SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos
Security And Surveillance Technologies For The Casino Market

Security And Surveillance Technologies For The Casino Market

Addressing Cybersecurity Vulnerabilities In The Physical World

Addressing Cybersecurity Vulnerabilities In The Physical World

Video analytics - Round table discussions

How Is The Role Of The Security Installer/Integrator Changing?
How Is The Role Of The Security Installer/Integrator Changing?

The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked th...

How The Internet Of Things (IoT) Is Increasing Security Effectiveness
How The Internet Of Things (IoT) Is Increasing Security Effectiveness

Deployed across a wide range of devices, the Internet of Things (IoT) collects data to help business owners make decisions on a macro scale as well as at a granular level. The IoT is a network of physical devices embedded with sensors, software, and network connectivity that allows them to collect and share data. We called on this week's Expert Panel Roundtable to comment on the intersection of the IoT and physical security. We asked: How is the Internet of Things (IoT) increasing the effectiven...

Is Analog Dead, Or How Is It Viable In Today’s Security Systems?
Is Analog Dead, Or How Is It Viable In Today’s Security Systems?

Analog video cameras are still used in a variety of applications, primarily because yesterday’s robust and flexible technology is still functioning today, although it has been years, or even decades, since the initial installation. In many cases, this past generation of security cameras is still reliable and effective.  Embracing an installed base of analog cameras is often the most cost-effective approach when updating or expanding a surveillance system. But what about the future? W...

What Are The Benefits Of Integrating Security With Building Management?
What Are The Benefits Of Integrating Security With Building Management?

Sharing data between security and building management devices can provide a route to maximize building usage and minimize costs. In today's Internet of Things (IoT) environment, tying together a variety of systems is easier than ever. For an update, we asked this week's Expert Panel Roundtable: What are the benefits of integrating security technology with building management systems (BMS)?

What Will Likely Be The Most Important Technology Development In The Security Marketplace In The Second Half Of 2023?
What Will Likely Be The Most Important Technology Development In The Security Marketplace In The Second Half Of 2023?

Time flies in the busy world of security, so it’s no surprise that the midpoint of 2023 comes before know it. Let’s pause after the first half of the year to look ahead at what can expect during the second half (Hint: It’s all about AI). We asked this week’s Expert Panel Roundtable: What will likely be the most important technology development in the security marketplace in the second half of 2023?

How Is AI Changing The Course Of The Security Marketplace?
How Is AI Changing The Course Of The Security Marketplace?

According to a report by the U.S. Government Accountability Office (GAO), artificial intelligence (AI) is expected to transform all sectors of society, including national security. The physical security marketplace is certainly feeling the impact of the new technology, which has quickly gained prominence as one of the industry’s most popular buzzwords. To assess the more practical aspects of the situation, we asked this week’s Expert Panel Roundtable: How is artificial intelligence (...

How Does Risk Influence Buying Decisions For Security?
How Does Risk Influence Buying Decisions For Security?

Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organization's appetite for risk guides its security strategy and action planning to the minutest detail, including buying decisions for security equipment and systems. We asked this week's Expert Panel Roundtable: How does the concept of risk influence buying decisions in the security market?

What’s New In Cybersecurity For Physical Security Systems?
What’s New In Cybersecurity For Physical Security Systems?

A sad irony in the physical security industry has been the lax attention paid historically to the cybersecurity elements of our industry’s systems. However, the picture has improved starkly in recent years as manufacturers have stepped up to meet the cybersecurity challenges and awareness of the issue has become much higher. We asked this week’s Expert Panel Roundtable: What's new in cybersecurity for physical security systems?

What Safeguards Are In Place To Avoid Unauthorized Access To Video?
What Safeguards Are In Place To Avoid Unauthorized Access To Video?

Protecting video involves many of the same strategies and protocols as those used to protect any other type of data. In the world of IP cameras and systems, video can be transmitted anywhere in the world to anyone who needs to see it. But what about access by outsiders who are not authorized to view the video? Or what if heaven forbid, the video is accessed by an unauthorized user who later posts it to YouTube? We asked this week’s Expert Panel Roundtable: What safeguards are in place...

Security’s Role In ESG, And How The Industry Can Do More
Security’s Role In ESG, And How The Industry Can Do More

Environmental, social, and corporate governance (ESG) standards in the broader marketplace reflect a growing recognition that business needs to lead the way in addressing a range of environmental and social issues. Environmental concerns, especially as they impact climate change, are a familiar facet of business life. In addition, social concerns include human rights and equity; basically, an organization's relationships with people. Governance refers to the structure of rules, practices, and pr...

What Are The Major Pain Points When Installing A Security System?
What Are The Major Pain Points When Installing A Security System?

Every security system is unique, of course. Specific to each installation are the problems the customer and the integrator may experience along their journey. However, given the installation of hundreds of physical security systems, there are commonalities that occur. We asked this week’s Expert Panel Roundtable: What are the major pain points when installing a physical security system?

How Could Trade Shows Be Improved To Make Them More Valuable?
How Could Trade Shows Be Improved To Make Them More Valuable?

The return of trade shows has been an invigorating development for the security market. The morning-after reviews of this year's shows could not have been more positive. Everyone in the industry seemed to revel in the excitement and momentum as the shows decisively proclaimed: 'We're back.' Continuing that momentum into the future will depend on how well the shows adapt to changing industry trends and repeatedly reinvent themselves to be better every year. Adding feedback from GSX to our earlier...

What Is The Intersection Of Security And Big Data?
What Is The Intersection Of Security And Big Data?

Big Data is a persistent buzzword in the broader technology realm and in the physical security market. More every year, it seems we see a greater impact of the compilation of numerous data sources (Big Data) on our market. Smart leaders in the industry are looking at the vast opportunities that exist to leverage Big Data into greater intelligence and situational awareness. We asked this week’s Expert Panel Roundtable: What is the intersection of the security market and "big data?"

What New Features Of Video Systems Help To Ensure Privacy?
What New Features Of Video Systems Help To Ensure Privacy?

Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video sy...

What is the current state of the physical security supply chain?
What is the current state of the physical security supply chain?

Challenges of the global supply chain have reverberated into the physical security marketplace in a big way in recent years. Dealers who historically could count on timely delivery of equipment have instead faced extended delays that in some cases have jeopardized their businesses. By most accounts, the situation is improving, so we turned to our Expert Panel Roundtable for an update. Our question this week: What is the current state of the physical security supply chain?

What Big Announcements Can We Expect At ISC West 2023?
What Big Announcements Can We Expect At ISC West 2023?

The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?

What Is The Largest Risk To Critical Infrastructure In 2023?
What Is The Largest Risk To Critical Infrastructure In 2023?

Some systems and assets are so vital that their incapacity or destruction would have a debilitating impact on security, economic security, public health or safety, or any combination of those factors. This so-called critical infrastructure has historically faced many complex threats. In 2023, we can add growing concerns about cybersecurity to the mix. We asked this week’s Expert Panel Roundtable: What is the largest risk to critical infrastructure in 2023? How can we address it?

Hot Takes: From Video Quality To PIAMS To Cashier-Less Checkout
Hot Takes: From Video Quality To PIAMS To Cashier-Less Checkout

There’s always more to talk about in our Expert Panel Roundtable discussions, and we appreciate the variety of opinionated responses offered throughout the year. Looking back at 2022, we found several random and uncategorized Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.

How Does Multi-Factor Authentication Impact Security?
How Does Multi-Factor Authentication Impact Security?

A multi-factor authentication is a layered approach that requires users to provide two or more verification factors, such as credentials, to gain access to data and applications. If one of the credentials is compromised, the thinking goes, an unauthorized user will still be unable to meet the second authentication requirement and will be denied access to a targeted physical space, computing device, network, or database. Cybersecurity applications have long embraced the idea of MFA, which is also...

Is The Password On The Brink Of Extinction?
Is The Password On The Brink Of Extinction?

For decades now, usernames and passwords have been a critical, and highly visible, element in data protection and cybersecurity. However, the use of passwords is a far-from-perfect approach to protecting access to computer systems. Nowadays, newer, more sophisticated forms of user identification and authentication have emerged on the scene. We asked this week’s Expert Panel Roundtable: Is the password on the brink of extinction in physical security? Why or why not?

Beyond Security: Leveraging Video Data In The Enterprise Environment
Beyond Security: Leveraging Video Data In The Enterprise Environment

Since they were invented, video surveillance cameras have been used mostly for security applications. However, the advent of video analytics and artificial intelligence (AI) has paved the way for use of video data in a variety of other applications, from process control to measuring occupancy to analyzing customer traffic trends. The ‘data’ aspects of ‘video data’ are feeding many new applications that no longer involve operators looking at video images on a screen. We as...

Using Technology To Address Loss Prevention During The Holidays
Using Technology To Address Loss Prevention During The Holidays

The holiday season is marked by festive spirit and family celebrations, but it is also the busiest time of year for retailers. Busy shoppers willing to spend money are an upside to the holiday shopping season, and many businesses depend on the holiday rush as a critical element to having a successful year. A downside of a busy holiday season is an increase in retail security threats including shoplifting. We asked this week’s Expert Panel Roundtable: How can technology address loss prevent...

The Impact Of Machine Learning (ML) On The Security Market
The Impact Of Machine Learning (ML) On The Security Market

Machine learning refers to the evolving ability of computer systems to learn and adapt without following explicit instructions. It essentially involves the use of algorithms and statistical models to analyze and draw conclusions from patterns in data. In the security industry, when it comes to buzzwords, artificial intelligence (AI) has a higher profile than the more specific related term, although machine learning is a better description of tools that are gaining popularity in physical security...

Selling Security Technology To Upper Management: Here’s How
Selling Security Technology To Upper Management: Here’s How

Obtaining needed funding for security technology improvements often requires going to senior management with a hat in hand. But requests for more security funding from the C-suite may fall on deaf ears unless a security professional can make a compelling case for the needed expenditures. It starts with learning to speak in terms that resonate with upper management and also involves carefully analyzing the benefits of security investments to the broader enterprise. We asked this week’s Expe...

What’s New In The Integration Of Video And Access Control?
What’s New In The Integration Of Video And Access Control?

Integration of access control and video has been a reality for decades. The combination of our industry’s dominant technologies provides a one-two punch when it comes to maximizing the security benefits of a system. Access control tracks ‘events,’ while video provides visibility into those events. But the benefits of integrating video and access control are far from static. Rather, today’s systems are becoming even more valuable as they incorporate elements such as artifi...

What Is The Internet’s Role In Researching Security Equipment?
What Is The Internet’s Role In Researching Security Equipment?

How has the security end user’s ‘buying journey’ changed in the age of the Internet? If nothing else, the online age has simplified access to information about various security products and systems. However, easily accessible information could enable a customer to delay contacting a manufacturer or systems integrator until further along the decision-making process. We asked this week’s Expert Panel Roundtable: What role should the Internet play when customers are research...

How Can The Industry Address Cybersecurity Concerns Of Cloud Systems?
How Can The Industry Address Cybersecurity Concerns Of Cloud Systems?

Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry...

What Are The Latest Developments In Mobile Access Control?
What Are The Latest Developments In Mobile Access Control?

Who needs cards when everyone has a smartphone? That’s the key question underlying the access control industry’s transition to mobile credentials. But the transition is easier said than done, and mobile credentialing, for all its advantages, also has limitations, which further innovation continues to address. Wider acceptance comes next, driven by use cases in various vertical markets. We asked this week’s Expert Panel Roundtable: What are the latest developments in mobile acce...

What Impact Are Robots And/Or Drones Having On The Security Industry?
What Impact Are Robots And/Or Drones Having On The Security Industry?

Robots have been used in security patrol applications for decades, although developments in artificial intelligence (AI), video analytics, sensors and communications are expanding robot capabilities to new heights. Suddenly, robots are the latest thing in security. In addition, drones have become ubiquitous for numerous applications, including security. We wondered how well the security industry is embracing these newer technologies. We asked this week’s Expert Panel Roundtable: What impac...

What Do You Accomplish By Attending A Security Trade Show?
What Do You Accomplish By Attending A Security Trade Show?

The security trade show season is resuming this fall with the GSX show in the United States and Security Essen in Germany, among other upcoming industry events. The return of trade shows is gathering momentum following the COVID lockdowns and cancellations with plenty more shows coming soon. But how useful is attending industry trade shows? We asked this week’s Expert Panel Roundtable: What do you accomplish by attending a security industry show?

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. Round table discussions
About this page

See an extensive list of insightful discussions related to Video analytics, providing in-depth opinions and analysis on product, technology and industry trends on Video analytics from industry thought leaders and experts.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec