Security monitoring system - Expert commentary

Monitronics Security - Benefits And Opportunities Of Professional Monitoring Services

Monitronics’ ProShop offers sales and marketing materials to its dealer network as a valuable resource Monitronics Security, headquartered in Dallas, continues to stress the importance of professional monitoring services to its dealers and their customers as a critical component of recurring monthly revenue (RMR). “Traditional dealers need to emphasize the advantages of live, around-the-clock monitoring for anyone considering a non-traditional provider or do-it-yo...

Home Automation Standards And Protocols

As the home automation industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. Next-Generation Protocols: Bluetooth And Wi-Fi “Right now companies are releasing really i...

EMERgency 24, Dealer Value And RMR With Critical Response Services

EMERgency 24 developed the Incident Command and Control platform to deliver faster and more succinct data to first responders and others At ISC West 2015 in Las Vegas, EMERgency24 introduced a groundbreaking web-based software platform called Incident Command and Control Service, which allows system owners to generate alerts for situations such as lockdown, severe weather or HAZMAT (hazardous materials) situations and enables instant communication to pre-defined contact groups...

Airport Perimeter Security Breach – Laughable Or Potential Threat?

If airport perimeter fencing is vulnerable then covert detection methods should be used Lack of airport perimeter security would be laughable, if it weren’t so serious. A recent farcical breach of security in London is drawing renewed attention to airport perimeter protection. I want to focus on airport perimeter security, but we’ll start with critical infrastructure in general: A nun, a housepainter and a gardener break into a nuclear facility. This sounds like t...

Body Search And Airport Security – Maximizing Safety And Dignity For Travelers

A US Department of Homeland Security investigation showed that undercover agents defeated airport screening in 95 percent of cases by smuggling mock explosives and weapons past checkpoints. With admirable transparency, U.S. Office of Inspector General (OIG) has described how so-called “Red Teams” posed as regular passengers and exposed inadequate measures at some of the busiest airports across the United States. The revelations came a few days before Body Search 2...

Smart Home Security Risks With Internet Of Things (IoT)

Security and technology are rushing to offer home automation solutions and build out the Smart Home of connected devices and applications. As cameras, alarms, as well as, thermostats and other appliances become controllable and programmable using Internet-enabled smart phones, they are becoming part of a vast web called the internet of things (IoT). Achieving Greater Value Through Smart Data Exchange This network of physical objects or "things" embedded with electronics, software, sensors and...

Role Of Interactive Services In Maintaining Steady RMR Stream

Affiliated Monitoring’s UL-Listed monitoring center with a second floor dedicated to areas for security company meetings Central monitoring stations have innovative approaches to assist security installing companies in growing their account base, adding value and boosting recurring monthly revenue (RMR). These companies do much more than simply monitor accounts – today they provide a host of services to give security installing companies the added edge in an extrem...

Despite Benefit Of More Efficient 911 Responses, ASAP-to-PSAP Implementation Lags

ASAP-to-PSAP technology automates communications between alarm monitoring companies & PSAPs and dispatches emergency service In April 2015, Cary, N.C., adopted a technology called Automated Secure Alarm Protocol to Public Safety Answering Point (ASAP-to-PSAP), but currently they are among only a handful of emergency 911 call response locales that use ASAP-to-PSAP technology in the United States. Commander Scott Edson of the Los Angeles County Sheriff’s Department, sp...

Technology Advancement Requires Well-educated, Well-paid Security Officers

The industry has to advance in terms of attracting experienced people and paying for that experience Time was, security officers patrolled with walkie-talkies, responding to dispatchers monitoring cameras in the control center. The post of security officer was a minimum wage job requiring little more than a high school diploma, if that. Educated And Experienced Security Officers A Prerequisite No more. “Today, when we read our requests for proposal (RFPs), we’re...

Lower Costs By Getting Security Assessments Right

A comprehensive security assessment will tell how to plan and manage security in the facility A comprehensive security assessment will tell you how to plan and manage security in your facility. Without an assessment, you can only guess about security. For facilities with existing security programs, an assessment can also reveal whether the pieces of the system are working as they should. As a security director, can you do the assessment yourself? Sure, although a large school...

Cloud-based Systems: Current Challenges And Future Technology

There’s more talk than ever in the security industry about cloud-based systems – where they are, where they’re going, the risks, the rewards. New opportunities for integrator companies, especially related to recurring monthly revenue (RMR), are among the benefits of new cloud-based systems. For insights into those opportunities, we spoke with Robert Hile, currently director of strategic accounts for SureView Systems and a strong proponent of cloud-based systems, whose backgroun...

Learning To Use Visitor Management Technology In Schools

It’s important for everyone in a high school to wear an ID Handwritten check in and check out books fail to alert the security risks posed by individuals on school campuses. Installing visitor management systems is imperative to screen and manage visitors and thereby enhance the level of safety in schools.  However, it takes training and practice to use school visitor management technologies effectively. Security technologies can go a long way toward making K-12 sc...

Physical Security And The Quest For Interoperability At ISC West 2015

The security industry continues to move away from closed, proprietary systems and instead is fine-focused on open solutions that assist the move to total integration. The benefits of achieving this feat belong to both installing company and end user. Benefits of open security solutions Open, interoperable systems make it easier to integrate a wide array of sensors, devices and communication technologies across the enterprise. That means quicker installations, lower labor costs and heightened s...

When security breaks down, organizational resilience steps in

Organizational resilience takes all appropriate actions to help ensure the organization’s continued viability In this day and age, the traditional components of security officers, cameras, access control and alarm systems aren’t enough to protect a company or organization. No matter how good your preparations, security sometimes breaks down, and bad things happen. That can take a toll on a business. Today, security’s role extends to organizational resilience...

SecureWatch 24's Fusion Centre Focuses On "all Things Video"

The focus of Fusion Center is all about video - surveillance, analytics, verification, license plate recognition, VMS, wearable cameras and more Growing demand for surveillance that offers better quality video continues to fuel growth in the IP camera market. According to Transparency Market Research, the video surveillance market will realize a compound annual growth rate (CAGR) of 19 percent by 2019, surpassing $42 billion in sales. High-definition video and network-connect...

US electric grid: Exposing complexities that make it vulnerable

The smarter the grid becomes, the more risks it will encounter Hollywood collided with couch-dwelling gamers this Christmas because of the hack on Sony’s computer system, allegedly committed by North Korea. Immediately, security experts began to wonder if a nation state or a terrorist group might try and hit the U.S. electric grid. The answer is likely yes, but it wouldn’t be the first time or the last, and the grid, smart or not, is extremely complex and interwove...

Researching Security Trends

Research report from ASIS Foundation and University of Phoenix declared that cyber-security would rank as top security risk for next five years Check out the research available from the ASIS Foundation. It is proving to be right on the button.When the Guardians of Peace hacked Sony Pictures Entertainment late in 2014, they crashed the studio’s email, leaked films and scattered personnel data across the Internet.  By mid-December, four class-action lawsuits had hit...

Cloud-based Monitoring Services: Redefining Technology’s Reach

A growing number of users look to add cloud-based functionality to their surveillance toolkits In today’s market, both end users and resellers seek new technologies to make security programs more effective, while also helping business and employees be more efficient. Cloud-based monitoring services are gaining a significant amount of attention as an emerging solution to meet these needs. Maria Cambria, Vice President, Technical Center of Excellence, DVTEL says that end u...

It Takes A Security Village To End Deception

Unscrupulous companies reversing positive steps made by security industry to remove stigma of being known as "trunk slammers" ABC news report reaffirms need for industry action For the businesses that make up the electronic security industry, it’s an issue that undermines all the progress we have made to date. It’s deceptive door-to-door sales tactics, and it’s still having an impact on the alarm industry. It affects the entire industry – from large na...

A Pivotal Year For Security Dealers: More Changes In Store For 2015

Reinvention of go-to-market models proves integration business is place to be Suffice it to say 2014 was a pivotal year for the majority of alarm dealers and installers. Many have had to change their way of thinking and their method of doing business, while adapting to ever-changing technology. But those who continue to reinvent their go-to-market model prove that the integration business is the place to be – and there’s money to be made, albeit it not in simply...

Marshall Marinace: At The Helm Of The Electronic Security Association

Marshall Marinace is on a mission - to continue to infuse value into ESA If you haven’t met Marshall Marinace, you probably will soon. He’s the new President of the Electronic Security Association (ESA), and he’s instantly likeable. He’s a homespun security dealer with decades of service who knows that the new world of systems integration requires change and involvement of every member at the association level. Marinace was sworn in as the 41st Preside...

Security Is Better Than Ever! The Industry Is Optimistic Looking To 2015

Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...

Look For Untapped Mid- And Small-level Opportunity For Success

Companies embracing new cloud-based technologies will be among the winners, those with legacy business models will struggle Vision Security Technologies 2014/2015 Review & ForecastThe year 2014 was somewhat flat due to a still recovering economy and building industry in our Southern region of the United States. We saw a greater expectation for higher quality video surveillance throughout the mid-market sector. Vision Security Technologies also saw an increase in campus...

Growing Confidence In Security Industry As Business Leaders Look To 2015

The SIA Security Market Index rose to 74.6 in November 2014, up from 72.3 in September SIA 2014/2014 Review and Forecast: The Security Industry Association (SIA) has begun to conduct a bimonthly survey of select SIA members to measure confidence in the security industry through the SIA Security Market Index. Using a scale of 1-100, the SIA Security Market Index reflected growing confidence among security industry business leaders throughout 2014 and into 2015. The SIA Securi...

Security Industry Competitive Focus To Shift To Software And Solutions

Companies will resort to cooperation in a mutually beneficial and complementary way Dahua 2014/2015 Review and Forecast:The global economy is in recovery, and China’s domestic market keeps its strong momentum. Politically, the terrorist attacks and uncertain factors still exist; and with years of market cultivation, people’s safety awareness continues to grow. Important trends include the popularisation of HD, intelligence, integration and...

Competitive Security Market Wants Total Solutions Instead Of Products

With the entry of more manufacturers and mergers and acquisitions in the security industry, the competition is undoubtedly getting fiercer VIVOTEK will seek to add value and increase return on investment for customers VIVOTEK 2014/2015 Review and Forecast: Total solutions have become more important than individual products in the industry. Security brands are starting to turn themselves into solution providers instead of product manufacturers. Moreover, with...

Extending The Reach Of Video Surveillance In 2015

Customers look to leverage video surveillance technologies to optimize and monitor operations within their business MicroPower 2014/2015 Review and Forecast: In 2015, we will continue to see customers look to leverage video surveillance technologies to optimize and monitor operations within their business. Solutions that enable organizations to shift from more situational awareness to situational assessment – for example, using images collected from the surveillanc...

Targeted Video Analytics Provide Value Throughout A Retail Business

Retailers can get more use from video surveillance data, ultimately targeting profitability As the vacation shopping season kicks into high gear, retail organizations have two primary concerns: making a profit on notoriously slim margins and shoring up potential areas of internal (employee) and external threats, including organized retail crime. According to the Global Retail Theft Barometer 2011, published by the Center for Retail Research, total global shrink in 2011 cost...

Security Technology: A House Built On Sand?

The security industry can be like a house built on sand without professional standards in place Picture the scene: You’re suffering from a persistent pain and so decide to take a trip to your doctor to get it checked out. You step into the consulting room but, before you can speak, he looks you up and down, haw and hums, and then writes out a prescription. Would you be happy that drugs prescribed in this manner will cure your ailment when your doctor has not even bothe...

Providing Security Jobs For Veterans

AlliedBarton actively seeks out and hires family members of veterans through employer assistance groups  AlliedBarton Security Services implemented its program to hire veterans five years ago. “Our CEO Bill (William C.) Whitmore announced one day that ‘we’re going to have a lot of American heroes coming home soon, and I want to give them jobs,’” said Jerold Ramos, Director, Strategic Recruiting and Military Liaison with AlliedBarton. &ldquo...