is bad enough, but people that lose cards often make it worse: “When someone loses an access fob or card, he or she doesn’t always tell the security department right away,” says Paul Timm, pr...
A growing number of users look to add cloud-based functionality to their surveillance toolkits In today’s market, both end users and resellers seek new technologies to make security programs more effective, while also helping business and employees be more efficient. Cloud-based monitoring services are gaining a significant amount of attention as an emerging solution to meet these needs. Maria Cambria, Vice President, Technical Center of Excellence, DVTEL says that end u...
More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...
The increased viability of surveillance video as data will be an opportunity for growth and development Pivot3 2014/2015 Review and Forecast: It was a solid year for the industry – not great, but not bad. The state of the economy and less U.S. government grant money for surveillance in the last year held the security industry back overall. There were two interesting trends as it relates to server/storage infrastructure for video surveillance. Firs...
Success in the access control arena is enhanced if the business has a global presence Vanderbilt 2014/2015 Review and Forecast: In 2014, our industry continued to be quite dynamic. While there are several “conglomerates” in the industry, such as UTC and Honeywell, who have been consolidators, there are also other companies (like ours) that are focused solely on security. The industry moves in both directions—some companies consolidating and acquiring, while...
Over the past year Sony has expanded its product lineup to include a range of capabilities Sony 2014/2015 Review and Forecast: Many would agree that one of the most important trend in 2014 has been the emergence of 4K. We’ve already seen the first 4K security cameras hit the market, at a premium price. Sony is already a champion of 4K technology, which offers a resolution that is four times greater than Full HD (1080p), making for a sharp and detailed visual image. 4K w...
The SIA Security Market Index rose to 74.6 in November 2014, up from 72.3 in September SIA 2014/2014 Review and Forecast: The Security Industry Association (SIA) has begun to conduct a bimonthly survey of select SIA members to measure confidence in the security industry through the SIA Security Market Index. Using a scale of 1-100, the SIA Security Market Index reflected growing confidence among security industry business leaders throughout 2014 and into 2015. The SIA Securi...
Over the next year end users will push to get more value out of their investments Frontier 2014/2015 Review and Forecast: One of the big trends we see playing out over the next year is a push to get more value out of the investments that end users make in their solutions. Certainly the solutions must meet the core needs of customers, but more focus is being applied towards how those solutions can improve processes, increase efficiency and provide better visibility...
Interest in mass notification systems appears to be growing in the security community as a response to active shootings and workplace violence 2014/2015 Boon Edam Review and Forecast: The security industry seems very healthy and continues to experience solid growth. We have observed an increased level of corporate and government expenditures, which allows for expanding security upgrades in general. Looking ahead to 2015, I see interest in mass notification systems appears to...
Grants continue to be available for schools to purchase products such as our intercoms and communication systems 2014/2015 Aiphone Review and Forecast: Video surveillance, audio, access control and locks are the four security solutions that typically work together as part of an overall security plan. Demand for video may have been the prime driver, but 2014 was a solid year for each of these solutions as the economy improved noticeably. Also, federal and state governments mad...
The decriminalisation of marijuana has left the security industry apprehensive to collaborate with the industry If ever there was a market tailor-made for security companies, it’s the growing cannabis industry. Although only two states – Colorado and Washington – currently allow the sale of recreational marijuana and 22 other states permit limited medical use, many within the industry believe the tide has turned in favor of legalisation. [After the recent ele...
Two reports recently resurfaced – one online and the other on national television – that cited potential vulnerabilities of wireless intrusion door contacts and window sensors, devices commonly used to secure the perimeter of protected premises. These reports came after two independent researchers who work in the industry, but announced their findings independent of their positions, cited that alarm signals from sensors and detectors to the control panel could be subve...
Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analog to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus...
Cloud-based services for video surveillance or hosted access control are garnering more attention in the physical security industry. Most people today are already using or are familiar with cloud-based applications in their day-to-day life, so it will only be a matter to time before the benefits of the cloud permeate security and business solutions. Dealers looking to embrace the cloud model for access control must re-think multiple aspects of how they are set up as an organ...
Think of crisis management and emergency planning as a customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it? Developing and writing a corporate or organizational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...
Good training is a best practice that applies across a broad range of industries and markets Owners and managers of security dealerships, both large and small, face unique challenges in running their companies, and while there is no magic formula for success, dealerships that invest in training for their staff typically do better than those who don’t. In fact, good training is a best practice that applies across a broad range of industries and markets, but it is pa...
AlliedBarton actively seeks out and hires family members of veterans through employer assistance groups AlliedBarton Security Services implemented its program to hire veterans five years ago. “Our CEO Bill (William C.) Whitmore announced one day that ‘we’re going to have a lot of American heroes coming home soon, and I want to give them jobs,’” said Jerold Ramos, Director, Strategic Recruiting and Military Liaison with AlliedBarton. &ldquo...
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilize the organization’s full IT infrastructure, which...
Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...
Security standardization reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...
Access control growth is driven by several factors A major shift from PC-based clients systems to solid state, embedded operating systems, browser-based user interfaces, remote services, and changes in compliance legislation are helping drive the rapidly growing adoption of access control systems in both the residential and commercial security markets. John LaFond, VP of Integrated Systems at Linear LLC, explains these contributing factors as Linear LLC looks towards the futur...
The best standards are often baseline, common-denominator standards that leave room for innovation The collaboration between ONVIF and SIA to develop new access control standards is just the latest standards-related news from the Security Industry Association (SIA), the American trade association headquartered in Silver Spring, Md., near Washington, D.C. In fact, SIA has a long history and tradition of standards development, dating back to the 1980s. SIA has produced 1...