March / April 2024

  • To Cloud or Not to Cloud?
  • Key Management Takes Flight in Tallahassee
  • Municipal Digital Access
  • Some New Tricks
  • Getting Smarter About AI


Cover Story

To Cloud or Not to Cloud?

What effective security management looks like in 2024

By Fredrik Nilsson

The cloud is a fact of life across all IT applications—and security is no exception. While most software applications today have moved to the cloud, security is a bit different. There are significant technical and budgetary challenges, particularly as the increasing volume (and image quality) of security cameras in use results in an enormous amount of video data transferred and stored in the cloud.


Features

Solving Loitering and Open Access Challenges

By Ronnie Pennington

Loitering is generally not considered a crime with few instances of arrests reported nationally, but it is becoming an increasing problem for a multitude of reasons. One being the use of private spaces such as public-faced restrooms for drug use, other forms of illicit behavior, or as safe havens where homeless individuals are seeking shelter and protection from the elements. In any case, the misuse and prolonged occupancy of publicly accessible spaces prevents them from being accessed for their intended purposes by legitimate users.


A Biometric Revolution

By William Davis

In an era where technological advancements redefine the way we live and work, the transition from classic credentials to biometric authentication stands out as a pivotal shift in the realm of security. Nearly gone are the days of traditional badges and access cards; instead, our own unique biological markers are taking center stage, offering a more secure and seamless authentication experience.


Adapting to See Change

By James Lubary

Imagine a retail world rapidly transforming, a landscape where the traditional brick-and-mortar model faces the relentless tide of e-commerce. Well, there is no need to imagine as this is 2024, where market losses surpass $112 billion, and the term “retail apocalypse” is not just hyperbole but a stark reality. 


Shaping the Use of Technology

How responsible AI plays a key role in healthcare

By Mark Johnson

In the ever-evolving healthcare landscape, hospitals are increasingly turning to video technology for a range of critical applications that extend far beyond traditional security. These innovative systems play a pivotal role in several areas including inventory control, drug diversion prevention, patient monitoring, and compliance with hospital procedures and industry standards.


Vehicle Ramming Attacks

By Mark Borto

In the world of cyber security, a cyber-attack exploits users having weak passwords or protections in place, making it easy for threat actors to cause harm. Destructive attacks in the physical world work much in the same way, using simple tactics and a wide attack surface to intentionally cause harm. The threat of vehicle ramming attacks introduces a new dimension of challenges for security professionals, property managers, and business owners alike.


Early Detection and Deterrence

By Jon Carstensen

Threats of theft, vandalism, and terrorism are a continual concern for those responsible for the security of high-risk facilities. Perimeter security is vital to maintaining safety, safeguarding assets and ensuring continuity of business at these sites.


The Need to Hear and be Heard

By Bruce Czerwinski

Have you ever tried to watch a movie in a movie theater and the sound suddenly stopped working? Or you attended a musical concert, but the sound system failed? What happened? More than likely, the movie or concert stopped until the sound and audio were fixed. Or if it could not be fixed, you likely departed and your money refunded. After all, it is pointless to watch a movie or attend a concert without sound. You are not getting the whole experience.


Going Beyond the Perimeter

10 benefits of upgrading to wireless locks

By Karen Keating

Wireless locks are a growing segment of the electronic access control (EAC) market, increasing at a rate of 8% annually in the Americas, according to OMDIA. They can be used in a variety of applications and provide many of the benefits of traditional hard-wired access control. Depending on the type, they can be managed as standalone solutions or as part of Physical Access Control Software (PACS) systems.


Getting Smarter About AI

Surveillance technology has change with new breakthroughs and enhanced remote monitoring

By Aaron Saks

The past few years have seen companies throughout the security and surveillance industry expand their use of AI, some rapidly adopting the technology and others dipping their toes in the water. Either way, AI has certainly moved beyond being an emerging technology to now being a proven reality, with demonstrated abilities to improve security camera imaging performance, enhance the accuracy of people and object detection, reduce false alarms and conserve recording and network bandwidth.


Some New Tricks

AI-based cameras have some surprises up their sleeve

By Adam Lowenstein

In the constantly evolving world of AI, you can blink and miss an innovation. This rapid pace of evolution means organizations are under increased pressure to invest in solutions that do not become obsolete a short time after they are installed.


Municipal Digital Access

By S. Guerry Bruner

We hear about Smart Cities more frequently these days, due to considerable progress in recent years. But it is an initiative that has been around for decades. The idea emerged when analysts began using technology to collect images and data to help improve civic services, protect against disasters, and improve citizens' lives. At its core that is still the intent.


Key Management Takes Flight in Tallahassee

By Brian Davidson

In 2017, after attending a national security conference, Thomas Vergo returned to his Tallahassee International Airport (TLH) office with a profound idea. Placing a significant item on both his boss's and director's desks, he sought to revolutionize their approach to access control.


A 30,000 View

Cloud-based video: the journey and its future course

By Martin Gren

Today it seems like the cloud is everywhere. In the security industry, cloud-based video and access control solutions are certainly big trends. But how, and why, did the journey toward cloud-based video begin? And where is it headed?


Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3