Wireless security - Expert commentary
More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; o...
Dozens of suppliers, dealers, installers and industry organisations participated in our First Annual Security Market Review and Forecast 2014 was a great time to be in the security industry, and 2015 will be even better. This is the optimistic view shared among industry leaders contacted by SourceSecurity.com and asked to reflect on the market in 2014 and to look ahead to the New Year. Dozens of suppliers, dealers, installers and industry organizations participated in our...
Two reports recently resurfaced – one online and the other on national television – that cited potential vulnerabilities of wireless intrusion door contacts and window sensors, devices commonly used to secure the perimeter of protected premises. These reports came after two independent researchers who work in the industry, but announced their findings independent of their positions, cited that alarm signals from sensors and detectors to the control panel could be subve...
Continued training is critical to keep up with rapidly evolving access control technologies Training and education are essential elements of success in the access control market for integrators and end users alike. Whether one is a seasoned veteran or still new to the industry, continued training and education are critical given that access control technologies continue to evolve at a rapid pace. System integrators who do not take advantage of manufacturers’ training s...
Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillance as it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping...
A planned migration provides the ability to plan, budget and control the path to an improved access control environment The installed base of legacy systems presents opportunities and obstacles for providers of newer access control systems. Most end users would prefer not to do a full rip-and-replace upgrade. Therefore, integrators (and manufacturers) have to find a smooth transition path. Access control customers eager to embrace the newest capabilities on the market are ofte...
900 MHz wireless and WiFi (2.4GHz) are different technologies but sometimes used interchangeably 900 MHz wireless and Wi-Fi (2.4 GHz) are sometimes used interchangeably in the access control world to describe solutions that do not require running wires all the way to the opening. It’s true that, as wireless options, both technologies offer some general advantages over traditional hardwired solutions.In this article, Minu Youngkin, Allegion, Integrator Marketing Mana...
More efficient event-driven video surveillance can be achieved by replacing VCA with physical detection Event-driven video for surveillance and recording involves using a video recorder or video management software system that is triggered by movement in the areas where cameras are located. Event-driven video can be achieved by using intelligent motion detection or video contents analytics (VCA) on the camera, recorder or PC server. Recently, performance of VCA has improv...
Network-enabled "intelligent" security components increasingly have better computational and memory capacity The use of Internet Protocol (IP), or networking, is commonly associated with convergence. In this article, Markus Lahtinen of Lund University's LUSAX project, contends that the shift to network-enabled "intelligent" security components which increasingly have better computational and memory capacity has a significant impact on the present and future dy...
More attention needs to be given to wireless security technology Despite major developments in radio technology and increased demand in the market for new solutions, wireless systems are still not fully embraced by the security industry. Tony Makosinski of Honeywell Security Group asks why, and explores what the future holds for wireless technology. Although wireless technology -specifically radio - has been used in the security industry since the 1980s, penetration rates in...