Wireless security - Expert commentary

IFSEC Day 1: H.265, Apps And Cybersecurity Shine Through Other Security Innovations

H.265 compression, apps and the inherent security of security systems were some of the themes to be gleaned on the first day of IFSEC International. Almost every video exhibitor I saw on day one of the show mentioned that many of their products use H.265 compression in these days of high definition, bandwidth-hungry cameras. Over at Vivotek’s stand, for example, Emilio Sanchez, project consultant, spoke of the company’s H.265 Smart Stream compression algorithm. He said this saves an...

Top Trends Driving Expansion Of Home Automation In The Security Industry And Beyond

It’s the 21st century already. Isn’t it time we all lived in smart homes? For technophiles everywhere, the smart home can’t come soon enough. The same might be said for the security marketplace, which is well positioned to thrive in the coming era of home automation. The wait could be shorter than we think, given some recent trends and events we are seeing in the home automation market. Let’s consider several of them: 1. Home Automation Is Getting Attention From Silic...

How Adopting Wireless Surveillance Solutions Improves Finance And Flexibility

Wireless surveillance systems are attractive to customersas they are cost-effective and easy to install Various studies, market statistics and forecasts project growth for the surveillance market from 2016 to 2020. Besides needs ranging from traditional analog cameras to IP network cameras, more and more consumers also have a high interest in intelligent surveillance systems. Along with safety, these systems provide additional details for users in applications such as peo...

Developing Effective Security Applications For The Operational Technology Environment

Many operators don’t know what’s actually transpiring on their OT networkand, even if hacked, have no knowledge of the assault Innovation in the oil and gas, utility, healthcare and transportation industries is heavily reliant on connectivity - between devices and systems, machines and data, people and processes. This connectivity is great for productivity upstream, mid-stream and downstream, but is also exposes these systems to greater cyber threat. Furthermore, a...

Access Control Challenges In A Changing World - From Managing Nurse Servers In Hospitals To Securing Sterile Facilities

ASSA ABLOY door handles with built in reader, strike, request-to-exit sensorand door contacts help maintain sterile environment of stainless steel rooms Access control technology has been around for a long time, but security professionals still run into weird problems when designing and installing systems. For example, when a hospital discovered that it was losing $4,000 per patient bed annually in medicines and other supplies, it asked ASSA ABLOY for an access control solutio...

Why Employing A Software System Is A Smart Way To Enhance Data Accuracy And Business Profitability

Working with accurate and detailed product specifications saves time andreduces the possibility of errors throughout a project They’re coming from every angle. Things that zap your company’s profitability: lower hardware margins, escalating labor costs, simply the cost of doing business. So systems integrators have been looking — and finding — new ways to increase revenues. New sources of revenue are emerging from services and even the administration...

Wireless Technology Attracts Security Installers’ Attention For Its Reliability And Cost-Effectiveness

Wireless offers many opportunities for security contractors to increasethe base of installations and add subscribers Security installation contractors have many different choices when it comes to wireless signaling technologies for their customers. Radio frequency (RF) communications have become more reliable, more robust and include inherent safeguards, such as encryption, to prevent hacking or takeover of wireless devices. Wireless can also allow for remote programing, depen...

Siklu’s Millimeter Wave Wireless Technology Supports Video Surveillance Networks With Improved Capacity

Siklu further expanded its presence in the video surveillance market in 2015. The company released the world’s smallest outdoor Gbps radio to address the issue of densified coverage, which results in the need for high capacity connectivity in surveillance networks – a trend that has snowballed in past years.  Growing Video Surveillance Networks Demand Greater Bandwidth Capacity Developments in video analytics and resolutions, requiring high-quality video at the surveillance ne...

SourceSecurity.com 2015 Review And 2016 Forecast

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.   Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...

Solar And Wireless Video Surveillance Technologies Continue To Revolutionize Security Market

Video surveillance technologies such as solar and wireless security which are cost-effective and sustainable have witnessed increased adoption. Innovative end-user focused security companies will flourish in the coming years as new market verticals are looking to address security issues.   Evolution Of Surveillance Looking back over the past year, it is easy to see how the security industry has continued to realise substantial gains. Some of these gains have been financial, s...

Security Market Consolidation Trending For 2015; Cloud, IoT And Home Automation Set To Grow Further In 2016

2015 was a year of consolidations: The spring of 2015 recorded the highest acquisition rate for a six-month period in 10 years. There were single-digit market growth rates reported in video surveillance due to price erosion affecting revenues. Video solution providers are expanding into access control, and both are slowly but steadily moving into the cloud. Users want the efficiency benefits of converging access control with video verification and unified operation. There are more cloud offering...

Wireless Devices Vulnerable To Security Network Hacking – Are Closed Network Security Systems The Solution?

Any wireless device can be a soft target for hackers Security network hacking is one of the hottest topics today. The ability to access security systems or devices anywhere, leaves them vulnerable and prone to hacking. Any wireless device can be a soft target for hackers. Let’s start with the concept that nothing on a network is really secure. Let’s admit this to ourselves and take the next steps to make our security networks more secure. Internet of Things Securi...

Complete Security Systems Discusses Future Security Industry Trends

Complete Security Systems Inc., Marlboro, New Jersey, is a UL-listed central station and security installation company serving New Jersey and other East Coast areas. According to Chris Mosley, President of Complete Security Systems, attracting young people to the security industry is a challenge. Chris highlights Complete Security Systems' new products, services and training programs that have been developed to keep up with the fast-changing security industry. He admits that...

Monitronics Security - Benefits And Opportunities Of Professional Monitoring Services

Monitronics’ ProShop offers sales and marketing materials to its dealer network as a valuable resource Monitronics Security, headquartered in Dallas, continues to stress the importance of professional monitoring services to its dealers and their customers as a critical component of recurring monthly revenue (RMR). “Traditional dealers need to emphasize the advantages of live, around-the-clock monitoring for anyone considering a non-traditional provider or do-it-yo...

GPS And RFID Tracking To Boost Integrator Revenue

Wi-Fi, real-time location tracking and security sensors are important elements of IoT solutions The tracking of people, processes and things continues to grow, and that’s good news for systems integrators, who can add these services to their arsenal of offerings and boost their levels of recurring monthly revenue (RMR). Real-Time Location Tracking Global Positioning Systems (GPS) and Radio Frequency Identification (RFID) are great ways to not only add security, but ope...

Integrity Matters For Business Success, Not Gender, Says Chicago-based Integrator

Wong was the first Asian woman to obtain the Alarm Contractor License Mun C. Wong, PSP and president of VinTech Systems Inc. in Chicago, is a successful entrepreneur who has brought new technologies and a knack for superior service to her integration business.  In fact, at the age of 29, she was the first Asian woman to obtain the Alarm Contractor License from the State of Illinois and its Department of Financial and Professional Regulation. But she doesn't focus on gend...

Wireless Fire Technology Offers New Installation Opportunities At ISC West

SWIFT is a wireless fire detector line offered by Honeywell Fire Systems Honeywell Fire Systems, Northford, Conn., continues to enhance its line of wireless fire detectors, announcing new updates to its Fire-Lite® Alarms Smart Wireless Integrated Fire Technology (SWIFT™) at ISC West 2015 in Las Vegas. The SWIFT line of wireless fire alarm detectors and modules – which includes smoke, heat and pull stations – integrate with new and existing Fire-Lite...

Online And Offline Locks: Leveraging The Best Of Both Options

Online wireless locks enable real-time online access control functionality Organizations require more than a “one-size-fits-all” approach from their access control technology. Today, integrators leverage a mix of both online wireless and offline locks to provide a more customized system for each end user. By combining online and offline locks, integrators have the ability to expand the limits of an access control system, with more doors and greater capabilities tha...

Addressing The Unique Security Challenges Of K-12 Schools

Schools are unlike commercial buildings or other facilities in several ways, and the differences impact how they should be secured. For one thing, the inhabitants are mainly children and won’t carry card credentials. Also, schools have distinct traffic flows and are open all hours of the day for after-school activities and evening and weekend usage. “Security solutions must take into account this flexible and fluid schedule,” says Minu Youngkin, vertical marketing manager, Alle...

Is Home Automation Driving A Security Renaissance?

According to research firm IHS Technology, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015 For years, the industry’s penetration rate for security alarm systems has hovered from a conservative 18 percent of households to a more liberal 22 percent or so. According to research firm IHS, the residential intrusion alarm market is expected to grow by 9.4 percent in 2015. Perhaps this increase is due in part to the rise of interactive ser...

Transportation End Users Embracing Open Video Platform

Milestone Interconnect provides a cost-efficient and flexible way to have central surveillance operation across geographically dispersed sites The transportation vertical is embracing the open platform for video systems. In the past, manufacturers required transportation end users to purchase the camera, the recorders and the software all from one manufacturer. Now, with IP, organizations in the transportation vertical can use off-the-shelf cameras, servers (recorders) and sof...

Innovation At The Reader Disrupting The Access Control Market

More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...

Security Is Better Than Ever! The Industry Is Optimistic Looking To 2015

Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...

Making Wireless Data More Secure With Additional Layers Of Security

Two reports recently resurfaced – one online and the other on national television – that cited potential vulnerabilities of wireless intrusion door contacts and window sensors, devices commonly used to secure the perimeter of protected premises. These reports came after two independent researchers who work in the industry, but announced their findings independent of their positions, cited that alarm signals from sensors and detectors to the control panel could be subve...

The Benefits Of Training In The Access Control Market

Continued training is critical to keep up with rapidly evolving access control technologies Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a seasoned veteran or still new to the industry, continued training and education are critical given that access control technologies continue to evolve at a rapid pace. System integrators who do not take advantage of manufacturers’ training s...

Costs, Usability, And Support Among Access Control Challenges

Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillance as it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...

Transitioning From Legacy Access Control To Newer Technologies

A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...

Understanding The Difference Between 900 MHz Wireless Vs. 2.4 GHz Wi-Fi

900 MHz wireless and WiFi (2.4GHz) are different technologies but sometimes used interchangeably 900 MHz wireless and Wi-Fi (2.4 GHz) are sometimes used interchangeably in the access control world to describe solutions that do not require running wires all the way to the opening. It’s true that, as wireless options, both technologies offer some general advantages over traditional hardwired solutions.In this article, Minu Youngkin, Allegion, Integrator Marketing Mana...

Enhancing Video Security With Physical Detector Technology

More efficient event-driven video surveillance can be achieved by replacing VCA with physical detection Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improv...

Intelligent Security Components Pave The Second Wave Of Convergence

   Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...