intelligent video monitoring
, , ,

Turning Security From Reactive to Proactive

Intelligent Video Monitoring Can Be Used to Prevent, Not Just Investigate, Crimes Video surveillance has become the primary data source for security and insights that help businesses operate. Typically, video is a reactive process used to investigate a crime after damage has been done. But more impactful solutions are now available. Proactive video monitoring (PVM)…

Keep Reading »
cloud-based access control concept
, , ,

The March to Mobile: How Mobile, Cloud-Based Access Control Is Changing Security

“Mobile” might seem like a buzzword in the access control industry these days; however, use cases and demand are rapidly increasing. According to a 2021 survey from Campus Safety, 62% of respondents have purchased access control solutions with mobile credential options over the past two years. What’s more, an estimated 14.7 million mobile credentials were…

Keep Reading »
presentation in office

How People Analytics Can Enhance Your Company’s Workforce Development Strategy

,

In the Security Industry Association’s (SIA’s)  2022 Security Megatrends report, workforce development was listed as the No. 5 Security Megatrend, citing the biggest area of pain for integrators was finding the talent needed to get the work done. With the labor shortage integrators are experiencing, the employee processes within the security industry need to be…

Keep Reading »
facial recognition algorithm
, , ,

What Science Really Says About Facial Recognition Accuracy and Bias Concerns

Updated March 11, 2024 Since 2020, calls to heavily restrict or ban the use of facial recognition technology have become commonplace in technology, data privacy and artificial intelligence policymaking discussions. In many cases, the sole justification offered is the claim that this face matching technology is generally inaccurate, and particularly so with respect to women…

Keep Reading »
government building
, , , , ,

Making the Case for a Systems Approach to Ballistic Security

In Bullet-Resistant Systems, Key Components Come Together to Build Something Greater For those unfamiliar with ballistic security, it would be easy to assume the process is as simple as a single piece of bullet-resistant glass. The terms themselves – “ballistic”, “bulletproof” and “bullet-resistant” – tend to inspire confidence, and the average person may not be…

Keep Reading »
cloud concept
, , ,

Cloud Access Control and the Importance of API Integrations

A transformation is happening. From global enterprises to the most renowned hospitals, cloud access control is quickly becoming more popular, replacing its on-premises predecessors. With the cloud’s rise in popularity, IT and security teams have the “green light” to trash their antiquated Windows 95-esque dashboards and bury their bulky server racks. In their place, sleek…

Keep Reading »
COVID safe office
, , , , , ,

Using Technology to Bring Employees Back Safely: Touchless Access Control and Other Solutions Enhance Both Security and Health

Will we ever return to the office for good? The rise of the Omicron variant and the pandemic’s rapid resurgence has forced companies to postpone office return dates. However, many companies will soon welcome people back, and they will need to address people’s safety concerns in the process. A Gartner survey of global HR leaders…

Keep Reading »
Security screening
, , , ,

Leveraging AI for People Screening: Millimeter Wave Tech and Deep Learning Can Produce Effective, Automated Virtual Searches

Despite advancements in security technologies across nearly every industry, options for screening people have largely remained the same for more than a decade. People screening for loss prevention, data center security, high-value manufacturing, event security and other use cases generally relies upon low-tech and personnel-intensive measures like physical searches, pat-downs and metal detection systems. Some…

Keep Reading »
video monitoring concept
, ,

Putting Video in a Container: Containerization Technology Can Provide an Integrated and Future-Proof C2 Platform

Video management systems (VMS) will always be necessary for mission-critical organizations because they are the foundational application that security systems are built upon. Therefore, VMS architecture should promote interoperability, scalability and reliability. Historically, one of the biggest challenges in video surveillance deployments has been ensuring the ability to scale a system as the need arises.…

Keep Reading »