Overcoming Objections to Smartphones as Your Credential
Could the phone replace your access control card or fob? Moore’s Law notwithstanding, technology advances have always outpaced our ability to adopt and consume them. This has been and remains the case with even the least complicated aspects of technology like electronic access control (EAC). At their most basic level, EAC systems lock and unlock…
Keep Reading »Lighting the Way to a Smarter, Safer City
The Importance of External Illumination Systems When Lighting for Video Surveillance Demand for video surveillance systems has continued to surge throughout the years, with its market share expected to reach $40 billion by 2019 according to TrendForce’s market data. While there is no doubt that cameras keep us safer and aid in law enforcement efforts,…
Keep Reading »GDPR and the Security Industry
The European Union’s (EU’s) General Data Protection Regulation (GDPR) on data privacy went into effect on May 25, 2018. The law gives consumers more control over how their data is collected and requires companies to justify what they do with this information. It also gives companies guidelines on what they can and cannot do with…
Keep Reading »24-Hour Perimeter Protection
Relentless defense for critical infrastructure The challenges to perimeter protection seem to grow more nefarious every day. The bad news is that intruders are increasingly inventive and unscrupulous. The good news is that the security operators are leveraging more innovative technologies to mitigate and deter these threats. Effective perimeter protection on a 24/7 basis is…
Keep Reading »Early Alerts Spur Action
Why corporate security teams rely on social media for real-time information Social media is transforming information distribution. Increasingly, it is where breaking news first appears. It’s where high-profile politicians make announcements, share opinions and shape public debate on the issues. It’s instantaneous, pervasive and truly global. And social media is deeply embedded in popular culture.…
Keep Reading »Smart Power
The paradigm has shifted to intelligent networking solutions In the past, power wasn’t smart. It was simply a static piece of hardware – still necessary but not connected or integrated with other physical security components and certainly unable to tap into analytics, predictive data or history reporting. That’s no longer the case. Now, the paradigm…
Keep Reading »Modern Face Recognition Systems
Living the revolution as algorithms based on Deep Neural Networks (DNN) come to market Face recognition as a technology experienced its first wave of adoption in 2000s, mostly in government projects. We must admit that the quality and performance of the previous generation of face recognition products simply doesn’t hold up against criticism, although many…
Keep Reading »The Puppy Movement: CPTED & a New Vision for Security
When designing inhabited space to mitigate unwanted behaviors, we must embrace nonelectronic, nonaggressive technologies. When we think of security, we often think of products. We think of fences with concertina wire on top, big bold cement blocks, or at the very minimum a jersey barrier to prevent vehicular threats. We think of armed soldiers walking…
Keep Reading »Listen Up
How audio monitoring raises the surveillance bar Did you know that the “See Something, Say Something” campaign originated with the New York City Metropolitan Transportation Authority? The citizen participation program was so successful as a force multiplier for local law enforcement that the U.S. Department of Homeland Security licensed the idea and turned it into…
Keep Reading »Securing Health Care Facilities
Maintaining 24/7 parking lot security Many hospitals today currently have large parking garage complexes containing multiple levels of parking supported and protected by an extensive parking gate entry system and surveillance system; however, deploying these types of solutions in remote and outdoor parking lots can be a challenge. Unlike a retail environment, which has a…
Keep Reading »