From the Editor
Roman historian Titus Livius said, "We fear things in proportion to our ignorance of them." Perhaps this principle is what generates fear of the future in so many people. In acknowledgement of Livius' philosophy, Security Products brings you a glimpse into the future via several people who help create it. We asked several executives of security companies to discuss how technological developments have affected the industry in the past. We also wanted to know what new technologies are needed and how they will impact the different fields in the security industry. Market trends typically affect every type of business-how do they relate to the security industry?
Gaining Time
"As it has been in past years, the technology enhancements in the electronics
industry have made it easier for manufacturers to design better products.
Products such as flash memory-the ability to download firmware from the electronic
highway-provide technical improvements to the product as well as improve support
for the end users. No longer does service staff need to physically drive to
the customer site and replace EPROMs. What took more than 2 or 3 hours to
accomplish by a service representative now takes less than 5 minutes via a
simple modem connection and operator command.
"Technology improvements to guard against installation-related faults must be enhanced or developed. To date, there are too many manufactures focusing on features and functions rather than benefits such as real-life installation conditions. One of the biggest problems in the electronics industry is ESD (electro static discharge). Though electronic parts are readily available to guard against most of these problems, very few manufacturers implement them in their design due to cost.
"One of the most prominent technologies in security or any other industry has been communication. Just a few years ago, communication was measured in bits, and today it is measured in megabits (millions of bits). Recently, some manufactures used 20 mili amp current loops, RS-232 or RS-485 as the basis of their communication. These technologies provide limited bandwidth and carry data in terms of simple binary or ASCII data streams. Now the advancement of ethernet, with bandwidths of 100 megabits or more, has opened a new era of communication. You can send simple to complex data, video, voice and much more on the same line. There is no need to install a cable for each application. The key element of this technology is that it provides the avenue for a communication standard if manufacturers are brave enough to encompass it.
"One of the interesting elements of the security industry is that the interest
rate rarely affects it. This was quite evident this year when interest rates
were at a 15-year low, yet saw no great surge in security related products.
The better indicator for us has been the strength of the U.S. economy, which
has helped to increase corporate budgets in both facilities and security management.
This increase, coupled with technology enhancements, created the requirement
for a more integrated security system. Corporate MIS personnel now work hand-in-hand
with facility managers and security officers to design better total integrated
systems. The strength and support by these two groups have helped to justify
the need for better security."
-Mas Kosaka, president, PCSC
Computing Made Easier
"Software, hardware and PC capabilities, and standardization resulting from
the Windows operating systems have and continue to change the access control
and security industries. Multi-tasking PCs allow for integration of access
control, alarm monitoring, asset tracking, video, paging, intercom, badging,
and time and attendance. Smart card technology will further expand the integration
opportunities. Limits on systems are a result of software and hardware providers
inability to keep up with available technology.
"Lack of standardization requires each manufacturer to go through the same development of hardware and software. Costs and prices remain high, but profits are limited. Imagine the impact on the industry if Microsoft would release software that integrated the aforementioned functions listed. Everyone would be rushing to interface their hardware with the Microsoft software. This is happening today with printer suppliers providing windows drivers. The proprietary technology embraced by others in the security industry is the speed of development and keeps costs high.
"A major change I see in technology is the ability to take advantage of existing customer networks for communication. This allows the customer to reduce his costs while tying locations around the world together. Security will improve significantly while reducing costs even more significantly.
"We can not afford to think or plan for 1 year ahead, but segments that are expected to create significant volume impacts next year include the following:
"The major trend I see is that the end user does not see security as a black box that only 'the experts' can understand, and consequently, the high prices can no longer be supported/justified. The 'mouse' is the common denominator for security systems. With use of the mouse, systems have to be easy to understand and use, or they will die. Customers want a reliable security system, and systems integrators are looking for suppliers who provide these systems and for suppliers who make it easy to deal with. Unique features are becoming less important. A good analogy is a VCR. Very few people do more with a VCR other than play and record.
"If significant training is required to take advantage of all the wonderful features, very few will actually take full advantage of these features. How many security systems installed fully utilize the 'sex' hyped by the manufacturers? Without continual retraining of the customer, within a few years of the initial installation, the security system is operating in a basic mode.
"Y2K has allowed many users to upgrade their security systems. Money was
not the object, and often the customer had an open checkbook. They needed
their problem to go away. Upgrading security systems has been a very good
business. Now it is back to the basics. I assume security system revenues
will be related to new systems and expansion and maintenance of existing systems.
A significant reduction in the upgrades of existing systems is anticipated.
Benefits of security applications must be sold to the security manager, and
he or she must be able to sell these benefits to corporate management. The
market will shrink, and competition will intensify.
-William Lorber, vice president of sales and marketing, Apollo
Integrating Technology
"HID Corp. continuously develops new ways of integrating our technology into
related security industry products to provide more effective, easy-to-use
solutions to end-users' application requirements. For example, our eProx (embedded
proximity) solution is now being integrated into alarm panel keypads, electronic
locks and biometric devices.
"Enhancement of asset track technology. HID's new ProxTrak products allow property pass and access control systems to be integrated and automated for higher asset security, as well as easier, more cost-effective asset location and assignment management. It significantly reduces the cost of securing people and assets.
"The biggest challenge security end-users will face in the year 2000 will
be securing and coordinating rapidly expanding worldwide offices. To address
this challenge, HID has developed the single card solution by implementing
the Corporate 1000 Program. This program enables end-users to control their
own card format as well as to use an access control system and supplier of
the end-users' choice. "
-Joe Grillo, vice president, access control, HID Corp.
Building Boom
"Originally developed for the military, infrared (IR) thermal imaging technology
has been widely adopted across many commercial markets, including public safety
and consumer automotive. With increasing volumes of products in these markets,
our technology is at a price point that makes thermal imaging cameras an appropriate
choice for high-risk, high-value security in industrial and residential settings.
"Infrared thermal imaging cameras do not require any light. They have a detection range substantially greater than other night vision cameras, typically trigger fewer false alarms, and provide security at night and in 'lights-out' settings where illuminating an entire area may attract unwanted attention. Infrared thermal imaging cameras can also be an effective alternative to the installation, use and maintenance of high-cost lighting systems.
"Applications of infrared technology for motion detection sensors on traditional daylight CCTV cameras have been limited in their detection range in both indoor and outdoor settings. They've also been hampered by oversensitivity to motion when set to reach their maximum detection range of 70 to 75 feet. Increased sensitivity to almost any motion has been a factor in incidents of costly false alarms.
"The implementation of infrared thermal imaging technology in the security market is growing, and we expect this trend to continue as more original equipment manufacturers (OEMs) adopt Raytheon infrared technology and introduce new IR thermal imagers in a diversity of channels. Four security market OEMs-Aspect Technology & Equipment Inc., EMX Inc., Leake Company and Pyser-SGI Ltd.-are launching thermal imaging cameras targeting a wide range of corporate, government and high-value residential applications.
"The continued growth in the economy is fueling a 'building boom' in both
high-value commercial and residential markets. Greater economic prosperity
is effecting purchases of innovative, new security products that provide high-level
protection for valuable assets."
-John Love, OEM manager, Raytheon Commercial Infrared Products
Networking
"Advances in technology are rapidly changing the video surveillance market.
Digital technologies have expanded video storage capacities, increased processing
speeds and widened transmission bandwidths. All this makes video information
more efficient, accessible and easier to use than ever before.
"Our cameras and recorders turn pictures into another source of data-giving them all the characteristics and benefits of other digital information. Digital video offers clear, crisp images that make it easier to identify detailed objects. And digital pictures can be stored on a variety of hard disk or removable media, making access, searching, copying and archiving faster and easier.
"The PC revolution continues to shape our industry. Managers want the convenience of reviewing video on their own PCs, rather than on dedicated equipment in a central security station. We understand that and have enhanced our intelligent digital video recorder by introducing network access. Using a companion software program and a network, users can select important recorded video segments and download them to a host computer. Video then can be enhanced, annotated and saved for further review. Other software will allow archived video from digital audio tape to be transferred to a PC.
"It is also possible now to easily transfer video from digital recorders to any PC using a variety of removable media.
"The security industry is growing beyond its traditional boundaries. Customers are demanding surveillance devices for operations applications, such as to monitor automated assembly lines in manufacturing plants for quality control. These customers require products that can automatically capture specific events, alert key personnel and provide fast, easy access to relevant images.
"We realize that our products have applications far beyond the traditional security niche. Digital video opens up a myriad of opportunities for the application, distribution and audiences of video information, increasing its value as not just a security resource, but also a management tool. As a result, we are designing products that not only meet the needs of the security director, but also those of other corporate managers as well.
"The extraordinary growth in networking and the Internet offers tremendous
opportunities for us. We are creating products that work with our digital
cameras and recorders to allow video information to be shared within seconds
locally or around the world using local or wide area networks or the Internet."
-Ron Nieman, vice president, general manager Sensormatic Electronics Video
Products Division
Cooperation
"Two co-operative phenomena, which have been with us in the security industry
for some time, are going to continue to grow in both breadth and depth: partnerships
and integration. And each has an impact on the other.
"This partnering and integration will occur vertically in two directions; laterally to other manufacturers and vertically with existing and new customers. As we as manufacturers expand the technological capabilities of our equipment, in terms of both hardware and software, new, previously unexplored, and certainly underdeveloped markets begin to come into view. These new markets provide certain challenges.
"First of all, current customers have to be assisted in their efforts to penetrate these new applications and markets. In addition, new customer relationships may well develop as a part of the manufacturer's efforts. For example, vendors of somewhat related products may already have relationships in these developing markets. Corporate partnerships become an obvious way to quickly, and effectively, bring these new products to these new markets. This benefits the vendor who already has the knowledge of this market, as well as the personal and business relationships necessary for success.
"In the lateral direction, manufacturers will be extending and deepening relationships with other manufacturers that have developed in recent years. With increasing technological advancement comes increasing specialization and the need for manufacturers to work in product integration and system enhancement. This aspect will also benefit the security vendor, and it accelerates the availability of even more sophisticated products and systems.
"In the emergency communication sector of the industry, we are seeing enhanced software, such as our Talk-A-Lert III, which is now a third generation system that began about 7 years ago as a DOS system, later moving to Windows, and now to NT. It is being co-operatively integrated with other software systems of other vendors to provide the greatest possible value and function to the security professional.
"Similar relationships have developed on the hardware side, with integration
to access control products and system, alarm and control systems, and related
functions. We see this process accelerating over the coming year and beyond."
-Samuel Shanes, executive vice president, Talk-A-Phone Co.
After Digital
"It's important to remember that the migration from analog to digital video
recording is still in its infancy. For most users, there are still many questions
and, in fact, we find ourselves spending considerable time discussing with
our customers what digital is, and what digital solution is right for their
needs. Having said that, as we look to the future, one word stands out: integration.
Similar to what NICE is seeing in the call center market, the high-end digital
video recording customer is increasingly looking for seamlessly integrated
solutions. By that I mean solutions that are seamless to the user and enable
them to manage their security environment with minimal effort and maximum
effectiveness.
"In a number of our recent technology partnerships, we're moving toward squeezing the entire security environment into one application controlled from a PC-based workstation. In the future, the average user won't be so concerned with what access control, CCTV or fire detection system they may have; they may not even know they have a NiceVision digital recording system. What will be important for them is that the entire security environment can be controlled from a single application or graphical user interface (GUI), and that all the security devices employed can share information. The ability to share information from the database of each security device-access control, CCTV, fire detection, etc.-will improve the efficiency of all the security components and maximize overall system performance. For example, with an integrated system, you can have event recording based on an access control alarm. Or upon registering a fire alarm, the right video source will automatically pop up for view on screen and enabl e immediate response by the user. The key to this next step in the evolution of security systems is digital technology.
"Digital technology based on open architecture with an application programmer
interface (API) capability, as we have with NiceVision, will allow seamless
integration of any number of security devices into an overall system. This
system will be easier to use and vastly more comprehensive that anything available
today. Future integrated systems will improve the performance of security
personnel in responding to and debriefing events, and that will improve the
cost effectiveness of the entire security system."
-Eli Gorovici, director of business development, security and CCTV group,
NICE Systems.
Enterprising Solutions
"Windows NT operating system and Microsoft BackOffice had profound effects
on the security industry. They allowed the development of very robust and
inexpensive PC-based security applications not imaginable before. They also
allowed the development of user friendly, software-centric applications with
open architecture instead of proprietary hardware-based systems that were
dominating the security industry.
"Wireless communications, low-cost RFID, digital video, biometrics and smart cards are going to make a major impact on the continuous revolution of the security industry in the next few years.
"Seamlessly integrated digital video management will have a big impact on the access control and CCTV industries. It will link access control events with video, display in real-time video associated with alarm on monitoring screen and perform remote surveillance over networks, including the Internet. Digital video will eventually make traditional analog CCTV technology obsolete, which in turn will create turmoil in the traditional CCTV industry and allow new players to enter this field in the near future.
"The fast pace of technological changes and consequently the increased involvement
of IT groups in selecting the security products and technology to be deployed
inside of enterprises will force many security vendors to change their products
to respond to these new technological challenges, or lose their competitiveness.
Demands for open architecture, seamless integration, standards, true enterprise
solutions, quality and reliability of product, and the ability to interface
with other enterprise systems are having a major impact on existing security
vendors to change or die."
-Rudy Prokupets, chief technology officer, Lenel
Keep it Simple
"Wireless is the word of the future. The miniaturization of electronic components
and our ability to design low-power requirement systems enable us to add more
features to stand-alone units with no batteries or power. This allows us to
compete with costly hardwired systems.
"The market is saturated with security solutions. Electronic locks, CCTV, electric strikes, mag locks-these systems must all be integrated easily and cost effectively. Maintaining systems from remote locations is a growing need. Solutions may be the Web, wireless communications, cable or phone lines.
"Mas-Hamilton's PowerStar technology is one example of a trend in technology for the security industry. We are now able to offer full electronic features in a lock that requires no batteries or external power. These access control products are easy to install, program, maintain and use. Major institutions have a problem with the inconvenience of power outages, dead batteries, battery disposal and associated costs.
"The proliferation of large and small retail businesses, such as restaurants,
stores, banks and gas stations, has created a need for security that must
be simple to operate. Retail managers and employees will not lock doors and
safes if they are too difficult to re-open. The challenge will be to create
products that are user friendly, secure and can be controlled from a central,
off-site location. We have taken the conflict of security versus convenience
to the convenience store level."
-Carl Sideranko, vice president of distribution, Mas-Hamilton
This article originally appeared in the November/December 1999 issue, Volume 3, Number 9, pages 20, 22, 24, 26 and 64. Copyright Stevens Publishing. View magazine archive.