Security monitoring system - Expert commentary
With the entry of more manufacturers and mergers and acquisitions in the security industry, the competition is undoubtedly getting fiercer VIVOTEK will seek to add value and increase return on investment for customers VIVOTEK 2014/2015 Review and Forecast: Total solutions have become more important than individual products in the industry. Security brands are starting to turn themselves into solution providers instead of product manufacturers. Moreover, with...
Customers look to leverage video surveillance technologies to optimize and monitor operations within their business MicroPower 2014/2015 Review and Forecast: In 2015, we will continue to see customers look to leverage video surveillance technologies to optimize and monitor operations within their business. Solutions that enable organizations to shift from more situational awareness to situational assessment – for example, using images collected from the surveillanc...
Retailers can get more use from video surveillance data, ultimately targeting profitability As the vacation shopping season kicks into high gear, retail organizations have two primary concerns: making a profit on notoriously slim margins and shoring up potential areas of internal (employee) and external threats, including organized retail crime. According to the Global Retail Theft Barometer 2011, published by the Center for Retail Research, total global shrink in 2011 cost...
The security industry can be like a house built on sand without professional standards in place Picture the scene: You’re suffering from a persistent pain and so decide to take a trip to your doctor to get it checked out. You step into the consulting room but, before you can speak, he looks you up and down, haw and hums, and then writes out a prescription. Would you be happy that drugs prescribed in this manner will cure your ailment when your doctor has not even bothe...
AlliedBarton actively seeks out and hires family members of veterans through employer assistance groups AlliedBarton Security Services implemented its program to hire veterans five years ago. “Our CEO Bill (William C.) Whitmore announced one day that ‘we’re going to have a lot of American heroes coming home soon, and I want to give them jobs,’” said Jerold Ramos, Director, Strategic Recruiting and Military Liaison with AlliedBarton. &ldquo...
ISPs are often under-delivering on promised network speeds and bandwidth Regardless of where you stand on net neutrality, there’s a bigger slice to the story – how to monitor the health and performance of a network to ensure system performance. While an Internet fast lane for everyone makes sense, the reality is that Internet Service Providers (ISPs) are often under-delivering on promised network speeds and bandwidth. And while the Federal Communications Commissio...
Communicating access control information across multiple platforms is simplified with the PSIA's PLAI specification Managing access control across large companies or institutions, including those that span giant campuses or even multiple locations all over the world, is essential to optimum security. Too often, however, the effectiveness of a company’s access control system – or, more likely, of its multiple access systems that were installed in various locations o...
Integrators are embracing the many ways the cloud helps smaller companies succeed Hosted and managed security services aren’t for large enterprises only. SMBs (small-to-medium businesses) are taking advantage of the inherent operational and cost efficiencies of deploying managed services. Web-based or cloud services like access control and video provide convenience, ease of use and lower total cost of ownership. Cloud services are accessed without downloading and mainta...
Newer concepts and modern security solutions help achieve operational efficiencies in the retail sector Asset protection across retail organizations is a necessary evil. When shrinkage is on the rise, margins are low, competition is fierce and the economic climate is still somewhat uncertain, retailers need to maximize any investment in technology and consider how it can positively impact their bottom line. Steve Bocking, Sales Engineering Manager at Genetec, explains that...
Security standardization reduces operational requirements Controlling identified risks at all of your sites, anywhere in the world, can be difficult. Especially when taking budget constraints into account. How can you ensure all of your people have a secure working environment? And that all employees, everywhere, adhere to your security policy? Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, states that standardising security gives this assurance and more. I...
Quantifying information provides insights for business to improve performance management The ability to measure and analyze the effectiveness of security operations is extremely useful – not only for identifying and addressing an organization’s vulnerabilities, but also for demonstrating security’s mitigating impact on overall risk levels along with the higher-level value security delivers to a business. Brian McIlravey, Co-CEO at PPM, explains how security m...
A value management process with clearly defined steps and procedures is critical In a highly competitive marketplace, where organizations need to ensure they are contracting for the best possible services, value must be visible. This starts with aligning with the right service provider – one that is dedicated to the organization’s success and has the people and processes to make an impact. Certainly most, if not all, service organizations say that they strive t...
A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board’s 2.3 percent growth prediction for 2014 is higher than its 1.7 estimate for 2013. Globally, both the physical access control and video surveillance markets are forecast to record healthy growth rates this year. Conference board predictions on housing starts (up 1.16 percent in 2014, compared...
Project productivity improves when systems integrator and client personalities “integrate” Long-term business relationships can be a win-win proposition for integrators and customers alike. In this article, Jason Oakley, CEO of North American Video (NAV), explains that compared to simply transactional relationships that are typically short-term projects, long-term relationships generally provide better working relationships, increased satisfaction, reduced costs, a...
Companies that have developed a culture of openness can provide and receive feedback at all levels “The nail that sticks out gets hammered down” is an old Japanese saying that took hold in our post World War II corporate America culture. This phrase encourages an unspoken rule of conformity combined with an authoritarian hierarchical structure. Today it is important for business leaders to consider the impact this has in American workplaces. Brent O’Bryan...
Choosing between "bleeding edge" and leading edge technology is critical when deploying a security system The choice of the right security technology is one of the primary considerations for implementation or upgrade of a video surveillance system or other security system. Industry professionals making this critical decision often have to choose between a ‘bleeding edge’ technology, i.e. one that is in its infancy but offers great potential, and a leading edge prov...
The usability revolution that took place several years ago on the consumer market is breaking into the field of security management. Wouter Kersteman, Interaction Designer at Nedap, explains in this article that intuitive user interfaces with attractive apps and widgets - similar to those found on modern mobile phones and tablets - are the standard of the future; usability is the latest buzzword and may even be a pre-requisite for security management systems. Rec...
Examining the road to convergence The use of Internet Protocol (IP) in the security industry is increasing but little is known about the relationship between end users and the merger of traditional physical security and IT otherwise referred to as convergence in the security trade press. Markus Lahtinen of the LUSAX project examines the growth of convergence in the security industry and discusses complexities of this relationship. The LUSAX project at Lund Universit...
XML, API and web server offer the ability for interoperability between proprietary software Today's facility executive wants to purchase systems and components from various manufacturers and have those components work together as one system. They want "open systems" that allow the manufacturers to offer new features and add value without locking the owner into a single vendor's proprietary protocols. In short, they want Interoperability.Hirsch Electronics...
Metadata saves on resources required to store large amounts of data Yu Kitamura, Product Manager, Network Video Monitoring, Sony Europe explains the facts about metadata, and their benefits.All organizations have to face the costly challenge of the storage and management of their valuable data. In the sphere of security, where visual data is indispensable, any avenues that make the capture, storage and retrieval of that information more efficient will command budget...
Hospitals need stronger 'in-depth' physical security at different entry points Within the course of any given day, a hospital or health care chief security officer (CSO) faces the task of not only protecting multiple points of access but also doing so in a way that enables movement and activity, is convenient for staff and patients and does not impede the facility's primary function: saving lives. Health care facilities exist in a wide variety of medical focus, adm...
When it comes to the application of sophisticated security techniques in the banking environment - to keep assets, staff and customers safe and secure - financial institutions are looking carefully at how they can seamlessly integrate advances, such as High Definition CCTV and the monitoring of their cash machines, into their existing infrastructure. Pauline Norstrom, Director of Worldwide Marketing at Dedicated Micros, discusses the challenges. A key issue for banks is to ensure that the...