Video analytics - Expert commentary
Although the wider adoption of 5G, together with faster connection speeds and improved bandwidth, opens up new prospects for telecom service providers, it also poses new risks in terms of network security. This article explains how telcos can make their newly-established 5G networks as well as telecom software solutions more impenetrable and secure. Implement robust device authentication protocols 5G is set to spur a wide-scale adoption of connected devices in the business and consumer sphere...
Although inflated fuel prices have somewhat settled since the summer, recent changes in legislation mean construction sites are particularly vulnerable to attempted fuel thefts. Read on to find out what’s changed, and what’s proving effective in mitigating the threat. What are the changes? As of April, this year red diesel can no longer be used in a range of vehicles, including those in construction. That means fuel bowsers are now filled with the same white diesel available to m...
Nowadays the Internet of Things has become an integral part of business around the world. The enhanced functionality made possible by the Internet of Things (IoT) and associated technologies are responsible for many of the major changes seen across society today. Video surveillance Video surveillance is one area that experiences substantial evolution driven by IoT technology. The intelligent monitors and sensors of the IoT combined with emerging high-speed network solutions promise to improve...
The growing mobile ownership rate, the emergence of more user-friendly banking apps, the tech-native younger generation, and, of late, the pandemic-induced shift to online, all create a fertile ground for mobile banking. Unfortunately, the acceleration of banking app adoption today goes hand in hand with the increase of targeted security threats. In 2022, a month wouldn’t go by without a headline-making mobile banking attack or incident that resulted in stolen funds and sensitive personal...
It’s clear that despite recent layoffs in the tech industry and general unease about the economy, there are still significant gaps in the number of jobs available and the amount of workers available to fill them. According to the Labor Department, there are 5.5 million more job openings than workers available. The physical security industry is not immune to these shortages. Last fall, Allied Universal reported being unable to fill thousands of open roles nationally while other smaller se...
The smartphone is an integral part of our daily routines. The communication and entertainment device of yesteryear has become a serious player with which we increasingly handle sensitive processes, such as payment transactions. BLE or NFC authentication At the supermarket checkout, more and more customers are pulling out their smartphones instead of their wallets. Apple Pay, Google Pay, or specific banking apps make it possible: to hold the smartphone in front of the reader of the checkout sys...
Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early color cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books....
For the past few years, security professionals have had to change the way that they go about protecting their organizations. From challenging old assumptions around access control through to implementing more access management and authentication policies, security has been at the heart of how companies have responded to the pandemic. The journey to more modern security processes that could support more flexible working was a rapid one. Remote work programs have bedded in, based on how IT secur...
Nowadays to save costs by making full use of old devices while upgrading the old security projects, many integrators or installers prefer to use video management software to manage multiple brands of video devices (such as IP cameras, and NVR), instead of only one single brand. So that they could have more flexible choices to earn profits while saving costs. Multi-brands video device management On other hand, with market segmentation and specialization, instead of managing the video by themsel...
The banking market continues to evolve through the growing use of digital and mobile devices, as more branch operations aim to enhance convenience and service for the customer. These advancements also create more significant opportunities for fraud and loss. Together, these two trends come full circle: Increasingly sophisticated fraud techniques require organizations to pursue new approaches to preventing and detecting such activities. Digital transformation But before we lead down that path,...
One of the biggest security trends in the last two years has been the adoption of cloud-based services, spearheaded mainly by an increasing number of video surveillance-as-a-service (VSaaS) offerings. VSaaS market value According to MarketsandMarkets Research, the global VSaaS market value is expected to reach $6.2 billion by 2026. This growth is propelled by demand for remote access video services, less local hardware to maintain, new internet-enabled devices, and a lower total cost of owners...
In the UK there is a new data reform act working its way through the legislative process. As the law changes, the market changes – so this year will see many companies trying to read the tea leaves and adapt their offerings to take advantage of the emerging changes. The security marketplace is, apparently, constrained by the need for great privacy – it appears to be a zero-sum game – you can have privacy, or you can have security, you can’t have both. In the second half...
Organizations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend: More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organizations looking to drive higher...
Integrators need to be well versed in Total Cost of Ownership (TCO), when discussing video surveillance options with their customers. Business leaders are looking for the best, most economical technology that will address their security needs, and they also want to avoid being blind-sided by unplanned technology operations and service costs. While most folks understand that the initial cost of a video surveillance system is not the same as the total cost of ownership, many might be surprised to...
Back in 1890, Samuel Warren and Louis Brandeis published a ground-breaking article in the Harvard Law review called ‘The Right to Privacy’. To this day, it is regarded as one of the most influential essays in the history of American law and is widely regarded as the first publication in the United States of America to advocate a right to privacy, articulating that right primarily as a ‘right to be let alone’. In this essay, the authors questioned whether the arrival of p...
Every day, millions of people worldwide use their personal credentials to prove their identity and access a range of services, from databases in their workplace to the banking app on their smartphone. But while this ensures only authorized people have access to certain systems, the use of this personal data opens users up to cyber risks, primarily in the form of identity theft. On Identity Management Day, Source Security spoke to seven IT and cybersecurity experts to discuss their experiences a...
Most individuals have strong opinions about what is more essential to our civilization: personal privacy or security. After more than a decade of technology enabling greater and greater amounts of Personally Identifiable Information (PII) and data harvesting, now the pendulum is swinging towards a society that places more emphasis on individual rights and privacies. This shift is manifesting in a variety of ways, quickly changing the technology, security and cyber security landscapes, and requi...
Access control for buildings is nothing new. Early forms of security access for business security systems were introduced in the 1960s, as business owners and managers looked for alternatives to keys, as a result of needing to frequently replace them, when there was a change in personnel. It’s only in recent years that the urgency to implement smarter, more efficient, and convenient forms of access control has increased, in the context of public and private sector digital transformation....
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilize. How can video analytics he...
Cyber threats hit the headlines every day; however digital hazards are only part of the security landscape. In fact, for many organizations - physical rather than virtual security will remain the burning priority. Will Liu, Managing Director of TP-Link UK, explores the three key elements that companies must consider when implementing modern-day business surveillance systems. 1) Protecting more than premises Video surveillance systems are undoubtedly more important than ever before for a...
From analog to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamor for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone ha...
Technology based on the cloud has become a popular trend. Most IT systems now operate within the cloud or offer cloud capabilities, and video surveillance is no exception: virtually every major hardware and software vendor offers cloud-based services. Users benefit from the cloud due to its numerous advantages, such as ease of implementation, scalability, low maintenance costs, etc. Video surveillance as a service (VSaaS) offers many choices, so there is an optimal solution for each user. Howev...
The evolution of smart video technology continues at pace. As in many other industries, the onset of the COVID-19 pandemic expedited timelines and the artificial intelligence (AI) video world is continuing its rapid evolution in 2021. As video demand and the use of AI to make sense of the visual data increase, the number of cameras and subsequent data produced are growing rapidly, and these are forcing the creation of new edge architectures. Cameras and AI in traffic management ‘Smart f...
Since the early 1920s, when the transition to fast food consumption began with the grand opening of White Castle in Wichita, Kansas, fast-casual dining has appealed to a fast-paced way of life – offering convenience and affordability. Today, fast-casual restaurants are as popular as ever, continuing to challenge restaurants to offer a consistent brand experience. This requires security and safety operations to be conducted at a volume and pace too rapid for humans to consistently monitor a...
James Twigg is the Managing Director of Total Integrated Solutions (TIS), an independent life safety, security and communication systems integrator, specializing in design & consultancy, technology and regulatory compliance. Total Integrated Solutions work primarily with retirement villages, helping to ensure the safety of residents in numerous retirement villages across the country. In this opinion piece, James shares how smart technology is helping security teams and care staff alike in e...
As the COVID-19 pandemic wanes and sporting venues open-up to full capacity, a new disturbing trend has hit the headlines - poor fan behavior. Five NBA teams have issued indefinite bans on fans, who crossed the line of unacceptable behavior, during the NBA playoffs. Major League Baseball stadiums have a recurring problem with divisive political banners being strewn over walls, as part of an organized campaign, requiring fan ejections. There was a brawl between Clippers and Suns fans after Game...
Prices and delivery times for essential components in video surveillance systems are being driven up as demand soars from other industries. Secure Logiq’s Robin Hughes explains the current state of the market. Challenges Component shortages and supply chain challenges are a hot topic in just about every industry based on semi-conductors and silicon chips right now, and security is no exception. It’s common knowledge that the global Covid lockdown caused a shutdown in the mining of...
Perimeter security is by no means a new concept. A phrase used to describe solutions with the primary purpose of limiting access to any area that is prohibited to the public at large, perimeter security has been prevalent for millennia. From Hadrian’s Wall that was built by the Roman Empire in Britain back in AD 122 to the Great Wall of China that winds almost 22,000 kilometers through the Asian country’s eastern regions, it is a concept that remains a fundamental part of global soci...
Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalization bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformat...
The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating...
