Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Best Products A Year Later

By Bill Zalud
September 26, 2002
Security buyers re-evaluated after Sept. 11th and prioritized their technology purchases.


This special report from SECURITY Magazine and SDM Magazine features the top technologies that buyers feel are more essential today. Product categories include video surveillance, electronic access control, photo identification, intrusion detection, systems integration and new technology. Products in this report represent some of those technologies. There are more products covered elsewhere in this special issue.

More Threats, More Security

Beyond the shock of death, destruction and vulnerability of September 11th, the events of that day brought home to security directors and managers the need to keep one step ahead of the threats that they face, whether from a terrorist or a vandal. While few facilities are targets of international terrorists, most are targets of criminals, domestic terrorists and employee thieves who are more likely to cause trouble and losses.

According to research by SECURITY Magazine and SDM Magazine, security buyers are fortifying their organizations in numerous ways, often and rightly based on their type of business, location and level of threat and liability.

Video’s Security Attraction

The top type of security product according to SECURITY and SDM magazine research of buyers: video surveillance. Based on the decreasing cost of the equipment, the deterrent and identification abilities of the gear and the productivity and return-on-investment gains of digital equipment, video surveillance gear is very popular with security buyers.

There are numerous advances at play.

The two overall advances are black-and-white to color and analog to digital. While many security departments have already shifted to color cameras and display, the evolution to digital is more deliberate, with many users shifting first to digital video recording, storage and transmission systems.

There also is growing draw by buyers to Internet-based video surveillance systems. This is playing out in two major ways: first, cameras and camera “gang-connections” come bundled with Web addresses and, second, video monitoring systems use a Web browser or are packaged as ASPs over the Web.

Door/ID Controls

In the aftermath of the events of September 11th, many more working people would like to have tighter security measures at their workplace than have them.

More than half of all employees believe their employers should have made identification procedures for entering their workplace more strict, but only a third report that this has happened. More than half of all employees believe that tighter procedures should have been adopted for accessing the employers’ computer systems, but only a quarter report that this has happened. Half of all employees want to have more detailed background checks on new job applicants, but only one in nine says that this has happened.

These are a few of the results of a Harris Interactive survey that was conducted for Privacy & American Business. This study supports SECURITY Magazine polls.

Extending the Perimeter

Security buyers at many organizations have extended out the perimeter monitored by electronic security systems. They also have increased use of sensors and detectors while some have also added or shifted from contracted central station to monitoring to proprietary monitoring.

Without a doubt, most organ-izations view fire and burglary alarm systems as the bedrock of security - the first line of defense, so to speak.

Among advances since September 11th: there is use of more perimeter systems that use outdoor sensors or fiber optics. Some organizations with burglar and intrusion alarm systems report they have added detectors and sensors to more windows and doors.

Connected Information, Immediate Response

With the stakes higher than ever in protecting people and facilities, security directors and managers are seeking out more interfacing and integration of their various security systems so that they have an immediate, total picture of what is happening, especially during alarm and crisis situations.

Integration, according to an excellent discussion document from the trade organization Security Industry Association (www.siaonline.org), falls into numerous levels. Obviously, a common type of integration is at the component level where a piece of equipment is designed to be part of a system.

A level higher covers interfacing of systems most often via two-way communications or software. There are several interface approaches including custom and bundled interfaces as well as front-end and open interfaces. Front-end software, for instance, offers a single, configurable interface and a master database. Such an approach here helps end users facing new post-September 11th threats not only my providing more information linked together but also simplifies training of operators of the subsystems and monitoring screens.

Today, there’s a greater push to true integration. The experts feel that systems can only be considered integratable if they are designed to seamlessly share, compared to duplicate, system resources. There has been much talk about open systems integration - a kind of high level play and play configuration.

New Tech Make Gains

With Federal, state and local governments spending billions of dollars in their shared terror-fighting effects, a significant amount of dollars is going to the development of emerging and new security technologies.

There are four primary areas:

Biometrics — while the technology, in numerous stages of development, has been around for a couple of decades, there has been renewed interest in and accelerating development of computer-based systems that use an element of a person’s identity (eye, fingerprint, hand, voice, face, to name a few) to first better identify the person and, sometimes, to allow the better identification follow through to access into a computer system, through a door or onto an airplane.

Smart cards — once thought of as just a financial instrument, smart cards are more attractive to security directors and managers looking for higher level and multi-technology access controls. Here there is a heavy buy-in in transitioning from magnetic stripe and proximity cards to smart cards and readers. Some prox card firms have introduced dual smart/prox cards. More importantly, manufacturers of smart cards have gotten per-card cost down to less than one dollar.

Detectors and sensors — never since the end of World War II has the security industry seen the involvement in new types of sensor and detector approaches and equipment. Some of it is very specialized, of course. The Federal government, for example, is developing and will soon implement detectors to alert on “dirty nuclear weapons.”

Cyber crime fighting — according to SECURITY and SDM magazine research, business and government organizations believe the next shoe to drop will involve attacks via the Web or through computer networks. There is much on the market and soon to be emerging to alarm on computer intrusions and to provide higher level access into computers and networks.

U.S. Plan: More Technology, Better Intelligence

The plans and support for implement of the U.S. answer to September 11th are falling into place. Last month, President George W. Bush introduced his Admin-istration’s homeland security plan which, in part, calls for more aggressive domestic intelligence work, national standards for driver’s licenses and more security at the nation’s borders.

The National Strategy for Homeland Security, at 90+ pages, is the blueprint for the the new Cabinet-level Department of Homeland Security.

There are six critical missions:

• intelligence and warning;

• border and transportation security;

• domestic counterterrorism;

• protecting critical infrastructure;

• defending against catastrophic terrorism (weapons of mass destruction); and

• emergency preparedness and response.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • GDPR

    A Year Later, Has GDPR Raised the Bar on “Reasonable Security”?

    See More
  • The UTC Acquisition of GE Security -- One Year Later

    See More
  • Digital-Lock.jpg

    Experts weigh in on CIRCIA one year later

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Optimizing Social Media from a B2B Perspective

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing