There is no custom code to display.

Convergence Q&A

Print Friendly, PDF & Email

by Ray Bernard PSP, CHS-III

This is the index page of my 14-year Convergence Q&A column in Security Technology Executive magazine, starting with the most recent column at the top.

  • Deep Learning to the Rescue
    Print Friendly, PDF & Email

    by Ray Bernard PSP, CHS-III May-Jun 2019 This question about video analytics touches on an area where Deep Learning is making a real impact: security video analytics. Q:        I keep reading that today’s video analytics are much more accurate – such as 95 percent versus 75 percent – than they were just five years ago.… Continue Reading

  • How to Manage High-Camera-Count Deployments
    Print Friendly, PDF & Email

    Most organizations with large numbers of cameras can’t keep up without incurring a huge labor cost that’s out of proportion to the cost of the camera system. It’s typically been a lost cause. Now, however – if you have AXIS cameras with firmware 4.40 or later, you can use the newly-released free AXIS Device Manager software. Continue Reading

  • Technology Lifecycle Management
    Print Friendly, PDF & Email

    IT has practiced technology lifecycle management for decades, under various names like product lifecycle management and systems lifecycle management. Compared to IT, the physical security industry has paid little attention to the management of deployed products and systems, which is why security practitioners as periodically asked questions like this one by their organization’s IT group. Continue Reading

  • Cyber Security Profiles for Physical Security Systems
    Print Friendly, PDF & Email

    Over the past year, news media have covered several major cyberattacks on Internet-connected video security cameras and recording systems. This has many corporate IT departments concerned about the vulnerabilities of networked electronic physical security systems, especially video camera systems. Continue Reading

  • When and Why Should We Move to a Cloud-Based Security System?
    Print Friendly, PDF & Email

    Increasingly I am hearing about IT departments asking what direction physical security system technology is moving in, and where cloud-based applications or systems fit on security’s technology roadmap. Continue Reading

  • Security Design Conference for Consultants and Engineers
    Print Friendly, PDF & Email

    Long overdue, there is finally a security event where security design consultants and engineers can put their heads together with leading manufacturers, to address security design challenges and get up-to-date on the details of security technology innovation, as well technology current and future directions. Continue Reading

  • Project Management for the 21st Century
    Print Friendly, PDF & Email

    Electronic physical security systems are built using information technology. So, an IT project manager with an excellent track record would seem to be in a good position to manage a physical security system deployment project. However, the reality is that for many physical security system projects, especially those that are large or complex, it takes industry-specific knowledge to successfully apply project management skills during project planning and deployment. Continue Reading

  • Addressing Corporate Liabilities of Sharing Security Video
    Print Friendly, PDF & Email

    In our September/October issue’s column, “What Are the Risks Involved in Sharing Video?”, we looked at some practical reasons for providing other business units with access to security video, and what risks can be involved. This column addresses issues of corporate liability, and presents some measures that can be used to mitigate those risks. Continue Reading

  • What are the Risks Involved in Sharing Video?
    Print Friendly, PDF & Email

    This question came from a security manager at a manufacturing plant, who several years ago added cameras to the facility’s security surveillance system to support safety, manufacturing and quality investigations. The new video coverage saves more than $100K each year in eliminating product run discards, has helped improve training, and has documented false injury claims—also saving money and avoiding adverse publicity. Continue Reading

  • IT and Security Robotics
    Print Friendly, PDF & Email

    Based upon this reader’s question, it looks like the word is starting to get out about the usefulness of using unmanned ground vehicles (UGVs) for security patrols and inspections. Continue Reading

  • Dealing with an Over-Tasked IT Department
    Print Friendly, PDF & Email

    Due to the continued acceleration of information technology advancement, many IT departments are undergoing changes, and are under pressure to quickly adopt new technologies that would be of significant benefit to the business. In some organizations this has degraded in IT’s support for electronic security systems. For Security departments experiencing this situation, it is not likely to resolve in the short term without specific action by Security. Continue Reading

  • High-Value ISC West 2016 Sessions
    Print Friendly, PDF & Email

    These days I am always scouting around for educational sessions about the status of security and technology, cyber security, cloud services, and the future of security risk management. Continue Reading

  • Hardening Electronic Physical Security Systems
    Print Friendly, PDF & Email

    Last month the Security Industry Association (SIA)—well known for its ISC East and ISC West security conferences—announced its formation of the SIA Cybersecurity Advisory Board, which is filled with action-oriented heavy hitters from both the IT and physical security domains. This is another sign that in the very near future, issues like the one this security manager wrote about will no longer be commonplace. Continue Reading

  • Keeping the Lights On
    Print Friendly, PDF & Email

    More and more, in organizations that don’t have an in-house or corporate physical security department, IT departments and their personnel are being given responsibility for networked security video surveillance systems. Too often it happens that on investigating a nighttime outdoor incident, the video is too dark because some of outdoor lights were burned out, broken, or off their control schedule. Continue Reading

  • Security Product Life Cycle
    Print Friendly, PDF & Email

    IT Departments have the purpose of providing the information technology required for the fulfillment of the organization’s mission. Some of the most valuable lessons learned in IT have been those that relate to the management of technology in support of that purpose. Continue Reading

  • Securing Equipment Rooms with Perimeter Doors
    Print Friendly, PDF & Email

    The door hinges on metal perimeter doors in commercial and industrial buildings practically all look the same from the outside. However, many have ordinary hinges whose hinge pins are easily removed from the outside, allowing the hinge side of the door to be opened from the outside. Other doors have security hinges whose hinge pins cannot be removed, and some doors have special security hinges that keep the door from being opened from the outside even if the hinge pins are removed. Continue Reading

  • The Lure of Default Settings
    Print Friendly, PDF & Email

    When it comes to the installation of security systems and devices, some installers find it tempting to “turn it on, check it out, and run with factory settings” if everything seems to be working okay. Some default settings leave system vulnerabilities in place, including those relating to passwords and encryption of communications. Plus, most end user customers have configuration needs that go beyond the factory default settings – at least that’s what end users have told us. See how to “do it right”. Continue Reading