• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Professional Security Officers, Security Guard Services

Professional Security Officers, Security Guard Services

Sunstates Security

  • OUR SERVICES
    • Security Personnel
    • Specialized Markets
  • OUR APPROACH
    • Employee Engagement
    • Management Engagement
    • Training and Safety
    • Quality Assurance
    • Strategic Partners
  • WHY SUNSTATES
    • Founding Principles
    • Executive Leadership
    • Testimonials
    • Gallery
  • RESOURCES
    • News
    • Newsletter Subscriptions
    • Tools
  • CAREERS
    • Selection Process
    • e-Learning: Your Career Path
    • Employee Benefits
    • Apply Online
  •  CONTACT 
  •  EMPLOYEE 

Security Technology for Today—and Tomorrow

October 18, 2017

Security Technology for Today—and Tomorrow

At last month’s ASIS International Annual Seminar and Exhibits in Dallas, technology dominated the showroom floor. Vendors showcased robots and drones, along with the ubiquitous access-control and surveillance systems. In the real world, however, even sophisticated organizations are waiting before taking the technological plunge.

This article highlights emerging technologies, as well as familiar systems that are doing more than ever—often for less money.

New TechnologiesSecurity Technology for Today—and Tomorrow Sunstates Security Company

These advancements are emerging from science fiction novels and films into 21st-century reality.

  • Robots. Several companies featured security robots as an alternative to human patrol officers. While these mechanical sentries offer cost savings and other benefits, such as the ability to capture video, they’re not likely to replace security personnel entirely. Robots may gradually find their way into corporate security forces, but they’ll ultimately report their findings to skilled humans. Still, continuing advancements in robotics will spark interesting debates in the coming years.
  • Drones. These unmanned aerial vehicles (UAVs) are generating a lot of interest as technology improves. While future restrictions inevitably will govern where, how and when these devices can fly, UAVs add a new dimension to surveillance, especially when conducting vulnerability assessments. Drones allow security teams to not only focus on their facilities, but also on potential threats beyond the site perimeter. Some companies are marketing drones that capture other drones, highlighting some of the privacy concerns created by these vehicles.
  • Facial Recognition. This technology recently went mainstream with the announcement of iPhone X. Apple’s $1,000+ smartphone will replace the familiar fingerprint reader with facial recognition, which is reportedly 20x more secure. Already, technology is changing the security game. Last month, Chinese police used cameras equipped with automated facial recognition (AFR) software to arrest 25 wanted criminals at a beer festival, including one who had eluded authorities for a decade.

Improved Technologies

While not as exciting as the previous advances, the following technology improvements are transforming security in more subtle ways.

  • Investigative tools. The online proliferation of public data has enhanced investigations in recent years while creating its own challenges. Consulting multiple sources for information consumes time, as does sifting through the results for relevance. New technologies are making it easier both to collect data in a single source and to narrow results for human analysis. Some of these tools remain prohibitively expensive for smaller organizations, but prices will fall as the technology evolves.
  • Access control. Today’s access-control systems offer increased security and efficiency, in addition to improving the user experience. Electronic systems can integrate with other and personnel management security systems. Plus, a missing access card can be quickly deactivated and replaced. New access-control technologies are amplifying these benefits, replacing cards with smartphones, mobile devices and biometrics.
  • Audio/visual recording. High-definition cameras, digital recorders and cloud computing have made it easier, and more affordable, than ever for businesses to upgrade their security systems. Many clients are replacing decade-old closed-circuit televisions with state-of-the-art systems that allow remote monitoring.

To discuss how these technologies can help your security program, call Sunstates Security at 866-710-2019 or contact us.

Primary Sidebar


Categories

  • Awards
  • COVID-19
  • Security News
  • Sunstates News
  • Team
  • Uncategorized

Follow Us On Facebook

Footer

     

 

801 Corporate Center Drive
Suite 300
Raleigh, NC
27607
Toll Free: 866-710-2019

 

 
LICENSES:
CA - PPO120751,
VA-11-2948,
Texas B11167; A10515101; F01339
Illinois #122.001562
Nevada #3064

Copyright © 2023 · Sunstates Security All Rights Reserved · Privacy Statement · Disclaimer · Opt-Out Preferences

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
 

Loading Comments...
 

You must be logged in to post a comment.