Every Security System Has a Story

Our industry’s technology solutions are at work almost everywhere, if you think about it. You might see Kelvin Hughes high-resolution radar pictures providing protection for Maryland’s oyster beds. At the 2014 Oscars, Axis pan-tilt-zoom (PTZ) cameras kept watch around the Dolby Theater in Los Angeles. At The Marque, an exclusive membership club in Houston, Texas, MorphoTrak 3D facial recognition technology secures access and enables the club to be “exclusive.”

These are just a few examples of the many ways security technology is at work every day around the world. I came across them when browsing through SourceSecurity.com’s Application section.

Every system has a history. Each application of security technology has a story behind it, and more and more supplier companies are seeing the value of telling those stories. Sometimes, it’s not easy to get the stories out there. Suppliers have to browbeat their dealer/integrator partners to identify interesting ways their equipment is being used in the field, and then they have to work with each end user customer to collect the details of the story and to get the information written down and distributed.

Showcasing Value with Success Stories

In the end, the application stories tell as much about our industry than anything else. Application case studies are about our successes. They demonstrate the value of our products and equipment in terms that any end user or integrator can understand. Simply put, application stories confirm that our industry’s products really work. Case studies are about happy customers – the best kind – so of course manufacturers want those stories told and retold.

I personally love to hear how security technology is working in the real world. Application stories take the abstract concepts and technology jargon we hear every day and translate them into something concrete and understandable. This was our problem. Here’s how we solved it. These are our results.

As a broad-ranging digital publisher dedicated to security systems and technology, SourceSecurity.com leverages its Applications to enable every supplier to share their successes. And technology makes it easy to search for content specific to any situation. I find it interesting just to browse through the various articles to see the diverse range of ways equipment is used. Definitely worth a look.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...