Security management - Expert commentary
Dave Tyson has 30 years of experience in all facets of enterprise security The incoming president of ASIS has volunteered with industry groups for years. His goal: to help people get better at their jobs. With 30 years' experience in all facets of enterprise security, Dave Tyson, CPP, CISSP, looks forward to his 2015 term as President of ASIS International (ASIS). “I’ve spent a lot of years working to make a difference in the security industry,” Tyson says...
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...
The increased viability of surveillance video as data will be an opportunity for growth and development Pivot3 2014/2015 Review and Forecast: It was a solid year for the industry – not great, but not bad. The state of the economy and less U.S. government grant money for surveillance in the last year held the security industry back overall. There were two interesting trends as it relates to server/storage infrastructure for video surveillance. Firs...
Companies embracing new cloud-based technologies will be among the winners, those with legacy business models will struggle Vision Security Technologies 2014/2015 Review & ForecastThe year 2014 was somewhat flat due to a still recovering economy and building industry in our Southern region of the United States. We saw a greater expectation for higher quality video surveillance throughout the mid-market sector. Vision Security Technologies also saw an increase in campus...
Over the next year end users will push to get more value out of their investments Frontier 2014/2015 Review and Forecast: One of the big trends we see playing out over the next year is a push to get more value out of the investments that end users make in their solutions. Certainly the solutions must meet the core needs of customers, but more focus is being applied towards how those solutions can improve processes, increase efficiency and provide better visibility...
Interest in mass notification systems appears to be growing in the security community as a response to active shootings and workplace violence 2014/2015 Boon Edam Review and Forecast: The security industry seems very healthy and continues to experience solid growth. We have observed an increased level of corporate and government expenditures, which allows for expanding security upgrades in general. Looking ahead to 2015, I see interest in mass notification systems appears to...
Integration of wireless and edge technology will continue to change the economics of installation As a security systems integrator, we are seeing some improvement in the industrial sector. It appears that projects that were deferred during the recession are now getting funded. Healthcare continues to have complex needs with continuing consolidation, which then creates opportunity. One question that remains is military spending and whether it will return to previous levels...
There are signs of a change in the electronic access control industry in favor of systems based on interoperability as proposed by ONVIF ONVIF 2014/2015 Review & Forecast: The year ahead certainly looks to be an important one. Interoperability, data security and ease of installation will all be of concern to the physical security industry. We see an increased awareness for interoperability among the end users in the industry, which in turns reflects back on the need f...
Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. External factors such as these do provoke change in physic...
The decriminalisation of marijuana has left the security industry apprehensive to collaborate with the industry If ever there was a market tailor-made for security companies, it’s the growing cannabis industry. Although only two states – Colorado and Washington – currently allow the sale of recreational marijuana and 22 other states permit limited medical use, many within the industry believe the tide has turned in favor of legalisation. [After the recent ele...
Two reports recently resurfaced – one online and the other on national television – that cited potential vulnerabilities of wireless intrusion door contacts and window sensors, devices commonly used to secure the perimeter of protected premises. These reports came after two independent researchers who work in the industry, but announced their findings independent of their positions, cited that alarm signals from sensors and detectors to the control panel could be subve...
Retailers can get more use from video surveillance data, ultimately targeting profitability As the vacation shopping season kicks into high gear, retail organizations have two primary concerns: making a profit on notoriously slim margins and shoring up potential areas of internal (employee) and external threats, including organized retail crime. According to the Global Retail Theft Barometer 2011, published by the Center for Retail Research, total global shrink in 2011 cost...
Too often we make the assumption that networks designed for data communication are the same as those for IP video Networking Basics for Security Professionals: Bandwidth challenges can impact your video surveillance systemToo often as we continue on the transition from analog to IP video surveillance, we make the assumption that networks designed for data communication are the same as those for IP video. In fact, they are very different. While we focus...
Think of crisis management and emergency planning as a customer service Do you have a written emergency management plan? Where is it? When was the last time you updated it? Developing and writing a corporate or organizational emergency management plan can take a long time. Once completed, however, the plan is there for you to access when you need it. In fact, that’s wrong. According to crisis management authority Michael J. Fagel, emergency planning is suppos...
AlliedBarton actively seeks out and hires family members of veterans through employer assistance groups AlliedBarton Security Services implemented its program to hire veterans five years ago. “Our CEO Bill (William C.) Whitmore announced one day that ‘we’re going to have a lot of American heroes coming home soon, and I want to give them jobs,’” said Jerold Ramos, Director, Strategic Recruiting and Military Liaison with AlliedBarton. &ldquo...
Integrators are embracing the many ways the cloud helps smaller companies succeed Hosted and managed security services aren’t for large enterprises only. SMBs (small-to-medium businesses) are taking advantage of the inherent operational and cost efficiencies of deploying managed services. Web-based or cloud services like access control and video provide convenience, ease of use and lower total cost of ownership. Cloud services are accessed without downloading and mainta...
Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organizations is a necessary evil. When shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximize any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales Engineering Manager at Genetec, explains that...
Security standardization reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...
Law enforcement and pure problem-solving skills will play less of a role for the future security director Much effort has been put down in the professionalization of security work. Not only is it a recurring topic of conversation at events for security professionals, but also a formal topic of concern for ASIS – having active task forces devoted to the promotion of professionalization and academization of security practice as well as a recently updated standard (ANSI/ASI...
Quantifying information provides insights for business to improve performance management The ability to measure and analyze the effectiveness of security operations is extremely useful – not only for identifying and addressing an organization’s vulnerabilities, but also for demonstrating security’s mitigating impact on overall risk levels along with the higher-level value security delivers to a business. Brian McIlravey, Co-CEO at PPM, explains how security m...
A value management process with clearly defined steps and procedures is critical In a highly competitive marketplace, where organizations need to ensure they are contracting for the best possible services, value must be visible. This starts with aligning with the right service provider – one that is dedicated to the organization’s success and has the people and processes to make an impact. Certainly most, if not all, service organizations say that they strive t...
A video security system's quality can be measured with mean time before failure figures and failure rate data When comparing specifications among a range of similarly featured video surveillance cameras, NVRs or monitors, it can be difficult to ascertain which of the devices truly has the best performance and/or quality. John Grabowski, National Sales and Marketing Manager of JVC Security Division, poses some questions for consideration: Can the human eye actually see a differ...
New security technologies have dramatically changed the security landscape over the last decade The security landscape has changed dramatically in the last decade with the introduction of numerous new security technologies to detect crime and deter criminal activity. With a long list of new tools, professionals now need to process vast amounts of information within seconds from many different security systems and then make important decisions about how to respond to an inc...
Ideal COTS solutions take cost, customization and convenience into account Physical identity and access management (PIAM) software enables streamlined management of security identities across disparate physical security systems. In this article, Ajay Jain, President and CEO of Quantum Secure, explains that PIAM software can ensure synchronized and policy-based on- and off-boarding of each individual identity by integrating physical with logical systems. It would also ascer...
PPVAR is working with police and sheriff's departments throughout the United States to drive new standards of video verified alarms In practice, 90 percent or more of burglar alarms are false, and studies have estimated the related arrest rate at about 0.02 percent. No wonder law enforcement responds as a low priority, if at all. In contrast, a video-verified security alarm provides the virtual equivalent of an eye-witness to a crime in progress, and responding to video alarms...
There are new biometrics on the horizon, but much of current biometrics research centers on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....
A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...
Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan...
Many forward-thinking organizations are rightly reassessing their security options In many industries, security and dependability are at the forefront of customers’ minds. But the fact is that firewalls and encryptions will only ever form part of the solution. Use of biometrics presents one of the most secure options for organizations, say Jon Mooney and Dave Bulless, security experts at Ingersoll Rand in the US and UK respectively. They list out the numerous benefits of...