Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Wireless Frontier

By John Mesenbrink
November 11, 2003
The wireless age is upon us. Remember the golden era when television sets began to saturate the residential landscape? Then came personal computers. Now it’s the cell phone’s turn. And with the cell phone revolution, does anybody really remember phone numbers anymore? Let’s face it, people like the convenience of their wireless phones. So why can’t security directors rely on a wireless signal for their security systems – from video surveillance to access control solutions. “If you were to ask me two years ago, I would have said wireless was something of the future. But I think it is real now. If you look at the standard digital video recorder market today, whether it is banking or retail, there has been a five- or six-year learning curve on it as well as a progression in technology. On the transportation side especially, wireless has had a two-to-three year learning curve now, and it has gotten to the point where it is becoming a real, viable business solution,” says Peter Strom, chief operations officer, March Networks, Ottawa, Canada.

According to SmartSight Technologies, Quebec, Canada, the market for systems and solutions based on video compression of 802.11 wireless Ethernet standards is exploding. Digital, wireless video is quickly becoming the transmission of choice among law enforcement, education, retail as well as commercial and residential monitoring. SmartSight’s video solutions include CCTV and IP networks that deliver real-time video content over large area networks (LAN), wireless LAN, wide area networks (WAN) and Internet and 2.5/3 G, or next generation, cellular networks. Some of the most popular forms of wireless video transmission are the 802.11 Ethernet standards, which include Wi-Fi, and other proprietary forms of wireless. Recently, SmartSight has an outdoor wireless bridge, a license-free video bridge that is used to wirelessly link SmartSight’s S1100w wireless servers or its series of Ethernet video servers in remote locations to a local Ethernet LAN. Several bridges can be used to create multiple video links covering a large geographical area.

Getting a Grip on Wi-Fi

Wi-Fi, or wireless fidelity, can be used generically when referring to any type of 802.11 network. The term is promoted by the Wi-Fi Alliance, and while all 802.11 products are called Wi-Fi, only products that have passed the Wi-Fi Alliance testing are Wi-Fi certified. Wi-Fi uses unlicensed radio frequencies to transmit high-speed Internet connections over an area, such as an office lobby or in an airport.

"Pure Wi-Fi is the most popular and the biggest growth area in the wireless industry right now. The distance ranges from 300 ft. to 35 miles. There are some common misconceptions about Wi-Fi being very distance limited. Wi-Fi is going to change the face of how to deploy security systems in the future. It will drastically reduce installation costs," says Steve Sufaro, senior manager sales engineering, Panasonic, Secaucus, N.Y.

"WI-FI doesn’t have signal degradation the farther you go out. If it is not properly applied, obstructions are not considered and a proper radio frequency (RF) survey has not taken place, then you will get a substantially shorter distance than what was specified," Surfaro continues.

There are a growing number of laptop computers shipped to businesses that have built-in Wi-Fi or wireless cards. Experts believe that by 2005, wireless capability is likely to be standard on most machines. And that is good news because more hot spots are popping up around the country. Now wireless enthusiasts can enjoy untethered Internet access.

SBC Communications Inc., San Antonio, for example, is teaming with Wayport and Cingular Wireless to develop more than 20,000 Wi-Fi hot spots in 12 states over the next three years. SBC also wants to develop an integrated service that allows customers to use the same equipment for Wi-Fi and Cingular’s cellular service.

But other proprietary wireless networks are emerging. What equipment should be used to take advantage of wireless capabilities? Certainly there is an abundance of IP-based and network cameras that are both reliable and affordable on the market today. Take, for instance, wireless network servers of Toshiba Imaging Systems, Irvine, Calif., and its IK-WB11A, an (802.11b) network camera that empowers users to remotely view live, high-resolution video streams with audio of warehouses, day care centers, schools or businesses from anywhere in the world, via the Internet, using a standard Web browser.

“Going to the market, people were looking for an easy-to-install camera, so we felt that the 802.11b would be an easy solution for many more different areas,” says Joseph Cook, network camera sales manager for Toshiba.

“Research indicates that while remote video monitoring over the Internet is currently a small segment of the overall wireless LAN market, demand for networkable cameras will grow exponentially as increasing numbers of homes, schools and enterprises discover the benefits of wireless networking,” says Doug Freck, vice president/general manager, Toshiba.

The growing popularity of hot spots provided in locations ranging from corporate offices to warehouses to airport coffee shops will also drive demand for the camera, says Freck. A hot spot will allow a business traveler with an equipped notebook or personal digital assistant to have high-speed access to the Internet so they can quickly check the security status of an office, store, residence or any other location.

The Falcon PLUS from Trango Systems, San Diego, is a solution that delivers high-resolution, real-time, full-motion video up to seven miles line-of-sight. Operating in the unlicensed 5.8 GHz ISM band, the Falcon Plus offers wireless video performance and a ready-to-install solution for remote pan/tilt/zoom or fixed cameras.

Wireless will continue to offer limitless potential and growth for security professionals. Take the freight industry, for example. According to the U.S. Federal Railroad Administration, six rail employees were killed and 2,207 were injured in rail yard accidents in 2002.

An innovative technology introduced from RailVision Inc., Racine, Wis., in conjunction with March Networks, finds security personnel wearing a virtual wireless monitor as eyewear and using digital video recording to combat safety concerns. RailVision brings together a number of different technologies – remote control locomotives, wearable computers, heads-up video display, wireless networking and e-mail, digital recording and locomotive and tower-mounted cameras. Combining wireless network technology with mobile, wearable and fixed devices, such as cameras, sensors and computer displays, RailVision allows workers in rail yards, seaports, airports, factory complexes and metropolitan transportation facilities to visualize and manage operations throughout large areas despite numerous obstacles, buildings and complex topography.

March Networks’ piece of the puzzle is its 5308 MDVR, which delivers high-quality video capture, storage and retrieval in emergency response vehicles, transit systems and industrial settings.

Controlling Wireless Access

While wireless video steals the limelight somewhat, wireless access control systems are making headway. Many access manufacturers are forging ahead in the wireless landscape and are beginning to offer their wireless products and services.

Lenel Systems Int., Rochester, N.Y. has integrated its OnGuard Total Security Knowledge Management Solution with Wyreless Access peripherals from Recognition Source, St. Charles, Ill. The result is an access control solution that combines the power and reliability of wired access control with all of the benefits of wireless technology. By developing a direct RS-485 interconnect to the Wyreless Access Panel Interface Module (PIM-485-16), the number of PIMs required for a system is reduced by up to a factor of eight.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • software

    APIs are the next frontier in cybercrime

    See More
  • multicolor text on black screen

    The final frontier: Modern control rooms & the evolving tech landscape

    See More

Related Products

See More Products
  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products

Events

View AllSubmit An Event
  • July 23, 2012

    Pros & Cons category cable, fiber optic and wireless

    In this webinar we will talk about some of the pros and cons to each type of infrastructure technology.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!