School security
The Integration Association of Florida (IAF) is excited to announce a groundbreaking partnership with Bedrock Learning, a pioneer in training and education for the integration industry. This exclusive licence agreement marks a significant milestone in IAF's mission to elevate industry standards and enhance professional development opportunities for its members and the industry at large through Alarm Academy, IAF’s premier training school. IAF's educational portfolio IAF's educational po...
artius.iD, the global pioneer in secure, self-managed identity and decentralised ID management, has appointed pioneering AI expert Ed Watal to its Board of Strategic Advisors. The appointment comes as artius.iD continues to successfully tap into demand from companies for sophisticated ID solutions to protect against complex AI-enabled threats. Prior roles of Ed Watal Ed Watal is the founder and principal of Intellibus, an IT and AI strategy consultancy based in Reston, Virginia. Ranked among...
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of th...
Bromsgrove-based security and monitoring company, Ecl-ips, is celebrating its win at the North Worcestershire Business Awards 2024. Best use of Technology Ecl-ips was a winner in the ‘Best use of Technology’ award category at the event at Hogarths Stone Manor near Kidderminster. Ecl-ips beat two other finalists: Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer to win. The security installer was among the 30 local businesses that were...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, and RapidDeploy, the pioneering cloud-native solution provider for public safety, announced a strategic industry partnership. The companies will collaborate to provide Emergency Communication Centres (ECCs) and field responders with enriched, real-time critical information to enable faster, more effective emergency responses during g...
Bromsgrove-based security and monitoring company, Ecl-ips, is counting down to the North Worcestershire Business Awards on Thursday 21 November 2024 at Hogarths Stone Manor near Kidderminster. The company is among the 30 local businesses that have been short-listed for an award. Ecl-ips is a finalist in the ‘best use of technology’ award category along with Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer. Vape detector The nomination...
News
The Smart City Expo World Congress (SCEWC) 2024 recently concluded in Barcelona, bringing together experts, innovators, and city pioneers from around the world to explore the future of urban transformation. Dahua Technology took centre stage with its comprehensive lineup of smart city solutions under the theme “Together For A Sustainable Future”, demonstrating how advanced AI, IoT, and big data technologies are driving more sustainable, efficient urban environments. AIoT-powered solutions Dahua’s showcase featured a full suite of AIoT-powered solutions tailored for Urban Safety, Urban Governance, Urban Traffic, and Green Mobility, along with collaborative solutions developed with ecosystem partners to promote digital city growth. The presentation demonstrated Dahua’s commitment to a future where cities are not only more secure but also greener and more liveable. Dahua’s solutions Dahua’s solutions enable seamless integration across various city roles, giving municipal rules In urban governance, Dahua’s solutions enable seamless integration across various city functions, empowering municipal authorities with real-time data to enhance operational efficiency and public service. By creating a unified city-level management and command platform to integrate data from diverse city systems, Dahua’s solution enables faster responses to incidents, optimised resource allocation, and more informed decision-making for city planners. Dahua’s intelligent traffic management Additionally, Dahua’s scenario-based algorithms, such as elderly fall detection, high-rise littering, and garbage classification detection, further support the construction of digital communities, bringing convenience and peace of mind to citizens. To tackle congestion and improve road safety, Dahua’s intelligent traffic management solutions provide real-time traffic analysis, adaptive signal control, and AI-driven violation detection, reducing traffic bottlenecks and supporting smoother commutes. City planners can utilise these tools to build more efficient transportation networks, enhancing both safety and convenience for commuters. Range of smart transport solutions Dahua offers a range of smart transport solutions for both public transit and commercial fleets In support of green mobility, Dahua offers a range of smart transport solutions for both public transit and commercial fleets. Its public bus solution integrates onboard CCTV, passenger counting, and route optimisation to improve both safety and service quality. For commercial vehicles, Dahua’s school bus solution tracks student attendance and safety, while its truck management system includes fuel monitoring to promote energy efficiency. Dahua’s smart parking solutions Dahua’s smart parking solutions also contribute to green mobility by using automated licence plate recognition, intelligent parking space detection, and EV charging stations, enhancing parking experience and promoting sustainable urban mobility. Dahua furthered its sustainability commitment with technologies for natural resource management and biodiversity conservation. By harnessing multi-dimensional monitoring and situational analysis, these technologies offer early warnings for forest fire risks, detect illegal fishing activities, and prevent farmland vandalism, enabling proactive resource management to help cities build resilience against natural disasters. Sustainable urban environment Dahua remains at the forefront, pioneering keys that address these issues with an on-looking vision Additionally, Dahua’s solutions also offer pollution monitoring, hydrological monitoring, wildlife movement tracking, and endangered species identification. With these intelligent tools, cities can address environmental challenges more proactively, contributing to a balanced urban ecosystem. As cities worldwide face challenges like congestion, environmental degradation, public safety concerns, and climate resilience, Dahua remains at the forefront, pioneering solutions that address these issues with a forward-looking vision for a sustainable urban environment. Dahua’s approach Dahua’s approach emphasises building smart cities that are both digitally advanced and deeply human-centered, where safety, efficiency, and ecological harmony are seamlessly integrated into the urban landscape. Driven by its mission to enable a smarter society and better living, Dahua continues to empower smart cities globally together with ecosystem partners, helping municipalities use digital tools to build safer, more connected, and more sustainable urban environments.
Codelocks has added the KitLock by Codelocks KL1200 NetCode® electronic locker lock to its KitLock range, to provide flexible, temporary access for heavy-duty, high-use environments where additional robustness is required. It is particularly suitable for self-service locations, storage facilities, and lockers, for granting temporary access to event and school lockers, and storage areas in holiday rental homes as the addition of Codelocks NetCode® Technology allows the owner or manager to set a date and time-sensitive code remotely via the Codelocks Connect Portal. Keyless access codes Steve Newman, Regional Director at Codelocks EU said, “Adding Codelocks NetCode® Technology to our KL1200 locker lock means that facilities managers and rental owners have more control over access and can grant temporary keyless access codes to storage areas, cabinets, and lockers." "This saves them from having to physically attend the location to reset a code, reducing admin time spent managing access. The addition of NetCode® technology to locks on lockers that are used by multiple people also offers improved usability of the storage.” Dual authorisation feature This feature helps to safeguard, adding another layer of control and making it suitable for medical cart applications As well as Codelocks’ NetCode® Technology, the KL1200 NetCode® electronic locker lock comes with a host of new features. A new dual authorisation feature adds a level of access control by requiring two valid User Codes or two valid NetCodes to be entered to grant access. This feature helps to safeguard, adding another layer of control and making it suitable for medical cart applications and valet parking key storage solutions. KL1200 NetCode® locker The KL1200 NetCode® locker lock can be programmed to unlock automatically at a specified time, in sports centres and school environments this feature is useful for service staff who need to clean for next-day use. It is also possible to control access between set hours, for example, to make lockers and storage available outside of opening hours or prevent access during unauthorised hours. ISO-certified photocatalytic coating The KL1200 NetCode® is available in a silver grey or black finish and can come with the optional Clean The KL1200 NetCode® is available in a silver grey or black finish and can come with the optional Clean by Codelocks finish. This ISO-certified photocatalytic coating offers enhanced protection against viruses, germs, and other environmental toxins. Making it suitable for education facilities and healthcare environments. Red LED light feature Easy to install and programme, Codelocks’ KL1200 NetCode® electronic locks generate up to 50,000 openings per 2 x AAA batteries. The low battery warning ‘red LED light’ feature highlights when batteries need replacing. If batteries fail before they can be replaced, the KL1200 NetCode® boasts a battery override function – a 9-volt PP3 battery can be placed against external contacts to gain access.
Global Security Exchange (GSX) 2024 has concluded at the Orange County Convention Centre in Orlando, Florida. Presented by ASIS International, the world's largest association for security management professionals, the event offered discussion and idea exchanges for the global security community. Attendance exceeded projections, with 16,000 registrants from 86 countries along with approximately 500 exhibiting companies demonstrating the latest security solutions. Attendees diversity "GSX 2024 has once again proven to be an invaluable platform for security professionals worldwide to connect, collaborate, and innovate,” stated Cy A. Oatridge, CPP, 2024 President, of ASIS International. "The diversity of our attendees, representing 86 countries, underscores the truly global nature of our industry and the challenges we face." Fostering relationships "This event is not just about showcasing the latest technologies; it's about fostering relationships and sharing knowledge on a global scale." "As we navigate a complex security landscape, it's these relationships that will drive innovation, enhance our collective knowledge, and ultimately strengthen our ability to protect and serve. GSX reminds us that in the field of security, we are indeed stronger together." Pre-conference events ASIS hosted pre-conference education, including ASIS certification reviews and workshops on facility security GSX was supplemented by a weekend of pre-conference events, such as Secure Horizons: An Immersive Experience for Senior Security Executives, ASIS Volunteers’ Day, and the ASIS Awards of Excellence alongside the Outstanding Security Performance Awards (OSPAs). ASIS Volunteers Day at GSX brought together more than 200 ASIS members from five continents, celebrating the organisation's dynamic volunteer community and their contributions to the profession. ASIS also hosted pre-conference education, including ASIS certification reviews and workshops on facility security design, Enterprise Security Risk Management (ESRM), and stakeholder communication. ASIS Foundation charity The ASIS community raised over $31,000 for the ASIS Foundation through GSX and pre-event activities like the Fitness Challenge. These donations support career advancement through certification scholarships, research, member hardship grants, and more. The event also featured a blood drive, which collected 83 pints of blood, saving up to 249 lives. Each of the keynotes opened with a performance of original work from spoken word artist Charity Blackwell. The charity helped inspire new ways of thinking, convey different perspectives, and set a rhythm for attendees at the show. Keynote presentation GSX kicked off on Monday 23 September with a keynote presentation from former Prime Minister of Finland Sanna Marin. Prime Minister Marin discussed the intricacies of modern geopolitics, especially the recent Russian assault on Ukraine and Finland’s entry into NATO, calling for a more nuanced and comprehensive approach to global security challenges that maintains the benefits of global trade while reducing vulnerabilities to authoritarian regimes. Educational sessions and exhibition Monday launched the start of more than 200 education sessions featuring presenters from 21 countries Following Marin’s keynote presentation, the event’s exhibit hall opened showcasing 500 companies providing innovative security solutions. Monday launched the start of more than 200 education sessions featuring presenters from 21 countries over the three-day event. In Tuesday’s general session, Dr. Rana el Kaliouby, an executive fellow at Harvard Business School, co-founder of Blue Tulip Ventures, and an investor in AI technology, discussed the increasing prevalence of artificial intelligence in lives, the opportunities that it presents, and the potential risks. She also highlighted the real-world effects and economic impact of artificial intelligence. ASIS School Security Standard The ASIS Professional Standards Board hosted a press briefing Tuesday morning featuring a panel of experts who detailed the proposed ASIS School Security Standard. The proposed standard is a comprehensive tool, including information on program management, risk management, behavioral threat assessment management, developing operational emergency plans as well as effective approaches to managing physical security in K-12 settings. Knowledge exchange and career development Tuesday's speed mentoring session connected emerging security professionals with 40 experienced mentors from four continents, fostering global knowledge exchange and career development opportunities. The second day of GSX concluded with ASIS Celebrates! at Universal Studios Florida. Thousands of attendees enjoyed food, performances, and rides with exclusive access to the park. Military and Law Enforcement Appreciation Day ASIS extends its gratitude to service members worldwide for their tireless efforts in safeguarding communities The final day of GSX, Wednesday 25 September, celebrated Military and Law Enforcement Appreciation Day. To honour those who serve and protect, ASIS began the day with a special breakfast event celebrating the dedication of active duty and retired professionals from law enforcement, military service, and emergency response fields. ASIS extends its gratitude to service members worldwide for their tireless efforts in safeguarding communities. Acting with integrity In Wednesday’s general session, Commander Kirk Lippold, U.S. Navy (Ret.) shared his personal experience as the commanding officer of the USS Cole in 2000, when it was attacked by Al Qaeda terrorists in a suicide bombing. Commander Lippold highlighted the importance of acting with integrity and the importance as a leader of knowing the strengths of your people and trusting them to make the right decisions. SM Live featuring brief GSX included an updated edition of SM Live featuring brief, social-formatted content highlighting the best of GSX. The Security Management team produced more than 40 videos spotlighting education sessions, exhibitors, and more. Check out a compilation of SM’s coverage here or go to the Security Management Instagram and X (formerly Twitter) pages. Speed learning sessions Among learning opportunities at GSX, were “game changer” sessions with industry experts speaking on resilience Among the robust learning opportunities at GSX, were “game changer” sessions with industry experts speaking on resilience, trust, and maintaining in crisis. There were “speed learning” sessions on the exhibit show floor, such as the X Stage, the Resilience Zone, and the Cybersecurity Pavilion, each of which offered cutting-edge solutions to keep businesses thriving. At Career HQ, security professionals were offered resume reviews, access to the headshot studio, and professional development sessions. Collaboration and shared purpose "The sheer scope of this year's event – from our thought-provoking keynotes to over 200 specialised education sessions – demonstrates the dynamic nature of our industry,” said Bill Tenney, CEO, of ASIS International. “What resonated with me most was the vibrant atmosphere of collaboration and shared purpose. GSX 2024 has not only been a showcase for cutting-edge security approaches and solutions but also a testament to the strength and unity of our professional community." GSX 2025 in New Orleans "Events of this caliber are vital in propelling our profession and industry forward, equipping us to meet future challenges head-on." "As we look ahead to GSX 2025 in New Orleans, I'm excited about the opportunity to build upon this momentum and further elevate our collective impact on the security landscape." CPE credits GSX delivered opportunities to earn Continuing Professional Education (CPE) credits: All-Access Pass (in-person or digital): 22 CPEs One-Day Pass (in-person and digital): 8 CPEs for Monday and Tuesday; 6 CPEs for Wednesday Expo-Only Pass: 9 CPEs Exhibitors: 3 CPEs Pre-Conference Review Program Attendees: 13.5 CPEs per program (APP, CPP, PSP) Economic impact According to the Orange County Convention Center, GSX 2024 generated an estimated $39,788,500 in economic impact for the city of Orlando. GSX 2025 will take place from 30 September to 1 October in New Orleans, Louisiana. Advance booth space selection for GSX 2025 represents 91% of GSX 2024’s exhibit floor space. For more information about this year’s show, upcoming encore events, or GSX 2025.
Alcatraz AI, a global provider of frictionless, AI-powered biometric access control technology revolutionising security through facial authentication announced a strategic partnership with CBORD, a provider of integrated technology solutions used on higher education and healthcare campuses across the country. Together, Alcatraz AI and CBORD will deliver a safer and more secure campus environment, protecting students, patrons, and staff. Frictionless access This partnership combines and leverages Alcatraz AI's advanced intelligent tailgate detection platform and AI-driven facial authentication with CBORD's trusted systems, empowering higher education institutions and healthcare organisations to provide frictionless access throughout their campuses. This includes secure, easy entry into dining and academic areas, athletic facilities or locker rooms, and enhanced security for sensitive research or IT areas, all while ensuring only authorised individuals access the appropriate spaces across campus and facilities. Indoor and outdoor biometric security Rock X, Alcatraz AI's latest product offering, is designed to revolutionise indoor and outdoor biometric security With this new partnership, Alcatraz AI and CBORD are collaborating to deliver elevated security that is simple to deploy and use across multiple access points on campuses, enhancing both the user experience and building safety. Rock X, Alcatraz AI's latest product offering, is designed to revolutionise indoor and outdoor biometric security and access control through high-performance, frictionless, and secure facial authentication, regardless of the setting. AI-powered technology The AI-powered technology works in all weather and real-world lighting conditions, ensuring that only authorised individuals can enter a secured area at any time of day. In the school campus and healthcare facility settings, Rock X will help enhance physical security, allowing confidence in secure access points both in indoor and outdoor areas. Facial authentication technology "We are thrilled to be partnering with CBORD to extend our facial authentication technology to higher education and healthcare campuses, and to strengthen safety without sacrificing user convenience for authorised individuals," said Tina D'Agostin, CEO of Alcatraz AI. "Together, we're looking forward to further improving how organisations approach access control." Rock X "Expanding our innovative solutions to more institutions and facilities adheres to our mission of making the world a safer and more secure place." "We look forward to working together to demonstrate how Rock X enables frictionless access control that integrates with existing security operations and alleviates challenges for administrators, managers, and users, alike." Operational efficiency "CBORD's mission is to provide the most innovative, convenient technology solutions for higher education and healthcare campuses," said CBORD President and CEO Dan Park. "We're thrilled to collaborate with Alcatraz AI to give customers the best in seamless facial authentication and access control. This partnership enables us to offer enhanced security and improved operational efficiency, resulting in a safer, more engaging environment for students, patients, visitors, and staff."
Students of all ages are back in the classroom this fall and as they sit at their desks, in the cafeteria or outside, a reliable, comprehensive physical security ecosystem is pivotal. Whether it’s initiating a school-wide lockdown with one button, alerting school officials of a propped door or detecting vaping and bullying in bathrooms, Motorola Solutions’ technology - on display at GSX 2024 - is playing an essential role in school safety and security. Access control technologies One such school is The Greater Dayton School in Ohio, protecting its students with Motorola Solutions' Safer Schools technologies. Aiming to be one of the safest schools in the US, its physical security ecosystem includes Avigilon video security cameras across campus, access control protecting all doors, radio communications that connect staff and security, and HALO smart sensors to detect vape and keyword alerts, like "help" or "emergency." All of these technologies are integrated seamlessly. “Our students and staff can stay focused on learning because we have Motorola Solutions technology running in the background, improving both our daily operations and our emergency readiness,” said AJ Stich, the founding principal of The Greater Dayton School. “We have peace of mind knowing our cameras and access control technologies can help us to secure the school in the event of a dangerous threat.” New and enhanced technologies “From cameras built with artificial intelligence to smart sensors, access control and body cameras, we’re helping schools, hospitals, businesses, retailers, manufacturers and venues cut down on response times, increase efficiency and streamline workflows,” said Alex Castaneda, corporate vice president, North America Video Security & Access Control Sales at Motorola Solutions. “New products and flexible integrations are expanding and enhancing the capabilities we offer to our customers.” Motorola Solutions will be highlighting a range of new and enhanced technologies at GSX 2024: Avigilon Security Suite: New devices and analytics including the Avigilon L6A enterprise license plate camera, Avigilon Alta Video analytics for expanded appearance search and the integration of Avigilon Alta Access with Mercury Security intelligent controllers that provides users with more cloud-based capabilities. SentryERS: A physical panic button for Initiating lockdown protocols with the push of a button, alerting first responders during an emergency while providing live video, voice, text and GPS location data. Pelco Sarix Enhanced Duo: Offering two sensors in one camera for comprehensive coverage of open spaces, areas with multiple entrances/exits or locations requiring multi-directional video security. Attendees can learn how Motorola Solutions is solving for safer communities, schools and businesses at GSX in Orlando, September 23 - 25.
Global Security Exchange (GSX) 2024, the annual conference of ASIS International, the world’s largest association for security management professionals, closed on day two in Orlando, FL. Concluding the afternoon of Wednesday 25 September, the event features an extensive program with more than 200 education sessions, daily keynote speakers and general sessions, and a show floor with approximately 500 pioneering innovators from the security industry. Prevalence of AI Tuesday’s general session featured Rana el Kaliouby, an executive fellow at Harvard Business School, co-founder of Blue Tulip Ventures, and an investor in leading AI technology. El Kalibouy discussed the increasing prevalence of artificial intelligence in lives, the opportunities that it presents, and the potential risks. She also highlighted the real-world effects and economic impact of artificial intelligence. “AI has a massive impact, adding $2.6 million to the global economy,” said el Kalibouy. Physical security in K-12 settings Kaliouby emphasised the extent of holding strong ethics when implementing AI into workplace policies Moving forward, el Kaliouby emphasised the importance of maintaining strong ethics when implementing artificial intelligence into workplace policies. The ASIS Professional Standards Board hosted a press briefing Tuesday morning featuring a panel of experts who detailed the proposed ASIS School Security Standard. The standard is a comprehensive tool, including information on program management, risk management, behavioural threat assessment management, developing operational emergency plans as well as effective approaches to managing physical security in K-12 settings. Security risk management principles “Right now, if a school wants to improve its security, it's hard to know where to start,” said Jeff Slotnick, ASIS School Security Standard Technical Committee co-chair. “There's a lot of advice out there, but it's scattered and sometimes contradictory. It's like trying to build a house without a complete set of blueprints.” “Our aim in initiating this project was to create a solid framework based on enterprise security risk management principles that will assist all schools in developing an appropriate and risk-based security program that blends leadership, risk assessment policies, procedures and practices, physical security, behavioural threat assessment and management, and emergency response principles to provide tools for those schools that they can pick up and apply effectively in their own environment,” added Drew Neckar, ASIS School Security Standard Technical Committee co-chair. Current challenges ASIS continues to share updates on the standard, which is expected to be ended in the latter half of 2025 ASIS will continue to share updates on the standard, which is expected to be completed in the latter half of 2025. The Game Changer session titled “Do You Trust Me? How to Thrive in a Mistrustful Era,” delved into how global conflicts can increase not only external threats but can also create discord within workplaces. Donna Concannon, PCI, Dean of the California School of Forensic Studies at Alliant International University and Principal at CPW Consulting Group, Inc. and Specialised Training Services, Inc., discussed with attendees how mistrust can threaten security, what current challenges are and how technology amplifies them, and how to leverage human nature to combat future mistrust. Final day of GSX The final day of GSX, on Wednesday, 25 September, will feature Military and Law Enforcement Appreciation Day (MLEAD) honouring the individuals who make our communities and world a safer place. As a thank for their service, all law enforcement, military, and first responders receive a free one-day pass to GSX 2024. Highlights of upcoming sessions Additional highlights of upcoming sessions on Wednesday include: General Session: Commander Kirk Lippold, U.S. Navy (Ret.) Game Changer: When Chaos Reigns: The Critical Role of Security in Global Crises Building Resilient Teams for Military and Law Enforcement Personnel The Business Model of Terrorism Career Mapping: Plan Your Post-Military Journey Artificial Intelligence: Harnessing Security Data for Business Outcomes
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and school uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate and school security environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, announces that the Northeastern School District (NESD) in York County, Pennsylvania has adopted ZeroEyes' AI gun detection and intelligent situational analysis solution. This proactive step will help protect students, staff, and visitors from gun-related threats. The cutting-edge security system identifies firearms in real-time and delivers actionable intelligence to first responders. Extensive security cameras Gun-related violence continues to be a pressing issue in the United States. Data from the ZeroEyes Gun Violence Research Center shows that 35.9% of shootings analysed in Pennsylvania occurred on K-12 school campuses. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts NESD’s existing security measures include two full-time school resource officers and extensive security cameras. Additionally, the district is transitioning to electronic key card access for all doors, replacing traditional hard keys, and is reviewing remote lockdown capabilities and mass internal notification systems. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts. Mass internal notification systems "A colleague introduced us to ZeroEyes, and we were immediately impressed by the potential of their AI gun detection technology," said Dr. Jason Bottiglieri, Superintendent of NESD. "When we learned about the Pennsylvania Commission on Crime and Delinquency (PCCD) grant, which focuses on enhancing school safety in Central Pennsylvania, we saw an opportunity to bring this critical solution to our district.” NESD is a midsized, suburban public school district located in the South Central region of Pennsylvania. NESD comprises eight buildings, including four elementary schools, two intermediate schools, one middle school, and one high school. The district serves over 4,000 students and employs approximately 300 teachers and 500-600 staff members. Law enforcement veterans If these experts determine the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. Cutting-edge technology "It’s inspiring to see schools like NESD take decisive action to enhance campus security,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thrilled to support their mission to protect students, faculty, and staff. Our collaboration reflects a shared commitment to leveraging cutting-edge technology to help mitigate potential tragedies and save lives."
In 2024, Hualien, Taiwan experienced devastating earthquakes and typhoons, necessitating rebuilding efforts and tourism revitalisation. VIVOTEK (3454-TW), the global pioneer security solution provider, has stepped in to support the local economy by organising the 4th "Safety Map" sustainability event. This year, the event was held in the historically significant Dachen New Village in Hualien, home to over 400 households. Model safe-tourism destination With 2025 marking the 75th anniversary of the migration of Dachen Island residents from Zhejiang, China, to Taiwan, the area is promoting tourism despite challenges like an aging population and increasing environmental risks. VIVOTEK’s team devised diverse solutions to address safety concerns, aiming to combine smart security with local revitalisation efforts. Their goal is to transform Dachen New Village, the largest settlement of Dachen residents in Taiwan, into a model safe-tourism destination that attracts visitors to experience its unique culture. Caring is the core Expanding Social Impact Through a "Safety Map" “VIVOTEK is dedicated to becoming the most trusted security brand in society. We aim to use our expertise to improve safety and forge a unique path of corporate sustainability. In its fourth year, the scale of our ‘Safety Map’ initiative continues to grow,” stated Alex Liao, VIVOTEK’s President. "This time, our work in Dachen New Village benefits over 1,500 residents and ensures that visiting tourists can explore without safety concerns. Additionally, having our team directly observe and address safety issues helps refine our product design to meet users' needs better." Local revitalisation and tourism Boosting the Tourism Economy Through Immersive Experiences The VIVOTEK team also had an immersive theatrical experience created by Lamb Social Innovation Studio The VIVOTEK security team also had an immersive theatrical experience created by Lamb Social Innovation Studio that delved into Dachen’s history. By understanding the area’s unique needs, they developed tailored safety solutions. “VIVOTEK incorporates “concern for others’ cares” as a core value in our sustainability efforts,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the Global Marketing Division. Enhancing safety "Over the years, our ‘Safety Map’ events have spanned neighborhoods, mental retardation training institutions, and schools, fostering a friendlier environment and expanding social impact." "After the natural disasters that recently struck Hualien, leaving behind numerous safety hazards and declining tourist numbers, we hope to use our security expertise to collaborate with residents in enhancing safety and revitalising Hualien’s tourism industry for a win-win outcome." Safety awareness “This is the first in-depth collaboration between Dachen New Village and a corporation. The VIVOTEK security team genuinely considered the needs of the community’s residents." "The event was a co-creation process where everyone brainstormed together, raising safety awareness among residents and inspiring optimism for the community's future transformation,” said Chao Hsiao-Yen, Social Innovation Lamb studio founder. Customised security solutions with AI Building a Safer Dachen New Village At the Ruan Bi Zhenjun Temple, the team explored ways to protect temple assets and visitor donations VIVOTEK’s security team, in collaboration with the local revitalisation group Social Innovation Lamb Studio, worked with residents and elders to identify areas where safety could be enhanced. At the iconic tourist hotspot Ruan Bi Zhenjun Temple, the team explored ways to protect temple assets and visitor donations better while enhancing environmental friendliness, allowing elderly or mobility-impaired individuals to enter and exit freely. Preserving nostalgic charm In the local park, they aimed to reduce disturbances caused by stray animals, improving the overall environment for residents. In the narrow alleys that showcase the history of Dachen’s settlers, the goal was to preserve the nostalgic charm of the village while optimising the environment to make landmarks more recognisable for visitors. For family members living away from home, the community explored innovative technological solutions to enable remote monitoring of loved ones, strengthening familial bonds and care. Various security solutions To address these challenges, VIVOTEK proposed a variety of security solutions. They included installing accessible spaces at the temple to accommodate visitors with mobility challenges, implementing smart lighting systems to enhance nighttime safety, and utilising AI cameras for real-time image analysis and stranger identification. Security solutions included installing accessible spaces at the temple to accommodate visitors The team also designed shared activity spaces to promote intergenerational interactions between the youth and seniors, fostering a sense of community. Emphasising the importance of safety education, the team worked to raise awareness among residents. Generative AI tools Additionally, the project incorporated cutting-edge generative AI tools from the Taiwan Design Research Institute, which visualised proposed solutions quickly and effectively. This approach made it easier for residents to understand and implement the ideas, to transform Dachen New Village into a safer, more livable community, fully prepared to welcome tourists.
Ibstock Place School, a private London co-educational day school nestled in beautiful grounds with a mix of historic and contemporary architecture, faced several challenges. They needed to expand CCTV coverage, ensure guaranteed video retention periods for specific areas at certain times, enhance remote access and event alerting capabilities, and prepare for future analytics integration. The challenge Ibstock Place School identified several challenges with their existing system: Coverage expansion: They needed to expand security coverage across their site. Retention guarantees: Specific areas required guaranteed video retention periods at certain times. Remote access and alerts: The system needed enhanced capabilities for remote monitoring and event alerts. Future-proofing: Requirements included an open platform system with automatic updates and easy integration with third-party technologies. The solution To execute a phased migration to a cloud-based security system, SES Technologies partnered with Eagle Eye Networks to implement a comprehensive cloud solution: Advanced camera integration: New Axis four-megapixel cameras with day/night and IR capabilities were seamlessly integrated into the existing infrastructure. Cloud Video Management System: The cameras were connected to the Eagle Eye Cloud VMS for instant access to live and recorded footage. Phased transition: A carefully planned migration ensured continuity of service during the shift from on-premise to cloud-based systems. The results The implementation delivered a true cloud experience for Ibstock Place School, enabling reliable, secure monitoring of their site while meeting regulatory licencing requirements. Key outcomes included: Significant cost savings: Leveraging existing cameras helped the school achieve a 25% reduction in total cost of ownership. Optimised efficiency: Features like Eagle Eye Smart Video Search, and flexible retention times enhanced operational workflows. Compliance and security: The cloud system provided robust security measures to meet compliance standards. By transitioning to the Eagle Eye Cloud VMS with the expertise of SES Technologies, Ibstock Place School improved its security infrastructure, reduced costs, and enhanced operational efficiency all while positioning itself for future growth and technology integration. Flexible retention time Paul Doran, Facilities Manager at Ibstock Place School, said, "SES Technologies and Eagle Eye Networks have seamlessly integrated our infrastructure with advanced cloud solutions, ensuring effortless regulatory compliance." He adds, "Features like Eagle Eye Smart Video Search, and flexible retention times have enhanced operational efficiency and safety for our school community."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, and EPS, an Ohio-based security systems integrator announced a partnership to protect schools against the threat of gun-related violence. They also unveiled their first joint customer, the Tri-County Career Centre (TCCC) in Southeastern Ohio, which has adopted ZeroEyes’ proactive security technology to protect students, faculty, and staff. Camera placements The partnership aims to amplify customer service and extend the reach of ZeroEyes’ technology to new territories. EPS played a key role in the adoption and implementation of ZeroEyes at the TCCC, conducting site visits, identifying the most effective outdoor cameras, and working closely with ZeroEyes to determine the optimal camera placements. Public, and school safety “As a 100% family-owned business that has been operating for over 40 years throughout the US, EPS prides itself on staying ahead of the game when it comes to technology, the public, and school safety,” says EPS President Charles Wilde. “ZeroEyes’ edge technology and proven commitment to public safety fits squarely within EPS’s model. It's an impressive product, and it's only going to get better as AI continues to advance. I believe it to be a first line of defense against the school shootings that are happening throughout the US.” Comprehensive security integration services EPS specialises in custom solutions across fire detection, security, access control, and video surveillance Based in Canal Winchester, Ohio, EPS provides comprehensive security integration services from design through installation and maintenance. The company specialises in custom solutions across fire detection, security, access control, and video surveillance. “After seeing a ZeroEyes demo presented by an existing EPS client, I instantly knew we needed it as an additional layer of protection,” said Connie Altier, Superintendent of TCCC. “This technology provides a level of safety that I wasn’t even aware existed. Once I learned about it, there was no question in my mind—we had to implement it to ensure the highest level of security for our school.” TCCC Serving the community for 50+ years, TCCC educates 650 students spanning eight districts in rural Southeastern Ohio. The school offers programs for high school students and adults, and its diverse programs are designed to provide students with the critical know-how and real-world exposure needed to excel in their selected careers. TCCC is the first school in Athens County, Ohio to implement a multi-layered security system complete with security cameras, key card door access, a full-time onsite resource officer, and ZeroEyes. AI gun detection and intelligent situational awareness If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras. If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the school security team as quickly as 3 to 5 seconds from detection. Protection against gun-related violence “As we work toward a safer future for all, partnering with systems integrators like EPS helps us expand our reach to new areas so we can protect more people," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Our solution complements EPS's model perfectly, creating a powerful duo to enhance security measures. We look forward to working together to protect the TCCC and other future joint customers against gun-related incidents.”
Melbourne Connect is a new ecosystem led by Melbourne University to provide a visionary precinct to collaborate on first class education, hands on training, and top-edge research. This district is on the edge of the Melbourne CBD with commercial and retail partner tenants, including technology, design, energy, health and major multi-nationals to create an epicentre of brilliant minds. EQUANS were engaged by Lendlease and Melbourne University to integrate all areas of the precinct with shared AV spaces for multiple tenancies and the Student Accommodation Building (SAB). The requirements for this project were to provide seamless, cutting-edge audio-visual collaboration spaces to cater for innovative, world-class research, education, and training. The Solution EQUANS took a tailored approach to installing a range of custom and bespoke AV elements Across the precinct buildings, EQUANS took a tailored approach to installing a range of custom and bespoke AV elements, maximising the ability for users to project and share content. In the School of Engineering, EQUANS installed custom and bespoke elements into the department. Especially in the Human Computer Labs where IDL group users utilise 3D mapping and augmented reality to further research and insight into their innovative future. EQUANS installs audio-visual equipment In the Science Gallery, which includes a multitude of spaces, EQUANS installed audio-visual equipment in the Ground Floor Exhibition, Theatres, Basement Gallery and over 43 lecture theatres and 63 workshop areas. To capture the attention of the younger generation and for a first-rate space to explore issues and ideas of the future, EQUANS integrated cutting-edge audio-visual equipment in all areas to create a world class education area dedicated to STEM. Similar projects were implemented in the Student Accommodation building and the Melbourne Connect Superfloor. The Benefit Through EQUANS, all audio-visual systems and spaces have been curated in a way to encourage a high level of collaboration and learning from the younger generation. Students, researchers, and high-tech companies will further understand, explore and achieve their goals in STEM. This multi-million-dollar AV project has also been designed to ensure it is future proofed and represent evolving and innovative solutions.
Round table discussion
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Considering the growing role of security technology in the higher education market, we asked this week’s Expert Panel Roundtable: What are the new applications for security technology in the college and university markets?
Physical security is a large market overall, encompassing a range of diverse vertical markets, each with its own set of challenges and opportunities. The success of the security industry overall depends on the ability of companies and technologies to meet the specific needs of each vertical market. Some markets offer more lucrative opportunities than others. We asked this week’s Expert Panel Roundtable: Which vertical markets have the greatest potential for growth for physical security systems?
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
White papers
Physical access control
DownloadThe key to unlocking K12 school safety grants
DownloadAccess management in higher education
DownloadSchool security checklist
DownloadWhy SAAS Security Platform is more popular in American SMEs
DownloadSafeguard Students With New Techniques And Technology
DownloadAssessing safety readiness for education campuses
DownloadThe critical role of access control in K-12 school security
DownloadProtecting dormitory residents and assets
DownloadSchool security moves to the cloud
DownloadPhysical access control in higher education
Download6 questions to ask when choosing a security system
DownloadHow end-to-end video security solutions can help your organisation with social distancing
DownloadBuilding a safe ecosystem for visitors post COVID-19
DownloadSchooling the market on education security
DownloadVideos
School security: Manufacturers & Suppliers
Maximising security and performance
DownloadThe key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadThe truth behind 9 mobile access myths
Download5 surprising findings from OT vulnerability assessments
Download