Archive for April 2017
VMS: The Next Generation
Facilities can now extend video management systems to provide a more complete security solution Since video surveillance was first used as a security tool, the control room and security operations have undergone a transformation, several times over. Video and video management systems (VMS) have evolved. Whereas once the view from video footage was fixed, low-quality…
Keep Reading »An Eye for Fraud
Iris recognition technology offers one of the most effective ways to prevent medical identity theft and false claims In 2013, according to the FBI, insurance fraud totaled $80 billion. These costs are borne by insurers, but the companies typically pass them on to providers, who, in turn, may pass them on to patients. At the…
Keep Reading »By the Power of Ethernet
PoE gives smaller facilities more access control options Physical electronic security for non-enterprise applications is now as simple as tapping into the nearest Ethernet connection to power and control doors via web browser and low-voltage access and egress devices. There are a variety of cost-effective, code-compliant, low-power solutions for electronic access control of door openings…
Keep Reading »Law & Order & Video
Police and prosecutors need enhanced case management systems In the security sector, while information is great, what we strive for is clear and actionable data. Both seeing and understanding are vital. To that end, we continue to deploy more cameras in physical security systems and collect and share more data than ever before. But this…
Keep Reading »Out of Many, One
Integrating components of a security system can vastly improve effectiveness When end users call on a security integrator to install or upgrade a system, the basic requirements of the system may already be defined. While these may seem to address all of the needs and wants, the user may be looking at each type of…
Keep Reading »More than Just a Silver Lining
Using the cloud for access control enhances scalability, availability, resiliency, flexibility and security The power of the public cloud has become a catalyst for a dramatic shift in the information systems and security worlds. On-premises solutions no longer exist in many domains, from customer relationship management to expense management to human resources systems to learning…
Keep Reading »Getting on the Path
Shortest Path Bridging can enhance network performance and efficiency Darren Giacomini, BCDVideo As the world of surveillance evolves, the introduction of multi-sensor and megapixel cameras presents a dynamic shift in industry accepted standards. For years, we have known the limitations of pan-tilt-zoom (PTZ) cameras, often finding them looking in one direction, only to miss critical…
Keep Reading »A Matter of Trust
New digital identity technologies will increase security, functionality, and convenience in many areas A shift in the use of identity technology is leading to increased adoption of mobile devices and the latest smart card technology, a greater emphasis, and reliance on the cloud, and a radical new way of thinking about trust in smart environments…
Keep Reading »Up in the Air
Drones powered by artificial intelligence could transform security Drones are powerful. They are changing our existence. They are here to stay. This article examines a drone application with the potential to have an extraordinary impact on the physical security industry. It is called robotic aerial security (RAS). What Is Robotic Aerial Security? RAS is sometimes…
Keep Reading »Walk this Way, Talk this Way: Using Multiple Biometrics
Combining gait analysis, voice recognition and other biometric identifiers provides a fraud-resistant security solution According to the statistics, terror attacks are continuing to climb as political climates heat up and radicals look for security weaknesses they can exploit to further their messages globally. The list of cities that have fallen victim to major attacks keeps…
Keep Reading »