Video analytics
White papers
Selecting the right network video recorder (NVR) for any vertical market
DownloadHow intelligent video is transforming banking and financial institutions
DownloadThe real cost of an outdated Video Security System
DownloadUnderstanding the IT needs of video surveillance
DownloadAI in security solution
DownloadVSS - Top 4 questions to get you started
Download3 ways AI can improve safety and reduce compliance costs
DownloadLevelling up with campus safety
DownloadIoT connectivity
Download2023 trends in video surveillance
Download5 must-haves for seamless VMS connectivity
DownloadThe future of healthcare security is connectivity
DownloadSmart surveillance in the workplace
DownloadImproving city mobility using connected video technology
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadNews
XIMEA, a pioneering innovator in machine vision cameras, is excited to announce its participation in SPIE Photonics West 2025. At the event, XIMEA will be showcasing, among others, its latest camera series, the xiX-Xtreme. Designed for demanding industrial and scientific applications, the xiX-Xtreme series offers unparalleled performance and flexibility. Equipped with state-of-the-art Sony Pregius S sensors and high-speed PCIe interfaces, these cameras deliver exceptional image quality and data throughput. Key features of the xiX-Xtreme series 16.1 Mpix – 24.5 Mpix, Sony IMX530*1*2 sensors Detachable sensor head for super compact form factor and improved image quality Quality inspection, medical and scientific imaging, broadcasting and many more. Advancement in machine vision technology “We are thrilled to show the xiX-Xtreme series at SPIE Photonics West,” said Kevin Toerne, Technical Sales Manager and CEO at XIMEA Corp. “This series represents a significant advancement in machine vision technology and is poised to revolutionise industries. We invite attendees to visit our booth to learn more about the capabilities of these cutting-edge cameras.”
The collaboration of Bosch and Genetec™ is bringing even greater benefits to customers with direct-to-cloud integration of Bosch cameras with Genetec Security Centre SaaS, as well as new intelligent detection and enhanced search capabilities available through Genetec Cloudlink™ cloud-managed appliance connections. Available with camera firmware release 9.40, customers choosing Genetec Security Centre SaaS gain support for Bosch application-specific artificial intelligence (AI) offerings to accurately detect and classify objects, including firearms, persons or vehicles, increase the granularity of metadata to enable faster searches for video evidence, and more. Cyber security standards Genetec Security Centre SaaS is a unified physical security as a service key with cyber security Genetec Security Centre SaaS is an enterprise-grade unified physical security as a service solution with the highest cyber security standards. It is built on a hybrid-cloud, open architecture to give organisations the freedom to choose the devices and cameras that work best for their businesses and the ability to continue support of on-premise deployments while incrementally migrating to cloud. It offers massive scalability, flexibility, and ease of deployment and operations. Benefits from visual intelligence capabilities Bosch cameras feature Intelligent Video Analytics Pro (IVA Pro) to accurately detect and classify objects based on specific goals. The intelligent cameras serve as the foundation for solutions that help secure perimeters, elevate safety for building occupants, and capture data for decision-making. With support for IVA Pro offerings from Bosch, Genetec customers can benefit from the latest in visual intelligence capabilities. These offerings include edge-based visual firearm detection. When someone brandishing a firearm approaches a location, the video analytics is designed to promptly alert personnel, who can verify the firearm and take proactive measures. Integration for the latest Bosch cameras Bosch cameras capture clear metadata about objects in a scene, including object type, speed, colour, and more Bosch cameras also capture detailed metadata about objects in a scene, including object type, speed, colour, and more. This advanced level of captured data enables more granular searches using the Genetec natural language forensic search. Operators can easily scan the metadata recorded alongside video from Bosch cameras to quickly locate relevant video evidence of an event, increasing efficiency to speed investigation workflows. Camera configuration and video viewing with Security Centre SaaS is also possible with the new direct-to-cloud integration for the latest Bosch cameras, including the new Flexidome 8100i, the 3100i, 5100i and 7100i series. By eliminating the need for on-site servers, direct-to-cloud integration reduces costs associated with the installation and maintenance of hardware for a more cost-effective investment for customers. New capabilities of Bosch cameras “With a commitment to partnership that continues to bring greater value to the industry, we are focused on delivering new capabilities for our mutual customers to leverage the visual intelligence features of Bosch cameras,” said Chuck O’Leary, Vice President of Sales – Video Systems and Solutions in North America. “Together, through the support of Bosch cameras in Genetec Security Centre SaaS, we help customers enhance the safety and security of their locations and quickly find meaningful information in video footage for faster and more efficient responses to potential risks and threats.” Hybrid video surveillance deployments “Bosch and Genetec have a long-standing partnership built on delivering innovative solutions to meet the evolving needs of our shared customers." "The integration of Bosch cameras with Security Centre SaaS and Genetec Cloudlink™ provides system integrators and end users with the flexibility to implement cloud-based or hybrid video surveillance deployments using their existing or direct-to-cloud Bosch cameras,“ said Jonathan Doyon, Senior Product Group Director, Security Centre SaaS, Genetec Inc.
XIMEA, a globally renowned provider of innovative imaging solutions, is excited to announce its participation in SPIE Photonics West 2025. The event, taking place from January 28-30, 2025, at the Moscone Centre in San Francisco, California, will feature XIMEA's latest advancements in subminiature camera technology. At booth number 3674, attendees will explore XIMEA's compact and high-performance cameras designed for demanding applications. Subminiature xiMU cameras The subminiature xiMU cameras offer exceptional image quality, super small form factor, and robust construction, making them ideal for a wide range of industries, for example: Machine vision Medical and scientific imaging Robotics and many more Key features of XIMEA's subminiature cameras 5.0–19.6 Mpix Up to 48 FPS Rolling and global shutter options Latest camera innovations "We are thrilled to showcase our latest subminiature camera innovations at SPIE Photonics West," said Kevin Toerne, Managing Director at XIMEA Corp. He adds, "Our commitment to providing cutting-edge imaging solutions has driven us to develop cameras that meet the most demanding requirements of our customers. We invite attendees to visit our booth to learn more about how our products can enhance their applications."
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. Regulatory approvals The transaction is subject to regulatory approvals and further customary closing conditions The parties signed agreements to this effect on December 12. It has been agreed that the purchase price and other details of the purchase agreement will not be disclosed. The transaction is subject to regulatory approvals and further customary closing conditions. It is expected to be closed by the end of the first half of 2025. Outlook for the future and new business units Back in October 2023, Bosch announced that, as part of its realignment of its Building Technologies division, it would be selling most of the division’s product business. “It was our aim to find a suitable buyer who will acquire all three security and communications technology business units and offer their associates an outlook for the future. We have achieved that aim. Triton has presented a sustainable and credible growth strategy for the business." "As an investor, moreover, it can provide a high level of industrial expertise and many years of experience in taking comparable companies forward,” says Christian Fischer, deputy chairman of the board of management of Robert Bosch GmbH, with responsibility for Bosch Group portfolio management and thus also for this planned transaction. Agreement with Bosch Triton focuses on European firms in the industrial, healthcare, and trade services sectors With its investments, Triton focuses on European companies in the industrial, healthcare, and business services sectors. “We are pleased to have reached an agreement with Bosch and to be the preferred buyer for the security and communications technology product business." "We want to support the management and employees to continue the strong growth trajectory that this business recently saw by providing not only capital, but also our know-how from having owned and successfully developed other companies in the security space,” says Claus von Hermann, Managing Partner and Co-lead of the Industrial Tech team at Triton. Innovations in security and communications Peter Loeffler, the CEO of Bosch Building Technologies’ product business, adds: “With Triton as our new owner, its expertise and support, we will have a strong base for further, profitable growth." "We will work together to push ahead with innovations in the security and communications area – to the usual high-quality standards and with comprehensive expertise. The entire team is looking forward to making our new company a success and will remain a reliable partner for our customers.” Realignment of Bosch Building Technologies Bosch Building Technologies division is to focus on its regional integrator business As part of its realignment, the Bosch Building Technologies division is to focus on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. The goal of Bosch Building Technologies is to become a globally pioneering supplier of systems integration and to seize the attractive opportunities for growth in this segment. Because of its importance for systems integration, the product business with fire-alarm systems is to be merged with the integrator business and continued. Benefits in the future of digitalisation Following the transaction, Bosch Building Technologies will have roughly 8,000 associates in eight countries. As a product-agnostic systems integrator with a wide-ranging portfolio of energy and building solutions, the division intends to benefit in the future from digitalisation and growing customer demand for integrated, intelligent, and cross-domain solutions in the areas of building security, energy efficiency, and building automation.
Expert commentary
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
As urban populations grow and security challenges evolve, Californian cities have increasingly turned to advanced surveillance systems to enhance public safety. Surveillance infrastructure Between 2022 and 2024, these cities have made significant strides in upgrading their surveillance infrastructure, driven by concerns over crime, public safety, and the need for more sophisticated emergency response systems. This article explores how California's urban areas are improving surveillance technologies and practices, with a focus on citywide initiatives, partnerships with technology firms, and the integration of AI-driven systems. Introduction of smart city surveillance The push toward smart city technology has reshaped the security landscape in California The push toward smart city technology has reshaped the security landscape in California. With the state being home to some of the world's most innovative technology firms, cities such as Los Angeles (LA), San Francisco, and San Diego are leveraging this expertise to develop and implement advanced surveillance systems. Citywide surveillance initiatives Since 2022, the state has seen an increase in citywide surveillance initiatives aimed at addressing rising crime rates, enhancing traffic management, and improving emergency response. These systems include AI-enhanced video analytics, high-definition cameras, and real-time monitoring centers, helping law enforcement track and respond to incidents more efficiently. Key surveillance developments across Californian cities 1. Los Angeles: AI and Facial Recognition Integration Los Angeles has led the way in deploying state-of-the-art surveillance systems, particularly in high-crime areas and transportation hubs. In 2023, the Los Angeles Police Department (LAPD) expanded its use of artificial intelligence (AI) in crime prevention. The department integrated AI-enhanced video analytics with its existing network of over 30,000 surveillance cameras throughout the city, a move designed to improve real-time crime detection and automate the identification of suspicious activity. Privacy law compliance The city government has enacted measures to restrict the application of facial recognition to high-priority cases Facial recognition technology has also been a controversial but increasingly used tool in the city’s surveillance strategy. While privacy concerns remain, LA has implemented strict regulations to ensure that this technology is used in compliance with privacy laws. In response to public concerns, the city government has enacted measures to restrict the application of facial recognition to high-priority cases such as locating missing persons or identifying known offenders. According to a 2023 Los Angeles Times report, these technologies have helped reduce violent crime in areas where the systems are deployed, with a notable 15% reduction in crime rates in Downtown LA. 2. San Francisco: Data-Driven Crime Prevention San Francisco, a tech hub, has similarly embraced advanced surveillance systems, with a focus on predictive policing. The city's law enforcement agencies have adopted data-driven approaches that rely on vast amounts of data collected through surveillance cameras and other sensors placed around the city. Pilot programme In 2022, the San Francisco Police Department (SFPD) introduced a pilot programme that integrated predictive analytics with its citywide surveillance system. By analysing patterns of criminal activity, the system can forecast potential hotspots and allocate resources more effectively. Although controversial due to concerns over profiling and civil liberties, the system has been credited with helping police prevent several large-scale crimes. Transparency in the use of surveillance data Measures include annual audits and public reporting, ensuring that the system adheres to standards Moreover, the city has implemented stringent oversight measures to ensure transparency in the use of surveillance data. This includes annual audits and public reporting, ensuring that the system adheres to legal and ethical standards. A 2023 report from The San Francisco Chronicle indicated that this initiative has led to a 10% improvement in response times to major incidents, particularly in high-density areas like the Financial District. 3. San Diego: Smart Traffic and Public Safety Surveillance San Diego has also taken significant steps to upgrade its urban surveillance capabilities. One of the key focuses of the city has been integrating surveillance systems into its transportation infrastructure. The city’s Smart Streetlights programme, which began as a traffic monitoring initiative, was expanded in 2022 to include surveillance capabilities aimed at improving public safety. Smart Streetlights programme Under this programme, thousands of streetlights equipped with cameras and sensors have been installed throughout San Diego. These lights not only monitor traffic conditions but also detect suspicious activities, accidents, and emergencies. The data collected is transmitted in real-time to the city’s public safety command center, where law enforcement can respond to incidents more quickly. A 2023 evaluation by the San Diego Union-Tribune revealed that the Smart Streetlights programme had helped reduce traffic-related accidents by 12% and had become a vital tool in aiding crime investigations. Cybersecurity measures All data collected through its surveillance network is secure from potential breaches or unauthorised access Additionally, San Diego has focused on enhancing its cybersecurity measures to protect the integrity of its surveillance data. The city government partnered with local cybersecurity firms to ensure that all data collected through its surveillance network is secure from potential breaches or unauthorised access. Key technologies driving city surveillance in California The success of these surveillance initiatives can be attributed to the rapid advancement of several key technologies, which have transformed traditional security systems into sophisticated, AI-driven solutions. 1. AI-Powered Video Analytics AI-powered video analytics is at the forefront of city surveillance efforts in California. This technology enables the automatic detection of unusual patterns or activities, significantly enhancing the ability of law enforcement agencies to identify potential threats in real time. AI systems can analyse vast amounts of video footage quickly, reducing the need for manual monitoring. 2. Facial Recognition Technology Despite its controversial nature, facial recognition technology has been adopted in several Californian cities for high-priority security applications. While cities like San Francisco have restricted its use, other cities such as Los Angeles have integrated it into their surveillance networks under strict legal frameworks. 3. Predictive Analytics This technology allows police departments to focus their resources more effectively by identifying potential hotspots Predictive analytics, used prominently in San Francisco, relies on data collected from various surveillance systems to predict potential criminal activity. This technology allows police departments to focus their resources more effectively by identifying potential hotspots based on past crime patterns. 4. Smart Sensors and IoT Integration Cities like San Diego have embraced the Internet of Things (IoT) by embedding smart sensors into urban infrastructure. These sensors, connected to central monitoring systems, help cities track everything from traffic conditions to air quality. They also play a crucial role in public safety by identifying anomalies and triggering alerts for law enforcement. Challenges and controversies While the benefits of enhanced surveillance are clear, Californian cities face several challenges in the implementation of these technologies. 1. Privacy Concerns The increased use of surveillance technologies, particularly AI and facial recognition, has raised significant privacy concerns. Advocacy groups have called for stricter regulations to prevent misuse and protect individual privacy rights. In response, cities like San Francisco and Los Angeles have implemented oversight committees and enacted laws to govern the use of these technologies. 2. Data Security The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity As cities collect vast amounts of surveillance data, ensuring its security is a major challenge. The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity measures. San Diego's partnership with local tech firms to secure its surveillance infrastructure is an example of proactive steps being taken to address this issue. 3. Balancing Surveillance and Civil Liberties Striking a balance between effective surveillance and the protection of civil liberties continues to be a contentious issue. Critics argue that predictive policing and AI-driven surveillance systems can lead to biased decision-making and discriminatory practices. California cities have responded by introducing transparency measures, including public audits and open-data initiatives, to maintain public trust. California Urban Surveillance: A Model Worth Emulating The last couple of years have seen Californian cities making significant progress in upgrading their surveillance and security systems. By integrating AI, predictive analytics, and IoT technologies into their urban infrastructures, cities like Los Angeles, San Francisco, and San Diego are setting new standards for public safety and crime prevention. However, as these technologies continue to evolve, cities must also address the ethical and legal challenges they present, particularly in the areas of privacy and data security. With careful planning and regulation, California’s approach to urban surveillance could serve as a model for other cities worldwide.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
One of the UK’s major jails is enhancing surveillance with the help of video wall experts Ultimate Visual Solutions (UVS), who specialise in control room installations at prisons and other high-security establishments. The prison, which can’t be named for security reasons, has been operating a 10-screen LCD video wall and video wall controller, installed by UVS, 24/7 since 2009, including regular upgrades to ensure it benefitted from the latest technology. High-security prison UVS has now been recruited to install its very latest Lucidity video wall controller technology for the system, which will become an emergency backup control room at the high-security prison. A completely new control centre has now been built at the site and UVS have been selected to provide the very latest in video wall technology for this application, with a 10 55-inch narrow bezel screen LCD video wall and Lucidity WBC110 controller. Several security management systems Lucidity controllers merged with many security management systems that are in use at these sites During the past 15 years UVS have also supplied video wall controller technology and LCD video walls for five other high-security prisons in the UK. Due to UVS’s extensive work in the high-security prison sector, its Lucidity controllers have also been integrated with several security management systems that are in use at these sites. UVS Managing Director Steve Murphy said: “We are very proud to have once again been selected to provide the very latest in video wall technology at a site where it is essential that control rooms have reliable 24/7 operation." Long-term technical support Murphy added: “The level of support provided by UVS, from system design, to implementation, to long-term technical support, has been highlighted by our partners as one of the key factors in our selection, alongside proven reliable operation in these highly-critical 24/7 applications.” UVS, based in the Burnley First – Burnley Business Centre, is led by four senior colleagues who, between them, have more than 85 years’ combined Audio Visual, Control Room and Visual Solutions experience.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
Since 2024, Maringá, a city of approximately 500,000 residents consistently recognised as the best city to live in Brazil for over 6 consecutive years, has further strengthened its reputation by addressing the growing need for public safety. Smart surveillance solutions In this pioneering project, ALCA NETWORK and ALLNET were responsible for the project design and partnered with VIVOTEK, the global provider of security solutions, to implement one of the most advanced smart surveillance solutions in Brazil. This system integrates cutting-edge cameras, facial and licence plate recognition, and Big Data technologies. By consolidating data from the municipal, state, and federal sectors, this collaboration increases the safety of residents, solidifying Maringá’s position at the forefront of innovation in public safety. City's challenge The city government and security agencies recognised the need for smarter security measures Despite Maringá’s reputation as a peaceful and hard-working city with one of the highest Human Development Indexes (HDI) in Brazil, it faced evolving public safety needs. The city government and security agencies recognised the need for smarter security measures. “The Public Safety Department initially aimed to capture and analyse video data to support decision-making in cases such as drug trafficking, vehicle theft, tax fraud, and the protection of women and minors at risk,” explains Security Secretary Ivan Quartaroli. Public safety To meet these objectives, VIVOTEK was chosen by ALCA NETWORK and ALLNET for its advanced technology and quality, perfectly aligning with the city government’s requirements. The implementation of Maringá’s Integrated Control Center (CCI) began in July 2022, with strategically positioned cameras installed by the city’s public safety guidelines. Vivotek solutions VIVOTEK played a key role in upgrading Maringá’s security infrastructure by providing a comprehensive suite of solutions. This includes cameras with built-in video analytics processing technology and advanced software with facial and licence plate recognition capabilities. This integration leverages Big Data to cross-reference captured information, facilitating streamlined processing and providing reliable analytics for informed decision-making. To ensure full coverage, 70 VIVOTEK cameras supplied by ALLNET were strategically installed in key locations throughout Maringá, including urban mobility terminals, major avenues, squares, high-traffic intersections, and public corridors. Results and customer feedback Continuous monitoring of CCI allows officers to identify suspicious activity and promptly alert The implementation of CCI Maringá with VIVOTEK solutions has improved public safety, causing a notable reduction in crime rates and an increased sense of security among residents. Continuous monitoring of CCI allows officers to identify suspicious activity and promptly alert nearby law enforcement with accurate information. Benefits VIVOTEK’s advanced imaging technology supports crime prevention and investigation and serves as crucial evidence in legal proceedings. Key benefits include: Reduced investigation costs and time. Greater efficiency and safety for public agents working in the sector. Reduction in car thefts. Reduction in criminal activities. Increased quality of life for the population. Vehicle management As Acting Mayor Ulisses Maia emphasised, “This investment is capable of protecting the law-abiding citizens of Maringá, preventing all types of accidents that can happen in our city.” The integration of video analytics, particularly licence Plate Recognition (LPR), greatly increases safety by managing the flow of vehicles in and out of the city, reinforcing Maringá’s status as a smart city in Brazil.
RGB Spectrum®, a pioneering designer and manufacturer of real-time audio-visual solutions for defence and public safety, announces that Trident Military Systems, LLC, a pioneering provider of flight simulation systems for military organisations, has teamed up with RGB Spectrum to enhance the effectiveness of its F-16 training programs. With a focus on delivering realistic, synchronised training experiences, Trident has successfully integrated RGB Spectrum’s SuperView®, DGy™, and QuadView® solutions, transforming how pilots and instructors engage with their training data. The Challenge Trident Military Systems supports the Air National Guard and Air Force Reserve by building and maintaining F-16 simulators across multiple sites nationwide. Trident aimed to provide instructors with real-time cockpit data, synchronised video sources, and effective debriefing capabilities for improving pilot training. Why RGB Spectrum? RGB Spectrum’s technology proved vital in delivering high-quality training to the Air National Guard Trident turned to RGB Spectrum for its flexible, reliable, and scalable solutions. These products allowed Trident to seamlessly integrate custom applications, synchronise video with network data, and ensure fail-safe operations under critical conditions. RGB Spectrum’s technology proved essential in delivering high-quality training to the Air National Guard and Air Force Reserve. “We needed a solution that could integrate cockpit data with real-time network information and ensure that our training systems performed flawlessly under the high-stakes conditions of military training,” said Jerry Giacinto, Chief Technology Officer at Trident Military Systems. “RGB Spectrum’s products have provided the reliability and flexibility we need to offer exceptional training experiences.” How RGB Spectrum’s technology powers training? Trident Military Systems utilises the following RGB Spectrum products to support training and debriefing: SuperView Multiviewer: Displays a real-time "glass cockpit" on a large monitor, giving instructors a comprehensive view of cockpit data, including multi-function displays (MFD), flight data, and simulated out-of-cockpit visuals. DGy Video Codecs: Records video and audio during training sessions using JPEG2000 compression, providing visually lossless video for accurate post-mission analysis and debriefing. QuadView Multiviewer: Integrates multiple video sources on a single screen, enabling instructors to present critical training data in customisable layouts for enhanced clarity and context. The Results The integration of RGB Spectrum’s technology has had a profound impact on Trident Military Systems’ ability to deliver high-quality, synchronised training: Enhanced Training Capabilities: Instructors gain real-time access to all cockpit data, improving the depth and quality of feedback during training. Improved Debriefing: DGy’s video and audio recording features have streamlined post-mission analysis, allowing for a more detailed and effective debriefing process. Operational Efficiency: RGB Spectrum’s customisable solutions have increased operational efficiency by seamlessly synchronising video playback with network data. “The SuperView, DGy, and QuadView have made a difference in how we deliver and review F-16 training missions. The clarity, real-time synchronisation, and ability to record and play back training sessions have improved our ability to debrief and educate pilots,” said Giacinto. “These tools have become indispensable in our daily operations.”
Round table discussion
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
Products
Video analytics: Manufacturers & Suppliers
- Bosch Video analytics
- Hanwha Vision Video analytics
- Avigilon Video analytics
- Hikvision Video analytics
- Axis Communications Video analytics
- Honeywell Security Video analytics
- FLIR Systems Video analytics
- March Networks Video analytics
- Videotec Video analytics
- AV Costar Video analytics
- VideoIQ Video analytics
- LTV Europe Video analytics
- AMAG Video analytics