by Ray Bernard PSP, CHS-III
This is the index page of my 14-year Convergence Q&A column in Security Technology Executive magazine, starting with the most recent column at the top.
by Ray Bernard PSP, CHS-III May-Jun 2019 This question about video analytics touches on an area where Deep Learning is making a real impact: security video analytics. Q: I keep reading that today’s video analytics are much more accurate – such as 95 percent versus 75 percent – than they were just five years ago.… Continue Reading
Most organizations with large numbers of cameras can’t keep up without incurring a huge labor cost that’s out of proportion to the cost of the camera system. It’s typically been a lost cause. Now, however – if you have AXIS cameras with firmware 4.40 or later, you can use the newly-released free AXIS Device Manager software. Continue Reading
IT has practiced technology lifecycle management for decades, under various names like product lifecycle management and systems lifecycle management. Compared to IT, the physical security industry has paid little attention to the management of deployed products and systems, which is why security practitioners as periodically asked questions like this one by their organization’s IT group. Continue Reading
Over the past year, news media have covered several major cyberattacks on Internet-connected video security cameras and recording systems. This has many corporate IT departments concerned about the vulnerabilities of networked electronic physical security systems, especially video camera systems. Continue Reading
Increasingly I am hearing about IT departments asking what direction physical security system technology is moving in, and where cloud-based applications or systems fit on security’s technology roadmap. Continue Reading
Long overdue, there is finally a security event where security design consultants and engineers can put their heads together with leading manufacturers, to address security design challenges and get up-to-date on the details of security technology innovation, as well technology current and future directions. Continue Reading
Electronic physical security systems are built using information technology. So, an IT project manager with an excellent track record would seem to be in a good position to manage a physical security system deployment project. However, the reality is that for many physical security system projects, especially those that are large or complex, it takes industry-specific knowledge to successfully apply project management skills during project planning and deployment. Continue Reading
In our September/October issue’s column, “What Are the Risks Involved in Sharing Video?”, we looked at some practical reasons for providing other business units with access to security video, and what risks can be involved. This column addresses issues of corporate liability, and presents some measures that can be used to mitigate those risks. Continue Reading
This question came from a security manager at a manufacturing plant, who several years ago added cameras to the facility’s security surveillance system to support safety, manufacturing and quality investigations. The new video coverage saves more than $100K each year in eliminating product run discards, has helped improve training, and has documented false injury claims—also saving money and avoiding adverse publicity. Continue Reading
Based upon this reader’s question, it looks like the word is starting to get out about the usefulness of using unmanned ground vehicles (UGVs) for security patrols and inspections. Continue Reading
Due to the continued acceleration of information technology advancement, many IT departments are undergoing changes, and are under pressure to quickly adopt new technologies that would be of significant benefit to the business. In some organizations this has degraded in IT’s support for electronic security systems. For Security departments experiencing this situation, it is not likely to resolve in the short term without specific action by Security. Continue Reading
These days I am always scouting around for educational sessions about the status of security and technology, cyber security, cloud services, and the future of security risk management. Continue Reading
Last month the Security Industry Association (SIA)—well known for its ISC East and ISC West security conferences—announced its formation of the SIA Cybersecurity Advisory Board, which is filled with action-oriented heavy hitters from both the IT and physical security domains. This is another sign that in the very near future, issues like the one this security manager wrote about will no longer be commonplace. Continue Reading
More and more, in organizations that don’t have an in-house or corporate physical security department, IT departments and their personnel are being given responsibility for networked security video surveillance systems. Too often it happens that on investigating a nighttime outdoor incident, the video is too dark because some of outdoor lights were burned out, broken, or off their control schedule. Continue Reading
IT Departments have the purpose of providing the information technology required for the fulfillment of the organization’s mission. Some of the most valuable lessons learned in IT have been those that relate to the management of technology in support of that purpose. Continue Reading
The door hinges on metal perimeter doors in commercial and industrial buildings practically all look the same from the outside. However, many have ordinary hinges whose hinge pins are easily removed from the outside, allowing the hinge side of the door to be opened from the outside. Other doors have security hinges whose hinge pins cannot be removed, and some doors have special security hinges that keep the door from being opened from the outside even if the hinge pins are removed. Continue Reading
When it comes to the installation of security systems and devices, some installers find it tempting to “turn it on, check it out, and run with factory settings” if everything seems to be working okay. Some default settings leave system vulnerabilities in place, including those relating to passwords and encryption of communications. Plus, most end user customers have configuration needs that go beyond the factory default settings – at least that’s what end users have told us. See how to “do it right”. Continue Reading