SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

What is the most underutilized technology in the security marketplace and why?

What is the most underutilized technology in the security marketplace and why?
30 Jan 2015

Editor Introduction

We all like hearing about the latest and greatest technologies, but how well are we using the technologies we have? We asked our panelists to reflect on opportunities to maximize the benefits of using common technologies in the marketplace, specifically to point out ways to garner more value from existing products. Underutilizing existing technology capabilities are a waste of money, aren’t they?


Card image cap
Charlie Erickson 3xLOGIC, Inc.

My first thought is not so much an underutilized technology but a widespread technology that’s not being used to the fullest. Nearly every digital video system sold in the last 10-plus years can record on motion. These systems also have an easy way to show when this motion occurred. If end users simply look at where video was recorded over weekends and at night, they quickly see things about their facility they didn’t know. School principals learn there were kids in the school over spring break. Store managers see people coming in late at night and stealing.  A simple 10 minute-a-week review, using systems people already have, can provide highly valuable insights into an end user’s facilities.

Card image cap
John Davies TDSi

Biometrics readers should be achieving much deeper market penetration than they currently do. While modern biometrics systems offer high levels of protection, ease of use and flexibility, the technology is still sometimes perceived as expensive, unreliable and easy to fake. This is largely based on operator experiences with earlier systems that sometimes failed to deliver on their promises. Biometrics technology has moved on rapidly in the last few years and now offers the perfect solution for many real-world security needs. Importantly, the price point has also lowered significantly as demand has grown, with all the signs that it will continue to become even more affordable in the future. As with all security products, installers and end users need to be careful to invest in good quality solutions. However, well-developed and manufactured biometrics systems deserve to play a key role in many types of security projects moving forward. 

Card image cap
Simon Lambert Lambert & Associates

The rate technologies emerge is increasingly breath-taking. Consequently, the full range of what’s already out there is beyond knowing. One example has kept me awake at night for years because the security industry doesn’t use it: video game technology. The computing power in these machines is phenomenal because cutting-edge R&D on hardware and software returns billions of dollars. That scale makes it cheap for all of us. High resolution video and graphics on PCs and handhelds, with fast refresh rates, in 3D, on virtual reality headsets and heads-up-displays, with 3D scanners, gyros and accelerometers, wirelessly, using enormous number-crunchers in the cloud. Photo-realistic models of your sites, modeled with commonplace software, incorporating physics-based lighting, animations, and complex simulations such as fire, flood, crowd flow, even “active shooters” using artificial intelligence. Enough already? I’ve been designing CCTV using 3D CAD for 15 years and strongly believe security is poorer for ignoring this powerful technology.

Card image cap
Fredrik Nilsson Axis Communications

Hosting and Cloud are taking off both in the consumer and B2B space, while in the security space, the usage has been relatively limited, so far. In access control there has been some uptake over the last couple of years, and video surveillance is finally starting to take off. Now that the industry is starting to recognize that the technology is secure, robust and scalable, it will be interesting to see which companies are the first to benefit from this great opportunity.

Card image cap
Greg Hamm Delta Scientific Corporation

Too many security professionals wanting to stop car bombers or errant drivers are under the misconception the vehicle access control barriers must be dug into the ground. They are unaware of portable barriers, which can be temporarily put up within 15 minutes and moved on to another location once an event is over or permanent barrier is installed. From sporting events to political conventions to a Farmer's Market, portable barriers provide a quick, inexpensive solution to traffic control and stopping errant drivers from creating harm. Within only 15 minutes of being sited, the mobile crash barrier lowers itself into position with built-in hydraulic jacks. There is no hand cranking. Wheels are stored at the sides and then the vehicle ramps are folded out, completing the deployment. To move the barrier, the procedures are simply reversed. That means being able to deploy security equipment in tough conditions at a moment's notice. 

Card image cap
John Mosebar Aiphone

It’s a shame that intercoms — both video and audio versions — are often among the most underutilized security solutions. They are proven, reliable and cost effective while serving multiple security purposes. Linked with an electronic lock, a video intercom is a valuable access control tool. Users remain safely behind a locked door while viewing and speaking with visitors before granting access to main or secondary entrances, lobbies, will call, alley doors and/or shipping and receiving areas. Some units are equipped with digital pan/tilt/zoom cameras to eliminate blind spots and augment video surveillance. Audio intercoms with paging capabilities can be used to provide routine updates or emergency notification instructions throughout an entire building or campus setting. Too often intercoms are overlooked in favor of more expensive technologies that tend to grab media attention.

Card image cap
Arjan Bouter Nedap Security Management

Access control, intrusion detection and video management are important solutions when talking about a company’s security of people, assets and data.  The protection of assets through management of lockers and cabinets, however, is often not taken into account from a security perspective. Offering management of storage as an integral part of an access control solution has many benefits on usability and increases security. In hospitals, for example, patient safety comes first and therefore cupboards for drug storage need to be secure at all times. Applying access control to lockers and cupboards ensures that authorized staff can use a single card to enter the building and get secure access to cupboards and lockers. This reduces management of keys and it offers easy management of authorisations which improves security. Moreover, it offers audit trails to gain insight in who had access to which cupboards, again having major benefits on security.


Editor Summary

From cloud services to biometric readers to intercoms, our panelists’ responses reflect a broad array of products that are underutilised in the market (even video games?). Using our industry’s resources to their full potential is a great way to increase our effectiveness as security professionals. Sharing ideas about how to do so is a welcome first step to realising that increased potential. What other technologies are underutilised in the security marketplace – and why?

  • Related links
  • Aiphone Intercom Systems
  • Axis Communications Intercom Systems
  • Aiphone Access control readers
  • Axis Communications IP cameras
  • Axis Communications Access control readers
  • Nedap AEOS Access control readers
  • TDSi Access control readers
  • TDSi IP cameras
  • Axis Communications IP Dome cameras
  • TDSi IP Dome cameras
  • Delta Scientific Barriers
  • Related categories
  • Intercom Systems
  • IP cameras
  • Access control readers
  • IP Dome cameras
  • Barriers
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Round table discussions
About this page

Discover underutilized security technologies and why they're overlooked, enhancing safety and boosting market potential.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec