Commercial security
Over the last several years, cyber security, a crucial component in any servicer's operation, has taken on an increasingly visible role due to numerous high-profile data breaches impacting various industries. According to the cyber security research firm Check Point Research, the average number of cyber attacks per organisation per week rose 38% in 2022 from 2021, and increased by 28% in the six-month period ending March 31, 2024. The average number of weekly events has also grown year ov...
Verkada, a pioneer in cloud-managed enterprise building security and management, announced a new way for organisations to transition to the cloud with its Command Connector, which enables third-party cameras to connect to Verkada’s Command platform. It also announced a range of new additions to its platform, including a next-generation door reader. "As we continue to expand our footprint we want to provide customers with a seamless transition to our cloud platform,” said Brando...
Skills for Security is proud to announce a new partnership with Eaton, a global pioneer in power management solutions. Eaton has joined Skills for Security as a Platinum Sponsor, marking a significant collaboration aimed at enhancing the fire and security sector through education, innovation, and sustainable practices. Eaton, renowned for its expertise in fire and security systems alongside a whole host of other solutions, will work closely with Skills for Security to support the development an...
G2E Asia and Asian IR Expo attracted more than 6,300 industry professionals to Macau in June 2024, with international attendees accounting for 65 percent of total attendance. The significant turnout underscores the global gaming industry’s appetite for innovation and the continued potential within the sector. G2E Asia and Asian IR Expo The joint event showcased a spectacular display of over 100 exhibitors spanning 22,000 square metres of exhibition space. Complementing the e...
Blackline Safety Corp., a global pioneer in connected safety technology, is pleased to announce the appointment of Robin Kooyman, CFA, MBA, as the company's new Chief Financial Officer (CFO) effective September 9, 2024. Kooyman brings 15 years of global experience in finance, capital markets, and strategic leadership, having held prominent positions with Brookfield Corporation, TD Securities, and RBC Capital Markets in Canada, the U.S., and the UK. Robin Kooyman She joins Blackline Safety fro...
Paxton Access, the international security technology manufacturer, is launching the Paxton Tech Tour across the continental United States in September. The Paxton Tech Tour is a free half-day commercial and technical experience that gives security installers and integrators an opportunity to see live product demos and get hands-on with Paxton’s extensive product line. Paxton’s intercom mobile app Gareth O’Hara, Paxton’s Chief Sales Officer, said: “We have...
News
Rubrik, Inc., the Zero Trust Data Security™ company, announces a new partnership and technology integration with Mandiant, part of Google Cloud. The collaboration brings together pioneers in data security, incident response, and threat intelligence, aiming to expedite customers’ threat detection and path to cyber recovery. “This partnership will gations leveraging Rubrik’s backup solutions to identify threats in their backups powered by Mandiant’s industry-pioneering threat detection and intelligence,” said Steve Elovitz, Director, Mandiant Consulting. “Together, we can help organisations before, during, and after cyber attacks to ensure businesses can respond quickly and get back up and running as soon as possible.” Mandiant’s M-Trends 2024 report The global median dwell time from centre to detection is improving, according to M-Trends 2024 report While the global median dwell time from compromise to detection is improving, according to Mandiant’s M-Trends 2024 report, threat actors operate undetected in victims’ environments for a median of 10 days — giving them more than enough time to conduct a destructive attack. Organisations often will recover to the most recent backup prior to encryption, but what if that backup has been infected with a backdoor? Through this partnership, indicators of compromise learned on the frontlines of some of the most impactful breaches can be applied proactively to enable cyber resilience. “Organisations have been responding to ransomware attacks with months-long recovery processes, which can result in irreparable damage to the business,” said Steve Stone, Head of Rubrik Zero Labs. “With Mandiant, we are able to demonstrably lessen the impact window of ransomware attacks while simultaneously increasing the capabilities available to customers in need — from threat intelligence to rapid access to incident response teams. Together, we connect the dots in a time of crisis to deliver true cyber resilience.” Three key pillars of this partnership Rubrik’s threat-hunting and threat-monitoring abilities are used to identify a safe recovery point Breaking intrusions, active campaigns, and evolving threats detected by Mandiant Threat Intelligence are now integrated into Rubrik’s Threat Monitoring capability providing threat intelligence to Rubrik Enterprise Edition customers. This helps organisations to identify and combat threats including ransomware, malware, and malicious intrusions before they can execute destructive activity using Mandiant Threat Intelligence at scale. Rubrik’s Threat Hunting and Threat Monitoring capabilities are used to identify a safe recovery point by automatically applying Mandiant Threat Intelligence’s thousands of knowledge points from the breaches that matter against every Rubrik backup. Multi-cloud environments When victim organisations are recovering their systems from backups, concerns often linger that the backup itself contains backdoors left for reinfection. Organisations can proactively eliminate this problem with Rubrik Clean Room Recovery, which allows customers to recover and store data in a clean Google Cloud environment or multi-cloud environments, supporting customer choice with secure technology and solutions. Incident response capabilities Rubrik’s Ransomware Response Team provides expertise around data recovery For their joint customers, Rubrik and Mandiant can bring together their respective Ransomware Response and Incident Response teams to provide victims with additional investigative and recovery support. Rubrik’s Ransomware Response Team provides expertise around data recovery and how to integrate and utilise backups, while the Mandiant Incident Response team bolsters organisations’ incident response capabilities and responds to active breaches. Through this partnership, joint customers will be able to ensure that in the event of an attack, the Mandiant and Rubrik teams are working together to help the business get back up and running as fast as possible in their most critical times. These three efforts can help any organisation to receive the benefits of consistency, integration, best-in-class technology and expertise working together, and ability to control their risk against the threats that matter.
Rapid7, Inc., a pioneer in extended risk and threat detection, announced the release of its Ransomware Radar Report in conjunction with the company’s presence at Black Hat USA. The all-new research report provides a fresh perspective on the global ransomware threat by analysing, comparing, and contrasting attacker activity and techniques over an 18-month period ending June 30, 2024. According to the report, ransomware groups continue to refine their craft, building and scaling business models that resemble legitimate corporate enterprises. They market their services to prospective buyers, offer company insiders commissions in exchange for access, and run formal bug bounty programs. Ransomware Radar Report Rapid7 researchers found 3 major clusters of ransomware families with alike source code In addition, Rapid7 researchers found three major clusters of ransomware families with similar source code, indicating that ransomware groups are focusing their development efforts on quality over quantity. “The Ransomware Radar Report uses data to tell the story of how ransomware and the threat actors that wield it are evolving,” said Christiaan Beek, senior director, threat analytics at Rapid7. “For example, the related source code, combined with a continuing decline in the number of unique ransomware families, suggests a move toward more specialised and highly effective ransomware variants, rather than a broad array of less sophisticated malware.” Key findings Additional key findings from the Ransomware Radar Report include: 21 new groups have surfaced: Within the first six months of 2024, Rapid7 observed 21 new ransomware groups entering the scene. Some of these groups are brand new while others are previously known groups rebranding under a new name. One of the most notable of these new groups, RansomHub, has quickly established itself as a prominent extortion group by making 181 posts to its leak site between February 10 and June 30, 2024. Leak site posts are up 23%: Each leak site post represents an extortion attempt. The number of ransomware groups actively posting to leak sites is increasing, from an average of 24 groups posting per month in the first half (H1) of 2023 to 40 per month in H1 2024. Furthermore, 68 ransomware groups made a total of 2,611 leak site posts between January and June, representing a 23% increase in the number of posts made in H1 2023. Smaller organisations have become a more frequent target: In examining the revenue distribution of companies listed within access broker postings, Rapid7 noted that companies with annual revenues around $5 million are falling victim to ransomware twice as often as those in the $30-50 million range and five times more frequently than those with a $100 million revenue. This finding could suggest that such companies are large enough to hold valuable data but not as well protected as their larger counterparts. Ransomware Prevention technology “The report’s insights into the ransomware landscape are crucial for informing Defenders’ cybersecurity strategies,” said Beek. “From our own detection engineering point of view, the clusters and additional report information, such as the usage and type of encryption algorithms, help us uplevel hunting techniques and prevention, detection, and response technologies." "Rapid7 continually investigates new techniques used by threat actors and ransomware operators, tests them against our patented Ransomware Prevention technology, and creates new preventions to ensure customers are protected against the latest threats.”
Altronix, the recognised pioneer in power and data transmission for the professional security industry, is pleased to announce its strategic partnership with LiftMaster, a pioneering brand of professionally installed access solutions including smart video intercoms, smart door controllers and gate operators. This collaboration combines Altronix’s advanced power distribution with LiftMaster’s CAP2D Smart Access Controllers, resulting in new pre-configured kits designed to support up to 16 door systems from a single enclosure. LiftMaster Smart Access 2-Door Controller (CAP2D) is a cloud-based credentialed access control product that controls up to two doors, gates, elevators or commercial door operators. Customers can easily expand to any number of access points through the myQ Community web portal. Partner with LiftMaster "We are excited to partner with LiftMaster to deliver a seamless door control solution that allows for more flexibility for our mutual customers," said Ronnie Pennington, Director of Sales for the Americas. "This new access and power integration highlights our focus on delivering solutions that exceed industry standards." Trove solutions are available and consist of pre-configured kits that support 4, 8, or 16-door systems These scalable Trove solutions are now available and consist of pre-configured kits that support 4, 8, or 16-door systems. These can also be designed a la carte – by choosing an Altronix Trove enclosure/backplane, power distribution, and the LMBK2 mounting bracket to support CAP2D controllers. Kit models include battery leads, mounting hardware, power on/off rocker switch(es), and tamper switch. New Altronix Models TML400K1(D) – 4-Door Kit T2LMK7F8N(D) – 8-Door Kit T3LMK77F16N(D) – 16-Door Kit (CAP2D boards sold separately) Advancing access control technology “We are thrilled to collaborate with Altronix, delivering a seamless and easy-to-install solution for our LiftMaster Smart Access 2-Door Controller (CAP2D)," said Rebecca Peterson, Director of Product, Access Control Solutions “The Trove-series SKUs, custom-built for LiftMaster, will enable our installers to unlock new possibilities for both retrofit and new installations, thereby expanding our award-winning myQ Community access control experience to an even broader customer base.” By combining the strengths of both companies, these kits provide enhanced power, improve installation efficiency while providing a single point of maintenance, making them an ideal choice for a wide range of multi-door applications. The Altronix and LiftMaster partnership exemplifies the companies’ dedication to advancing access control technology, ensuring that security integrators have the tools they need to deliver comprehensive and reliable solutions to their end users.
At Sepura, the dedication to innovation and excellence in product design and development is reflected in every device they create. From the state-of-the-art facilities in Cambridge, they have delivered over three million devices to public safety users and commercial customers in more than 100 countries worldwide. “My role as a mechanical engineer involves generating concepts and taking them through the entire development process. This journey is both challenging and rewarding, as it requires rigorous testing and refinement to ensure that the final product meets stringent standards. The initial stages of development focus on creating prototypes that must endure various tests to ensure they fit properly, function as intended, and comply with regulatory requirements,” Joe Maynard, Mechanical Engineer of Sepura. Testing of new designs Engineering at Sepura plays a pivotal role in developing cutting-edge critical communications products essential for various industry sectors, including public safety, transportation, and utilities. The innovative environment frequently uses 3D printing technology for prototyping. This in-house capability allows for rapid development and testing of new designs, significantly improving the engineering process and enabling continuous advancements in product development. The role of 3D printing Integration of 3D printing into Sepura’s prototyping suite has let the team change initial concepts 3D printing has revolutionised the prototyping process at Sepura. Meeting customer requirements is a constant priority, and having in-house 3D printing capabilities allows the mechanical engineering team to produce models that precisely match customer specifications. It enables the team to rapidly produce designs and prototypes, making it easier to test and refine concepts. This technology not only accelerates the development cycle but also provides a tangible way to evaluate the form, fit, and function of designs. The integration of 3D printing into Sepura’s prototyping suite has allowed the team to transform initial concepts into tangible products quickly and efficiently. This technology gives Sepura a crucial edge in mechanical verification, ensuring that all designs meet the highest standards of quality and reliability. When Sepura acquired the 3D printer, it was the only one of its kind in Europe, highlighting the commitment to staying at the forefront of technological advancements. Integration of 3D printing “The integration of 3D printing into our prototyping suite has allowed us to take initial concepts and transform them into tangible products quickly and efficiently. This technology gives us a crucial edge in mechanical verification. One of my first projects involved using 3D printing to develop safer, more reliable components for our next-generation products." "Each iteration allowed me to refine and improve the design, addressing any issues and enhancing performance until we achieve the highest standards of quality and reliability,” Joe Maynard, Mechanical Engineer of Sepura. Collaboration and problem-solving Rigorous testing methods ensure Sepura products are not only creative but also durable and reliable Engineering at Sepura thrives on collaboration. While individual contributions are vital, the collective problem-solving abilities of the team are invaluable. Being too close to a problem can sometimes obscure potential solutions, but fresh perspectives from team members often lead to breakthroughs. Sepura’s engineering team combines diverse skillsets and expertise, enabling them to tackle any challenge collaboratively. Rigorous testing processes ensure that Sepura products are not only innovative but also durable and reliable. Celebrating milestones and achievements Despite the demanding nature of mechanical engineering, Sepura encourages a culture of recognition and celebration. Achievements are acknowledged through individual and team awards, highlighting the importance of each contribution to the company’s collective success. These celebrations, whether they are formal award ceremonies or informal team meals, help build a strong sense of camaraderie and motivation within the team. Looking ahead As Sepura continues to innovate and push the boundaries of critical communication technology, the role of mechanical engineering remains central to the mission. The integration of advanced technologies like 3D printing will continue to enhance its capabilities, allowing it to deliver even more sophisticated and reliable products. Mechanical engineering at Sepura is more than a job; it’s an ongoing journey of innovation, teamwork, and success. The use of cutting-edge technologies such as 3D printing for prototyping and product development exemplifies the commitment to staying at the forefront of critical communications technology, ensuring that they deliver the best possible products to the customers.
SentinelOne, a global pioneer in AI-powered security, announced a series of groundbreaking innovations to the Singularity Platform that leverage the industry’s most advanced generative AI technology, major new advancements delivered on a unified agent, and pioneering data insights to supercharge threat prevention, detection and response and empower customers to secure their operations from end-to-end in a simple, unified way. “With our latest innovations, we are enhancing the ability of security teams to see everything, already prioritised and contextualised, so that they can stay ahead of attacks and strengthen their security posture across every surface from a single platform,” said Ric Smith, Chief Product and Technology Officer, SentinelOne. “This is the future of enterprise security, and SentinelOne is pioneering the way in delivering it today.” One platform. One agent. One console. One data lake. Built atop the industry’s most performant data lake, SentinelOne’s fully integrated Singularity platform unifies AI-powered technology with expert insights and third-party data to protect every endpoint, identity, and cloud workload. Natural language with Purple AI New natural language alert summaries and alert query support with Purple AI Purple AI, the first AI security analyst, now provides natural language alert summaries Seamlessly embedded throughout the Singularity Operations Centre, Purple AI, the first AI security analyst, now provides natural language alert summaries – including alerts from third-party vendors who may themselves require their own portals – so analysts can easily view and understand the details of their alerts across their environment. Analysts can further query alert information using natural language to get information such as total reported alerts, unassigned critical alerts, and more and get quick answers right within their investigation notebooks. Continued innovation in cloud security with CIEM Available on the Singularity Platform as part of Singularity Cloud-Native Security, Cloud Infrastructure Entitlement Management (CIEM) helps organisations manage and control access rights to cloud resources. With this innovation, customers can leverage the pioneering cloud-native application protection platform (CNAPP) to detect risky and over-privileged human and machine identities, pinpoint toxic permission combinations and curtail risk from privilege escalations with greater speed and efficiency. With out-of-the-box detection content created by the SentinelOne Research team, security analysts are equipped to immediately deploy pre-built, advanced detections in their environments, saving time and resources. Endpoint security and identity Unified agent and expanded capabilities for endpoint & identity protection SentinelOne told a compromised credential security part that always monitors the dark web SentinelOne provides visibility and alerting with simplified installation, deployment, and management of a single agent across endpoint security and identity use cases to enforce all security policies without the need for any additional infrastructure. With new, built-in deception features, the unified agent provides real-time, fake credentials to attackers when passwords are extracted and raise endpoint protection levels. Critically, with SentinelOne’s Live Security Updates, endpoint protections can be updated faster than the pace of attacker innovation, helping organisations to safely stop the latest attacks with customer change control, rigorous testing procedures, and safeguards to ensure full, uninterrupted business continuity. Additionally, to further prevent identity-based risks, SentinelOne announced a new compromised credential protection feature that constantly monitors the dark web for security breaches related to third-party vendors, in addition to checking for weak or banned passwords uploaded by customers. Extended security posture management (xSPM) A new capability delivered as part of the Singularity Platform, xSPM provides real-time insights into vulnerability and misconfiguration that security teams can use to drive enterprise-wide visibility and control across cloud, endpoint, identity, and third-party risk. Intelligent scoring and contextual assessment ensure teams effectively prioritise risk, with integrated guidance and native remediation, to accelerate decision-making and improve security posture. SentinelOne’s Singularity Platform leads the MITRE Engenuity ATT&CK Evaluations: Enterprise, providing 100 percent detection and #1 Real-World Protection. For three consecutive years, the company has been named a pioneer in the Gartner Magic Quadrant for Endpoint Protection Platforms and was ranked number one in the Gartner Critical Capabilities for Endpoint Protection Platforms. Customers attest to the benefits of the platform, naming SentinelOne as a 2024 Gartner Peer Insights™ Voice of the Customer for Endpoint Protection Platforms report and providing a 95 percent recommendation rate on Gartner Peer Insights.
Matrix PRASAR UCS, an enterprise Unified Communication Server connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration. The PRASAR UCS, a pure IP PBX, proves to be a complete solution for inter-branch office collaboration and communications. Dispersed branches can be tied together over the IP network, with the IP PBX located at the Head office. It enables enterprises to enhance business processes by unifying communication mediums to simplify the daily workflow and increase their response time. Being a pure IP solution, the IP PBX, is scalable to up to 2100 users, as per the future communication needs of the organisation. Benefits of the pure IP PBX With the offering of Redundancy in PRASAR UCS, Matrix aims to address the large enterprise segment, needing a system with high availability and uptime. The customer-friendly licence structure, offering redundancy shall also benefit SMEs that aim to scale the number of users in the future. Matrix aims to address the large enterprise segment, needing a system with high availability and uptime The benefits of the pure IP PBX include enabling, effective Business Communication for making quick decisions and communication between the team members at headquarters, branch office, and on the move. Additionally, it aids in increasing productivity with instant communication anywhere, anytime along with increasing employee responsiveness toward customers by communicating over voice, video, and chat. Key features Up to 2100 IP Users Up to 550 Concurrent Calls 21 Three-party Conference 21 Concurrent Calls Tapping Other features Corporate Directory Integration Multi-lingual IVR Redundant Power Supply Port Auto-attendant
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Case studies
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbour operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometres, existing locks, lifting and barrages, other surrounding waters, places and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical plan with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimise this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 metres, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometres per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modelling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focussed on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes and the screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labour is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labour required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organisation, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialisation together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Smiths Detection, a global pioneer in threat detection and security screening technologies, announces that it is partnering with Flughafen Zürich AG (Zurich Airport) to trial the use of the industry-pioneering HI-SCAN 6040 CTiX Model S carry-on baggage X-ray scanners and the iLane A20 ATRS, the smart automatic tray return system, at two security lanes in the airport. The 3D images produced by Smiths Detection’s HI-SCAN 6040 CTiX will allow some of Zurich’s 2.7 million monthly passengers to leave their liquids and electronics in their carry-on luggage as they pass through security, resulting in a more convenient and streamlined security screening experience. Installation of CT scanners The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers In addition to providing more efficient and effective security screening, the HI-SCAN 6040 CTiX is the most energy-efficient scanner of its type available in the market, featuring low noise levels, zero vibration, and a 30% higher belt speed than other CT X-ray scanners – helping to promote a calmer checkpoint. The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers. Alongside passengers, employees at security checkpoints will also benefit from the installation of CT scanners via the addition of 'remote screening' capabilities. This means that security staff no longer have to check the images of the baggage contents directly next to the devices, but can work from a separate room, facilitating a quieter and more concentrated work environment. Layout of the new security lanes Zurich Airport will test the CT equipment in various configurations over several months, in order to optimise the layout of the new security lanes, with the intention of equipping all 26 lanes with this cutting-edge technology in the future. Although passengers will be able to leave liquids in their bags, the maximum container size of 100 ml and total carry-on size of one-litre rules will remain in place until further notice. Matthew Clark, Vice President (VP) of Commercial, Smiths Detection, commented: "We are delighted that Zurich Airport has selected Smiths Detection to trial the use of this pioneering technology that will enhance security outcomes and improve efficiency, providing a smoother experience for passengers and staff alike."
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. Set of analysis and recommendations The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis To help overcome these challenges, the company called in Honeywell and, specifically, its csHAZOP services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations–it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences, Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals), Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable, Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Send in the csHAZOP experts Honeywell cyber experts also uncovered some high-risk design deficiencies The Honeywell OT cybersecurity experts worked with the Honeywell proprietary csHAZOP method to uncover several concrete recommendations for immediate remediation and technical design recommendations in the company’s ICS, to be considered in upcoming ICS migrations. Honeywell cyber experts also uncovered some high-risk design deficiencies. The Honeywell csHAZOP framework was used to identify levels of residual risk to determine which security hazard was more critical to address versus others. Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Honeywell’s csHAZOP report This evaluation now links OT cybersecurity to loss prevention and process safety Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems and the team’s experience and efforts in OT cybersecurity. Results of the csHAZOP assessment “The results of the csHAZOP assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation." "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats,” Major refinery in Europe.
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Mount Pulaski Community Unified School District 23 (CUSD #23) of Logan County, Illinois. The solution has been deployed at both Mount Pulaski High School (MPHS) and Mount Pulaski Grade School (MPGS). The district is located in the quaint farm town of Mount Pulaski and also serves the cities of Chestnut, Cornland, Elkhart, and Lake Fork. It educates 500+ students annually and staffs approximately 100 employees. Guideline for crisis response Mount Pulaski CUSD #23 follows the I Love U Guys Foundation Standard Response Protocol (SRP) as a guideline for crisis response and has added ZeroEyes to its multilayered range of security measures implemented to defend against gun-related violence. ZeroEyes to its multilayered range of security steps enforced to defend against gun-related violence “In our close-knit town, we are committed to taking every possible measure to ensure that our citizens are safe,” said Fred Lamkey, superintendent of Mount Pulaski CUSD #23. “The deployment of ZeroEyes, along with our other security measures, should give students, staff, and administration peace of mind throughout the school year.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software is now layered on existing digital security cameras at both of Mount Pulaski’s school campuses. If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to the community police department and school resource officer in as fast as three to five seconds from detection. “Mount Pulaski CUSD #23's forward-thinking approach to ensure the safety of its students and staff is truly admirable,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “By deploying ZeroEyes’ technology, the district has showcased a dedication to creating a secure yet welcoming learning environment.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might be suspicious, but the situation is different if they are yelling for help. Furthermore, audio enables operators to talk remotely to people on site, which can deter crime, de-escalate situations, or gather information. And yet, optimising audio is often an overlooked aspect of physical security system design. We asked this week's Expert Panel Roundtable: What is the expanding role of audio in today's physical security systems?
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost of producing and transporting goods increases. It can even happen because expectations of future inflation heighten current demand to avoid higher prices. During and after the COVID pandemic, supply chain disruptions, shifting consumer demand, and government stimulus all contributed to higher inflation throughout the broader economy, including the physical security marketplace. Energy price shocks, particularly oil price spikes in late 2021, also increased inflationary pressures. But what is the situation now? We asked this week's Expert Panel Roundtable: Has price inflation ended (or slowed down) in the security market?
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![How to create a successful physical security roadmap](https://www.sourcesecurity.com/img/white-papers/612/920x533_1702485769.png)
How to create a successful physical security roadmap
Download![Intelligent video security solutions](https://www.sourcesecurity.com/img/white-papers/612/920x533_1678462513.png)
Intelligent video security solutions
Download![11 advantages of a combined system for access control and intrusion](https://www.sourcesecurity.com/img/white-papers/612/wp-banner-920x533_1654533709.jpg)
11 advantages of a combined system for access control and intrusion
Download![12 questions to ask your access control provider](https://www.sourcesecurity.com/img/white-papers/612/kantech-header-leftalign_1631783089.jpg)
12 questions to ask your access control provider
Download![Six things to look for when adding AI cameras to your operation](https://www.sourcesecurity.com/img/white-papers/612/hanwha-pic.jpg)
Six things to look for when adding AI cameras to your operation
Download![10 step guide to staying ahead of emerging security threats](https://www.sourcesecurity.com/img/white-papers/612/everbridge-920_1611141969.jpg)
10 step guide to staying ahead of emerging security threats
Download![Exploring new vertical markets for professional security systems](https://www.sourcesecurity.com/img/white-papers/612/ajax-920.jpg)
Exploring new vertical markets for professional security systems
Download![5 steps to finding the right access control system for you](https://www.sourcesecurity.com/img/white-papers/612/5-step-guide-to-access-control-x-920.jpg)
5 steps to finding the right access control system for you
Download![Preparing your organisation with quality situational awareness](https://www.sourcesecurity.com/img/white-papers/612/situational-awareness-achieved-for-your-business-920.jpg)
Preparing your organisation with quality situational awareness
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Commercial security: Manufacturers & Suppliers
![Access control system planning phase 2](https://www.sourcesecurity.com/img/white-papers/612/920x533_1722432285.jpg)
Access control system planning phase 2
Download![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![SIA Identity and Biometrics Symposium](https://www.sourcesecurity.com/img/virtual-events/612/sia-identity-and-biometrics-symposium-920x633.jpg)
SIA Identity and Biometrics Symposium
Download![Gunshot detection](https://www.sourcesecurity.com/img/emagazines/612/gunshot-detection-magazine-security-technology-trends-international.jpg)
Gunshot detection
Download