Biometric Security
Wavelynx Technologies, a pioneer in secure and versatile reader and credential solutions, has expanded its global reach into the United Kingdom and Ireland to support the increasing demand for modern security solutions. This strategic move comes as the company scales its operations to ensure that all customers have access to interoperable solutions that align with the growing need for advanced security across sectors such as commercial real estate, hospitality, education, and healthcare....
Xtract One Technologies announced its Xtract One Gateway (“Gateway”) has been selected to protect key hospital locations in Manitoba, including the province’s Health Sciences Centre and Crisis Response Centre locations operated by Shared Health. The system will redefine the security experience by balancing powerful threat detection with the seamless flow for individuals, enhancing safety standards, and optimising operational efficiency. Securing health facilities "Healthcare...
Dormakaba has signed an agreement to acquire Montagebedrijf van den Berg B.V. (“Van den Berg”) on 5 February 2025. The acquisition strengthens dormakaba’s airport vertical by adding project and service competencies in the Dutch market. The transaction will be effective from 1 January 2025. Van den Berg Van den Berg is a well-known company specialising in the maintenance, repair, and new installation of automatic door systems and adjacent products with a high exposure to the...
ASSA ABLOY Opening Solutions is excited to announce that Medeco Security Center (MSC), the premier program for security professionals, has changed its name to ASSA ABLOY Security Partners (AASP). While Medeco is the founder and still a major part of the program, over time, the program has evolved to include all ASSA ABLOY Door Security Solutions brands. This rebranding, including a logo update, now better represents what the program offers. Mechanical door opening hardware ASSA ABLOY Security...
Gunnebo Entrance Control is pleased to announce the appointment of Charles Andrews as its new Chief Financial Officer (CFO) and a key member of the senior executive team. With a strong track record in financial leadership across global businesses, Charles will oversee the company’s Finance, IT, and PMO functions worldwide, playing a pivotal role in executing Gunnebo Entrance Control’s strategic vision and driving sustainable growth. Innovation and operational excellence Says Charl...
Integrated Control Technology (ICT®), a manufacturer of intelligent access control and security solutions, announced the appointment of Andy Bane as Chief Executive Officer (CEO). Andy succeeds ICT founder and former CEO Hayden Burr, who will transition to the role of Chief Innovation Officer. Andy's responsibilities By investing in the future, ICT is positioning itself to drive greater value, create new opportunities, and strengthen relationships worldwide. Under Andy’s...
News
Nanodems, a pioneer in Physical Security Information Management (PSIM) announced a strategic partnership between TKH Security, a global pioneer in security and parking guidance technologies. TKH Security TKH Security, based in Zoetermeer, the Netherlands, with over 25 years of experience, provides innovative solutions for security, asset & site, and parking guidance management. Operating in over 80 countries with 12 offices worldwide, TKH Security is committed to delivering high-quality, cyber-secure technologies that are designed in-house and manufactured in Europe, with a strong focus on environmental responsibility. Nanodems Corporation Its seamless platform integrates and manages diverse security assets, including CCTV, access control systems Nanodems Corporation, based in Burlington, Massachusetts, specialises in PSIM solutions that enable organisations to streamline operations, mitigate risks, and centralise control of their security ecosystems. Its seamless platform integrates and manages diverse security assets, including CCTV, access control systems, and perimeter intrusion detection systems. Security management This partnership unites TKH Security’s expertise in VMS with Nanodems’ expertise in software solutions, providing a comprehensive and integrated approach to security management. Together, Nanodems aims to deliver innovative, efficient, and secure solutions that meet the evolving needs of organisations worldwide. This integration will provide innovative, efficient, and secure solutions to empower organisations globally.
Matrix, an OEM in Security and Telecom solutions, is excited to announce its participation in the 27th CMDA IT Expo 2025, scheduled for February 10-11 at The Westin, Koregaon Park, Pune. As a premier platform for engaging with vendors, channel partners, and industry stakeholders, the event will showcase Matrix's innovative solutions aimed at enhancing safety, streamlining operations, and enabling seamless communication across critical sectors. Cyber-secured IP video surveillance Matrix is thrilled to unveil its IP Video Surveillance Solutions, meticulously designed to address the security needs of the IT industry, at the CMDA IT Expo 2025. These enterprise-grade solutions empower vendors and channel partners to deliver advanced, cyber-secured surveillance tailored for modern IT infrastructures. Cyber-Secured Surveillance for IT Ecosystems: Matrix network cameras and video management software ensure robust data protection while adhering to global standards like OWASP. This safeguards sensitive IT assets and builds trust through compliance and operational reliability. Advanced Analytics for IT Security: Cutting-edge Video Analytics, including intrusion detection, motion detection, and licence plate recognition, enable enhanced monitoring and threat mitigation across IT facilities. Centralised Monitoring for IT Operations: Matrix’s solutions enable centralised, remote monitoring with real-time alerts via SMS, email, or WhatsApp, ensuring continuous vigilance and swift response to incidents. Visit Matrix at CMDA IT Expo 2025 to discover how its scalable, IT-focused Video Surveillance solutions can help vendors and channel partners enhance safety, optimise operations, and drive growth in the IT sector. Advanced access control solutions Matrix invites vendors and channel partners to explore its Access Control Solutions at CMDA IT Expo 2025, designed to address the dynamic access management needs of the IT sector. Built with scalability and efficiency in mind, these solutions empower businesses to achieve seamless security and streamlined operations. Centralised Multi-Location Access Management: Matrix simplifies access control for IT enterprises with multiple facilities, offering centralised and efficient management tailored to diverse projects handled by system integrators and consultants. Elevator Control for Enhanced Security: Ensure floor-wise access regulation in IT parks and high-rise offices to improve safety and convenience for occupants. Smart Visitor Management: Streamline visitor entry processes with pre-registration, approval workflows, and live tracking, elevating the security protocols in IT environments. Join Matrix at CMDA IT Expo 2025 to discover how its robust and IT-centric access control solutions can help vendors and channel partners deliver unparalleled security and convenience to their clients. Matrix time-attendance solutions Matrix is set to unveil its Time-Attendance Solutions, designed to optimise workforce management in the IT industry, at the CMDA IT Expo 2025. Tailored to meet the needs of system integrators and consultants, these solutions offer robust tools for managing IT enterprise operations with precision and efficiency. Job Processing and Costing for IT Projects: Automate workforce allocation and job tracking to boost productivity and operational efficiency, ensuring seamless project execution. Field Visit Management for IT Teams: Enable real-time reporting and monitoring of field employees, enhancing accountability and optimising workflows across IT operations. Flexible Attendance Management: Provide employees with self-service tools for managing attendance and leave, ensuring a seamless and user-friendly experience. Join Matrix at CMDA IT Expo 2025 to explore how its future-ready Time-Attendance Solutions can empower vendors and channel partners to deliver efficient workforce management tailored for IT enterprises.
Matrix, a provider of enterprise-grade Security and Telecom solutions, is proud to participate as a Gold Sponsor at the prestigious Project Heads, Architects, Consultants, and Conclave (PACC) 2025, hosted by the Fire & Security Association of India (FSAI). The event, set to take place from February 6th to 9th at ITC Grand Chola, is a critical platform for industry pioneers shaping the future of infrastructure, smart buildings, and security ecosystems. PACC 2025 PACC 2025 is a convergence of project heads, architects, security consultants, system integrators, and MEP professionals, all of whom play key roles in designing and implementing secure, efficient, and sustainable infrastructure. As a Gold Sponsor, Matrix will showcase its comprehensive portfolio of Video Surveillance, and Access Control, solutions, designed to help industry professionals integrate future-ready security into their projects from the ground up. Advanced solutions on display For those involved in large-scale commercial, residential, industrial, and government projects, security is no longer just an add-on—it is a fundamental requirement. Matrix’s solutions bridge the gap between architectural design, project execution, and long-term security resilience, ensuring seamless integration without compromising aesthetics, compliance, or efficiency. At PACC 2025, Matrix will demonstrate how its advanced security solutions enable project heads, architects, and consultants to: Ensure Seamless, Multi-Layered Security in Large-Scale Projects – From office towers and manufacturing units to transportation hubs and data centers, Matrix’s security solutions provide centralised control, intelligent monitoring, and scalability. Enhance Building Efficiency with Smart Access Control – Matrix’s Access Control and Time-Attendance solutions help businesses optimise entry management, workforce tracking, and visitor authentication, which is crucial for commercial offices, IT parks, and multi-tenant spaces. Integrate Future-Proof, Scalable Security Architecture – Matrix’s Access Control and Video Surveillance Solutions support the BACnet protocol, ensuring that architects and consultants can easily integrate security systems with BMS (Building Management Systems), HVAC, and Fire Safety for a truly connected, and secure infrastructure. Showcasing Matrix’s key offerings at PACC 2025 Matrix will present its comprehensive Video Surveillance Solutions, featuring 2MP to 8MP Network Cameras Matrix will present its comprehensive Video Surveillance Solutions, featuring 2MP to 8MP Network Cameras in bullet, dome, and turret, and ruggedised enclosures for all kinds of environments. Supporting 4 to 96-channel Network Video Recorders (NVRs) with centralised monitoring and 4K decoding, these solutions cater to enterprises of all sizes. Matrix VMS Matrix VMS enhances surveillance with Intelligent Video Analytics, eMap monitoring, and an intuitive interface, ensuring efficient security management across large-scale projects. Matrix solutions are cyber-secured, and safeguard sensitive surveillance data from unauthorised access, making them ideal for critical infrastructure, smart cities, and high-risk facilities. Integrated security solutions Beyond surveillance, Matrix offers integrated security solutions for Weighbridge Integration, Parking Management, and Perimeter Security, ensuring seamless vehicle monitoring, automated access control, and enhanced perimeter protection. Matrix looks forward to engaging with architects, consultants, and industry pioneers at PACC 2025, exchanging ideas on building secure, future-ready infrastructure. Through live demonstrations and expert interactions, discover how Matrix’s advanced security solutions can seamlessly blend into modern spaces.
Alfred International, a pioneer in smart lock technology and a subsidiary of GHT Door Hardware announces a new integration with Universal Remote Control (URC), a global pioneer in smart automation and control solutions. This partnership leverages the Z-Wave® protocol to deliver seamless connectivity between Alfred smart locks and URC’s Total Control® system, providing integrators and end users with advanced, unified access and security management. URC TRF-ZW10 The integration allows URC dealers to incorporate all Z-Wave-enabled Alfred smart locks into URC Total Control installations with ease by using URC software, offering homeowners streamlined control over access points as part of a holistic smart home or building automation system. The URC TRF-ZW10 acts as the central Z-Wave hub, allowing devices like Alfred’s smart locks to communicate with Total Control for automated locking, remote monitoring, and seamless scene integration. The result is an elevated experience that prioritises security, convenience, and peace of mind. Smart access and security “Connected, smart access and security are strategic priorities for URC, so our integration with Alfred smart locks, via Z-Wave protocol, is very important to our dealer community,” stated Lars Granoe, URC’s VP of Product. “We look to expand our relationship with Alfred to deliver simple, fast integration for our dealers and peace of mind for home and commercial building owners.” Simplicity and reliability This integration delivers a scalable solution for modern environments, offering enhanced security The collaboration emphasises simplicity and reliability, enabling seamless operation across residential and commercial spaces. By combining Alfred’s sleek, technologically advanced smart locks with URC’s robust automation platform, this integration delivers a scalable solution for modern environments, offering enhanced security and automation possibilities. ZWLR connectivity and wireless charging Alfred’s Z-Wave compatible smart locks, including the DB2S and ML2 models, provide a range of advanced features such as Z-Wave Long Range (ZWLR) connectivity and wireless charging capabilities. These locks integrate with the TRF-ZW10 gateway by using URC software, ensuring reliable communication and responsive control within the Total Control ecosystem. Innovative and connected living solutions “We’re excited to partner with URC to provide a best-in-class integration experience,” said Brad Cook, Head of Product Integration at Alfred International. “This collaboration reflects Alfred’s commitment to enabling secure, innovative, and connected living solutions through partnerships with industry leaders like URC, and we look forward to enabling deeper integrations with URC in the future.”
Iris ID, a global pioneer in iris recognition technology since 1997 has secured a significant new partnership with the Texas Department of Public Safety (TDPS), to add over two hundred more Iris ID iCAM TD100A units to their Livescan systems. This further cements the growing popularity and efficacy of iris recognition technology for law enforcement, criminal justice agencies, and their partners. As a biometric, iris recognition is deemed the most accurate modality over either fingerprint or facial recognition, and is second only to DNA. Iris ID iCAM TD100A units The TDPS is responsible for protecting its 30 million residents, the states’ critical infrastructures, and over 1,254 miles of international border with Mexico. The threats that the DPS monitors require constant vigilance and the most up-to-date and efficient technologies. Faced with limited resources and a growing criminal contingent, this technology is poised to assist law enforcement and state agencies with protecting citizens and property, while providing local and state law enforcement and criminal justice agencies with around-the-clock access to mission-critical information systems, like the Next Generation Identification Iris Service (NGI). 1-N identification This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification In 2014, Iris ID began the (NGI), a pilot program with Border Patrol and the FBI, which gave law enforcement and government agencies access to the largest repository of iris biometric data associated with fingerprint and face images. This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification - speeding the intake and matching process of detainees. NGI platform In 2020, the FBI officially rolled out the NGI platform. Since 2020, the repository has been growing at a rate of 100k+ new identities monthly. There are currently about 675 law enforcement locations in the US contributing to NGI Iris Service from 250 agencies and we expect to see that number continue to grow. Department of Homeland Security (DHS), Border Patrol has over 2000 workstations installed enrolling to NGI every day. Iris recognition As a tool to aid law enforcement and criminal justice agencies, iris recognition is useful in scenarios that require fast, accurate, and non-contact identification. Use cases include intake and release, work release, transportation, mobile identification, border security, and investigative searches.
Leveraging its decades-long expertise in identity verification, Regula has made its advanced document verification software fully compatible with a wide range of third-party ID scanners and passport readers available on the market. Border control checkpoints, hotels, banks, medical organisations, and other institutions can take advantage of the most robust, forensic-level automated document verification and authentication regardless of the devices they are currently using. ID verification software Regula’s ID verification software is an on-premises solution, which means it works offline and keeps sensitive ID data secure. It seamlessly integrates with leading passport readers and can be fully customised depending on the device model and its functional capabilities. This not only ensures quick migration to a robust identity verification (IDV) core solution but also allows businesses and government agencies to maximise the potential of their existing hardware investments. Forensic-level document verification Regula’s software supports authenticity checks in various illumination modes, such as white, UV, IR Regula’s ID verification software for document readers offers the most comprehensive set of ID authenticity checks. It automatically reads, analyses, and cross-compares data from multiple sources, including RFID chips, machine-readable zones (MRZs), barcodes, and visual zones, to ensure they are consistent and not tampered with. Regula’s software also supports authenticity checks in various illumination modes, such as white, ultraviolet (UV), infrared (IR), and coaxial lighting. Plus, the solution allows checking holograms and other optically variable devices and inks. Global ID support The software comes with the market’s most comprehensive identity document template database, which Regula owns and maintains. It currently contains over 14,800 ID templates from 251 countries and territories and keeps growing. Also, the database enables the recognition of 138 languages and a great variety of scripts. Regula Information Reference System Optionally, the software can be integrated with the Regula Information Reference System, a unique digital collection of detailed images and descriptions of identity and vehicle documents, as well as banknotes and coins. Covering every country and territory in the world, the Regula Information Reference System contains over 337,000 high-resolution images of documents and their security features captured in different light sources. Thus, the system provides an indispensable and reliable reference to compare against, even for rare documents. Effortless installation and flexible licencing The flexible licencing options fit almost any use case and cover various verification scenarios Designed with user convenience in mind, Regula’s ID verification software is a turnkey solution that can be installed in three clicks and requires no development time or tech-heavy resources. With extensive documentation and native support for all major frameworks and programming languages, the software integrates seamlessly into existing systems and workflows. The flexible licencing options fit almost any use case and cover various verification scenarios. Streamlined document processing Regula’s ID verification software takes document processing to the next level with its powerful and highly accurate Optical Character Recognition (OCR) technology. The software offers advanced capabilities such as support for parsing names, surnames, addresses, countries, and other key fields. It automatically divides the text into separate fields—for instance, segmenting an address into postal code, state, and country—making the extracted data more organised and actionable. Additionally, the OCR module handles complex date formats and characters from different character sets within a single line, ensuring seamless data interpretation across diverse document types. Future-ready solution As identity verification standards and document formats continue to evolve, Regula stays at the cutting edge of this transformation. Any passport reader will remain comprehensively equipped to perform the most innovative IDV checks Not only is Regula’s IDV software constantly updated, but it also proactively supports new identity document types, security features, and verification methods. For example, with its latest update, Regula ID verification software ensures full support of Digital Travel Credentials (DTCs), a new digital way of presenting and processing travel documents. With this approach, any passport reader will remain comprehensively equipped to perform the most innovative IDV checks. Customisation, and flexibility “By ensuring compatibility with most passport readers on the market, we’re empowering organisations to leverage advanced ID verification software without the need for new hardware investments and drastic changes,” says Ihar Kliashchou, Chief Technology Officer at Regula. "Regula’s software offers forensic-level precision, customisation, and flexibility, as well as compliance with the highest security standards, setting a new benchmark for document authentication."
Nanodems, a pioneer in Physical Security Information Management (PSIM) announced a strategic partnership between TKH Security, a global pioneer in security and parking guidance technologies. TKH Security TKH Security, based in Zoetermeer, the Netherlands, with over 25 years of experience, provides innovative solutions for security, asset & site, and parking guidance management. Operating in over 80 countries with 12 offices worldwide, TKH Security is committed to delivering high-quality, cyber-secure technologies that are designed in-house and manufactured in Europe, with a strong focus on environmental responsibility. Nanodems Corporation Its seamless platform integrates and manages diverse security assets, including CCTV, access control systems Nanodems Corporation, based in Burlington, Massachusetts, specialises in PSIM solutions that enable organisations to streamline operations, mitigate risks, and centralise control of their security ecosystems. Its seamless platform integrates and manages diverse security assets, including CCTV, access control systems, and perimeter intrusion detection systems. Security management This partnership unites TKH Security’s expertise in VMS with Nanodems’ expertise in software solutions, providing a comprehensive and integrated approach to security management. Together, Nanodems aims to deliver innovative, efficient, and secure solutions that meet the evolving needs of organisations worldwide. This integration will provide innovative, efficient, and secure solutions to empower organisations globally.
Matrix, an OEM in Security and Telecom solutions, is excited to announce its participation in the 27th CMDA IT Expo 2025, scheduled for February 10-11 at The Westin, Koregaon Park, Pune. As a premier platform for engaging with vendors, channel partners, and industry stakeholders, the event will showcase Matrix's innovative solutions aimed at enhancing safety, streamlining operations, and enabling seamless communication across critical sectors. Cyber-secured IP video surveillance Matrix is thrilled to unveil its IP Video Surveillance Solutions, meticulously designed to address the security needs of the IT industry, at the CMDA IT Expo 2025. These enterprise-grade solutions empower vendors and channel partners to deliver advanced, cyber-secured surveillance tailored for modern IT infrastructures. Cyber-Secured Surveillance for IT Ecosystems: Matrix network cameras and video management software ensure robust data protection while adhering to global standards like OWASP. This safeguards sensitive IT assets and builds trust through compliance and operational reliability. Advanced Analytics for IT Security: Cutting-edge Video Analytics, including intrusion detection, motion detection, and licence plate recognition, enable enhanced monitoring and threat mitigation across IT facilities. Centralised Monitoring for IT Operations: Matrix’s solutions enable centralised, remote monitoring with real-time alerts via SMS, email, or WhatsApp, ensuring continuous vigilance and swift response to incidents. Visit Matrix at CMDA IT Expo 2025 to discover how its scalable, IT-focused Video Surveillance solutions can help vendors and channel partners enhance safety, optimise operations, and drive growth in the IT sector. Advanced access control solutions Matrix invites vendors and channel partners to explore its Access Control Solutions at CMDA IT Expo 2025, designed to address the dynamic access management needs of the IT sector. Built with scalability and efficiency in mind, these solutions empower businesses to achieve seamless security and streamlined operations. Centralised Multi-Location Access Management: Matrix simplifies access control for IT enterprises with multiple facilities, offering centralised and efficient management tailored to diverse projects handled by system integrators and consultants. Elevator Control for Enhanced Security: Ensure floor-wise access regulation in IT parks and high-rise offices to improve safety and convenience for occupants. Smart Visitor Management: Streamline visitor entry processes with pre-registration, approval workflows, and live tracking, elevating the security protocols in IT environments. Join Matrix at CMDA IT Expo 2025 to discover how its robust and IT-centric access control solutions can help vendors and channel partners deliver unparalleled security and convenience to their clients. Matrix time-attendance solutions Matrix is set to unveil its Time-Attendance Solutions, designed to optimise workforce management in the IT industry, at the CMDA IT Expo 2025. Tailored to meet the needs of system integrators and consultants, these solutions offer robust tools for managing IT enterprise operations with precision and efficiency. Job Processing and Costing for IT Projects: Automate workforce allocation and job tracking to boost productivity and operational efficiency, ensuring seamless project execution. Field Visit Management for IT Teams: Enable real-time reporting and monitoring of field employees, enhancing accountability and optimising workflows across IT operations. Flexible Attendance Management: Provide employees with self-service tools for managing attendance and leave, ensuring a seamless and user-friendly experience. Join Matrix at CMDA IT Expo 2025 to explore how its future-ready Time-Attendance Solutions can empower vendors and channel partners to deliver efficient workforce management tailored for IT enterprises.
Matrix, a provider of enterprise-grade Security and Telecom solutions, is proud to participate as a Gold Sponsor at the prestigious Project Heads, Architects, Consultants, and Conclave (PACC) 2025, hosted by the Fire & Security Association of India (FSAI). The event, set to take place from February 6th to 9th at ITC Grand Chola, is a critical platform for industry pioneers shaping the future of infrastructure, smart buildings, and security ecosystems. PACC 2025 PACC 2025 is a convergence of project heads, architects, security consultants, system integrators, and MEP professionals, all of whom play key roles in designing and implementing secure, efficient, and sustainable infrastructure. As a Gold Sponsor, Matrix will showcase its comprehensive portfolio of Video Surveillance, and Access Control, solutions, designed to help industry professionals integrate future-ready security into their projects from the ground up. Advanced solutions on display For those involved in large-scale commercial, residential, industrial, and government projects, security is no longer just an add-on—it is a fundamental requirement. Matrix’s solutions bridge the gap between architectural design, project execution, and long-term security resilience, ensuring seamless integration without compromising aesthetics, compliance, or efficiency. At PACC 2025, Matrix will demonstrate how its advanced security solutions enable project heads, architects, and consultants to: Ensure Seamless, Multi-Layered Security in Large-Scale Projects – From office towers and manufacturing units to transportation hubs and data centers, Matrix’s security solutions provide centralised control, intelligent monitoring, and scalability. Enhance Building Efficiency with Smart Access Control – Matrix’s Access Control and Time-Attendance solutions help businesses optimise entry management, workforce tracking, and visitor authentication, which is crucial for commercial offices, IT parks, and multi-tenant spaces. Integrate Future-Proof, Scalable Security Architecture – Matrix’s Access Control and Video Surveillance Solutions support the BACnet protocol, ensuring that architects and consultants can easily integrate security systems with BMS (Building Management Systems), HVAC, and Fire Safety for a truly connected, and secure infrastructure. Showcasing Matrix’s key offerings at PACC 2025 Matrix will present its comprehensive Video Surveillance Solutions, featuring 2MP to 8MP Network Cameras Matrix will present its comprehensive Video Surveillance Solutions, featuring 2MP to 8MP Network Cameras in bullet, dome, and turret, and ruggedised enclosures for all kinds of environments. Supporting 4 to 96-channel Network Video Recorders (NVRs) with centralised monitoring and 4K decoding, these solutions cater to enterprises of all sizes. Matrix VMS Matrix VMS enhances surveillance with Intelligent Video Analytics, eMap monitoring, and an intuitive interface, ensuring efficient security management across large-scale projects. Matrix solutions are cyber-secured, and safeguard sensitive surveillance data from unauthorised access, making them ideal for critical infrastructure, smart cities, and high-risk facilities. Integrated security solutions Beyond surveillance, Matrix offers integrated security solutions for Weighbridge Integration, Parking Management, and Perimeter Security, ensuring seamless vehicle monitoring, automated access control, and enhanced perimeter protection. Matrix looks forward to engaging with architects, consultants, and industry pioneers at PACC 2025, exchanging ideas on building secure, future-ready infrastructure. Through live demonstrations and expert interactions, discover how Matrix’s advanced security solutions can seamlessly blend into modern spaces.
Alfred International, a pioneer in smart lock technology and a subsidiary of GHT Door Hardware announces a new integration with Universal Remote Control (URC), a global pioneer in smart automation and control solutions. This partnership leverages the Z-Wave® protocol to deliver seamless connectivity between Alfred smart locks and URC’s Total Control® system, providing integrators and end users with advanced, unified access and security management. URC TRF-ZW10 The integration allows URC dealers to incorporate all Z-Wave-enabled Alfred smart locks into URC Total Control installations with ease by using URC software, offering homeowners streamlined control over access points as part of a holistic smart home or building automation system. The URC TRF-ZW10 acts as the central Z-Wave hub, allowing devices like Alfred’s smart locks to communicate with Total Control for automated locking, remote monitoring, and seamless scene integration. The result is an elevated experience that prioritises security, convenience, and peace of mind. Smart access and security “Connected, smart access and security are strategic priorities for URC, so our integration with Alfred smart locks, via Z-Wave protocol, is very important to our dealer community,” stated Lars Granoe, URC’s VP of Product. “We look to expand our relationship with Alfred to deliver simple, fast integration for our dealers and peace of mind for home and commercial building owners.” Simplicity and reliability This integration delivers a scalable solution for modern environments, offering enhanced security The collaboration emphasises simplicity and reliability, enabling seamless operation across residential and commercial spaces. By combining Alfred’s sleek, technologically advanced smart locks with URC’s robust automation platform, this integration delivers a scalable solution for modern environments, offering enhanced security and automation possibilities. ZWLR connectivity and wireless charging Alfred’s Z-Wave compatible smart locks, including the DB2S and ML2 models, provide a range of advanced features such as Z-Wave Long Range (ZWLR) connectivity and wireless charging capabilities. These locks integrate with the TRF-ZW10 gateway by using URC software, ensuring reliable communication and responsive control within the Total Control ecosystem. Innovative and connected living solutions “We’re excited to partner with URC to provide a best-in-class integration experience,” said Brad Cook, Head of Product Integration at Alfred International. “This collaboration reflects Alfred’s commitment to enabling secure, innovative, and connected living solutions through partnerships with industry leaders like URC, and we look forward to enabling deeper integrations with URC in the future.”
Iris ID, a global pioneer in iris recognition technology since 1997 has secured a significant new partnership with the Texas Department of Public Safety (TDPS), to add over two hundred more Iris ID iCAM TD100A units to their Livescan systems. This further cements the growing popularity and efficacy of iris recognition technology for law enforcement, criminal justice agencies, and their partners. As a biometric, iris recognition is deemed the most accurate modality over either fingerprint or facial recognition, and is second only to DNA. Iris ID iCAM TD100A units The TDPS is responsible for protecting its 30 million residents, the states’ critical infrastructures, and over 1,254 miles of international border with Mexico. The threats that the DPS monitors require constant vigilance and the most up-to-date and efficient technologies. Faced with limited resources and a growing criminal contingent, this technology is poised to assist law enforcement and state agencies with protecting citizens and property, while providing local and state law enforcement and criminal justice agencies with around-the-clock access to mission-critical information systems, like the Next Generation Identification Iris Service (NGI). 1-N identification This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification In 2014, Iris ID began the (NGI), a pilot program with Border Patrol and the FBI, which gave law enforcement and government agencies access to the largest repository of iris biometric data associated with fingerprint and face images. This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification - speeding the intake and matching process of detainees. NGI platform In 2020, the FBI officially rolled out the NGI platform. Since 2020, the repository has been growing at a rate of 100k+ new identities monthly. There are currently about 675 law enforcement locations in the US contributing to NGI Iris Service from 250 agencies and we expect to see that number continue to grow. Department of Homeland Security (DHS), Border Patrol has over 2000 workstations installed enrolling to NGI every day. Iris recognition As a tool to aid law enforcement and criminal justice agencies, iris recognition is useful in scenarios that require fast, accurate, and non-contact identification. Use cases include intake and release, work release, transportation, mobile identification, border security, and investigative searches.
Leveraging its decades-long expertise in identity verification, Regula has made its advanced document verification software fully compatible with a wide range of third-party ID scanners and passport readers available on the market. Border control checkpoints, hotels, banks, medical organisations, and other institutions can take advantage of the most robust, forensic-level automated document verification and authentication regardless of the devices they are currently using. ID verification software Regula’s ID verification software is an on-premises solution, which means it works offline and keeps sensitive ID data secure. It seamlessly integrates with leading passport readers and can be fully customised depending on the device model and its functional capabilities. This not only ensures quick migration to a robust identity verification (IDV) core solution but also allows businesses and government agencies to maximise the potential of their existing hardware investments. Forensic-level document verification Regula’s software supports authenticity checks in various illumination modes, such as white, UV, IR Regula’s ID verification software for document readers offers the most comprehensive set of ID authenticity checks. It automatically reads, analyses, and cross-compares data from multiple sources, including RFID chips, machine-readable zones (MRZs), barcodes, and visual zones, to ensure they are consistent and not tampered with. Regula’s software also supports authenticity checks in various illumination modes, such as white, ultraviolet (UV), infrared (IR), and coaxial lighting. Plus, the solution allows checking holograms and other optically variable devices and inks. Global ID support The software comes with the market’s most comprehensive identity document template database, which Regula owns and maintains. It currently contains over 14,800 ID templates from 251 countries and territories and keeps growing. Also, the database enables the recognition of 138 languages and a great variety of scripts. Regula Information Reference System Optionally, the software can be integrated with the Regula Information Reference System, a unique digital collection of detailed images and descriptions of identity and vehicle documents, as well as banknotes and coins. Covering every country and territory in the world, the Regula Information Reference System contains over 337,000 high-resolution images of documents and their security features captured in different light sources. Thus, the system provides an indispensable and reliable reference to compare against, even for rare documents. Effortless installation and flexible licencing The flexible licencing options fit almost any use case and cover various verification scenarios Designed with user convenience in mind, Regula’s ID verification software is a turnkey solution that can be installed in three clicks and requires no development time or tech-heavy resources. With extensive documentation and native support for all major frameworks and programming languages, the software integrates seamlessly into existing systems and workflows. The flexible licencing options fit almost any use case and cover various verification scenarios. Streamlined document processing Regula’s ID verification software takes document processing to the next level with its powerful and highly accurate Optical Character Recognition (OCR) technology. The software offers advanced capabilities such as support for parsing names, surnames, addresses, countries, and other key fields. It automatically divides the text into separate fields—for instance, segmenting an address into postal code, state, and country—making the extracted data more organised and actionable. Additionally, the OCR module handles complex date formats and characters from different character sets within a single line, ensuring seamless data interpretation across diverse document types. Future-ready solution As identity verification standards and document formats continue to evolve, Regula stays at the cutting edge of this transformation. Any passport reader will remain comprehensively equipped to perform the most innovative IDV checks Not only is Regula’s IDV software constantly updated, but it also proactively supports new identity document types, security features, and verification methods. For example, with its latest update, Regula ID verification software ensures full support of Digital Travel Credentials (DTCs), a new digital way of presenting and processing travel documents. With this approach, any passport reader will remain comprehensively equipped to perform the most innovative IDV checks. Customisation, and flexibility “By ensuring compatibility with most passport readers on the market, we’re empowering organisations to leverage advanced ID verification software without the need for new hardware investments and drastic changes,” says Ihar Kliashchou, Chief Technology Officer at Regula. "Regula’s software offers forensic-level precision, customisation, and flexibility, as well as compliance with the highest security standards, setting a new benchmark for document authentication."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
Security beat
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and school uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate and school security environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
Case studies
CCOM Global Technologies, experts in managing video surveillance on cruise liners is leveraging Pimloc’s Secure Redact privacy platform, the world’s pioneering automated video redaction AI software solution, to ensure the privacy of uninvolved individuals when disclosing footage to third parties or in response to subpoenas. The security challenges onboard cruise ships – effectively small towns with up to 5,000 ‘residents’ are huge, and Secure Redact has proven to be highly effective in maintaining passenger privacy during video surveillance. Automatic blurring Secure Redact’ automatically blurs personal and sensitive data in captured and live security videos. This enables organisations such as CCOM Global Technologies to quickly and responsibly handle footage from CCTV by protecting and redacting personal data, such as faces and automatically redacting and anonymising the information 200 times faster than traditional video editing services. Secure Redact platform The technology can be deployed selectively, removing some or all faces or other identifying information Pimloc has developed world-pioneering AI solutions, trained to perform on real-world security footage, through its Secure Redact platform to protect personal data in images and video automatically. The technology can be deployed selectively, removing some or all faces or other identifying information. As a result, video clips that have been selectively anonymised with Secure Redact can be supplied externally, while staying compliant with data privacy laws and regulations. Privacy, safety, and security “When we are looking at security challenges, we have thousands of people that we need to keep safe and secure, maintaining their well-being,” says Daniel Ginat, Director of Technology at CCOM Global Technologies. “It's a small town, or a Vegas scale of the hotel, with hundreds and hundreds of CCTV cameras. Privacy, as well as security, is key, and Secure Redact helps us to deal with security issues for our clients, while effectively keeping bystanders and other innocents out of the picture.” Advanced features After comparing other solutions, CCOM Global Technologies chose Pimloc’s Secure Redact privacy platform for its advanced features and fair pricing, making it the ideal choice. But it wasn't only the features and value that secured the contract with CCOM Global Technologies; communication was also key. “From the start, we felt like the team at Pimloc was very knowledgeable of the system,” Ginat adds. “They could show us exactly all of the features and how to use them. This level of expertise, combined with the platform's capabilities, made Secure Redact the clear choice for us to partner with.” Face detections Secure Redact creates the final redacted video for download by blurring all the detected personal data Secure Redact automatically processes and ingests any uploaded video from CCOM GlobalTechnologies’ CCTV footage onboard ship, before reformatting it and running machine learning algorithms over each frame to detect all faces. These detections are then marked for redaction as orange boxes on the video and are only viewable by CCOM Global Technologies operatives, who review the results before Secure Redact creates the final redacted video for download by blurring all the detected personal data, ready for export and delivery to their cruise liner client. Data privacy compliance requirements “We’re delighted to be helping CCOM Global Technologies to maintain privacy during cruise ship video surveillance,” says Pimloc CEO Simon Randall. “Secure Redact meets international data privacy compliance requirements when dealing with personal data in images and video files, and it is the fastest solution on the market. We’re enabling cruise liners to supply video clips externally to employees, customers, or even corporate insurance companies, law enforcement, and lawyers while staying compliant with data privacy laws and regulations.”
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
Nestled in the scenic countryside near Umberleigh, Northcote Manor Country House Hotel & Spa combines award-winning accommodation, fine dining, and a tranquil spa. This 18th-century country house is devoted to providing elegance and security for its guests. Partnering with local locksmith experts, Keyhole Surgery upgraded its security management by installing a Mul-T-Lock MTL™300 master key suite. MTL™300 master key system Mul-T-Lock’s MTL™300 master key system offers ideal security for Northcote Manor’s 16 guest rooms. The suite enhances safety across the hotel, giving management precise control over key access while ensuring guests' peace of mind. Richie Herkes, General Manager of Northcote Manor Country House Hotel & Spa, commented, “At our beautiful Georgian manor, dating back to Tudor times, we’re committed to providing our guests with a serene and secure environment. We trusted David to deliver an upgrade to our room security’s existing system that could accommodate." Additional security layer With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure "He recommended the Mul-T-Lock MTL™300 master key suite as a secure yet discreet access management across all rooms and common areas, improving our operations without compromising style.” With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure, ensuring only those with the appropriate permissions can enter restricted room areas at any given time. The capability to manage multiple permission levels adds a critical layer of security, minimising unauthorised access and enhancing operational efficiency. Easy installation improves overall management David Pearcy of Keyhole Surgery explained why the MTL™300 was the ideal choice for the upgrade, “For a distinguished property like Northcote Manor, it was essential to implement a high-security solution that wouldn’t interfere with the building’s stunning historic appeal." "The Mul-T-Lock MTL™300 suite provides the right balance with a cylinder design that is easy to install on existing doors. The master key system allows staff to access essential areas quickly and efficiently, reducing the need for multiple keys and improving overall management.” Secure and flexible access management system The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor, while maintaining a secure, flexible, and efficient access management system specifically designed to give authorised personnel-controlled access to the hotel’s rooms and facilities. Ian Thresher, Mul-T-Lock regional sales manager for the South-West, shared his thoughts on the partnership, “Northcote Manor’s decision to work with Keyhole Surgery as an established Mul-T-Lock authorised dealer and to implement the MTL™300 master key suite reflects a forward-thinking approach to hospitality security." Precise security management "MTL™300 offers an elegant, streamlined solution that aligns perfectly with the hotel’s dedication to both guest comfort and operational excellence." "By reducing key clutter and enabling precise security management, this system helps Northcote Manor retain its renowned beauty and charm safely for many, many years to come.”
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, announces that the Northeastern School District (NESD) in York County, Pennsylvania has adopted ZeroEyes' AI gun detection and intelligent situational analysis solution. This proactive step will help protect students, staff, and visitors from gun-related threats. The cutting-edge security system identifies firearms in real-time and delivers actionable intelligence to first responders. Extensive security cameras Gun-related violence continues to be a pressing issue in the United States. Data from the ZeroEyes Gun Violence Research Center shows that 35.9% of shootings analysed in Pennsylvania occurred on K-12 school campuses. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts NESD’s existing security measures include two full-time school resource officers and extensive security cameras. Additionally, the district is transitioning to electronic key card access for all doors, replacing traditional hard keys, and is reviewing remote lockdown capabilities and mass internal notification systems. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts. Mass internal notification systems "A colleague introduced us to ZeroEyes, and we were immediately impressed by the potential of their AI gun detection technology," said Dr. Jason Bottiglieri, Superintendent of NESD. "When we learned about the Pennsylvania Commission on Crime and Delinquency (PCCD) grant, which focuses on enhancing school safety in Central Pennsylvania, we saw an opportunity to bring this critical solution to our district.” NESD is a midsized, suburban public school district located in the South Central region of Pennsylvania. NESD comprises eight buildings, including four elementary schools, two intermediate schools, one middle school, and one high school. The district serves over 4,000 students and employs approximately 300 teachers and 500-600 staff members. Law enforcement veterans If these experts determine the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. Cutting-edge technology "It’s inspiring to see schools like NESD take decisive action to enhance campus security,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thrilled to support their mission to protect students, faculty, and staff. Our collaboration reflects a shared commitment to leveraging cutting-edge technology to help mitigate potential tragedies and save lives."
CCOM Global Technologies, experts in managing video surveillance on cruise liners is leveraging Pimloc’s Secure Redact privacy platform, the world’s pioneering automated video redaction AI software solution, to ensure the privacy of uninvolved individuals when disclosing footage to third parties or in response to subpoenas. The security challenges onboard cruise ships – effectively small towns with up to 5,000 ‘residents’ are huge, and Secure Redact has proven to be highly effective in maintaining passenger privacy during video surveillance. Automatic blurring Secure Redact’ automatically blurs personal and sensitive data in captured and live security videos. This enables organisations such as CCOM Global Technologies to quickly and responsibly handle footage from CCTV by protecting and redacting personal data, such as faces and automatically redacting and anonymising the information 200 times faster than traditional video editing services. Secure Redact platform The technology can be deployed selectively, removing some or all faces or other identifying information Pimloc has developed world-pioneering AI solutions, trained to perform on real-world security footage, through its Secure Redact platform to protect personal data in images and video automatically. The technology can be deployed selectively, removing some or all faces or other identifying information. As a result, video clips that have been selectively anonymised with Secure Redact can be supplied externally, while staying compliant with data privacy laws and regulations. Privacy, safety, and security “When we are looking at security challenges, we have thousands of people that we need to keep safe and secure, maintaining their well-being,” says Daniel Ginat, Director of Technology at CCOM Global Technologies. “It's a small town, or a Vegas scale of the hotel, with hundreds and hundreds of CCTV cameras. Privacy, as well as security, is key, and Secure Redact helps us to deal with security issues for our clients, while effectively keeping bystanders and other innocents out of the picture.” Advanced features After comparing other solutions, CCOM Global Technologies chose Pimloc’s Secure Redact privacy platform for its advanced features and fair pricing, making it the ideal choice. But it wasn't only the features and value that secured the contract with CCOM Global Technologies; communication was also key. “From the start, we felt like the team at Pimloc was very knowledgeable of the system,” Ginat adds. “They could show us exactly all of the features and how to use them. This level of expertise, combined with the platform's capabilities, made Secure Redact the clear choice for us to partner with.” Face detections Secure Redact creates the final redacted video for download by blurring all the detected personal data Secure Redact automatically processes and ingests any uploaded video from CCOM GlobalTechnologies’ CCTV footage onboard ship, before reformatting it and running machine learning algorithms over each frame to detect all faces. These detections are then marked for redaction as orange boxes on the video and are only viewable by CCOM Global Technologies operatives, who review the results before Secure Redact creates the final redacted video for download by blurring all the detected personal data, ready for export and delivery to their cruise liner client. Data privacy compliance requirements “We’re delighted to be helping CCOM Global Technologies to maintain privacy during cruise ship video surveillance,” says Pimloc CEO Simon Randall. “Secure Redact meets international data privacy compliance requirements when dealing with personal data in images and video files, and it is the fastest solution on the market. We’re enabling cruise liners to supply video clips externally to employees, customers, or even corporate insurance companies, law enforcement, and lawyers while staying compliant with data privacy laws and regulations.”
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
Nestled in the scenic countryside near Umberleigh, Northcote Manor Country House Hotel & Spa combines award-winning accommodation, fine dining, and a tranquil spa. This 18th-century country house is devoted to providing elegance and security for its guests. Partnering with local locksmith experts, Keyhole Surgery upgraded its security management by installing a Mul-T-Lock MTL™300 master key suite. MTL™300 master key system Mul-T-Lock’s MTL™300 master key system offers ideal security for Northcote Manor’s 16 guest rooms. The suite enhances safety across the hotel, giving management precise control over key access while ensuring guests' peace of mind. Richie Herkes, General Manager of Northcote Manor Country House Hotel & Spa, commented, “At our beautiful Georgian manor, dating back to Tudor times, we’re committed to providing our guests with a serene and secure environment. We trusted David to deliver an upgrade to our room security’s existing system that could accommodate." Additional security layer With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure "He recommended the Mul-T-Lock MTL™300 master key suite as a secure yet discreet access management across all rooms and common areas, improving our operations without compromising style.” With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure, ensuring only those with the appropriate permissions can enter restricted room areas at any given time. The capability to manage multiple permission levels adds a critical layer of security, minimising unauthorised access and enhancing operational efficiency. Easy installation improves overall management David Pearcy of Keyhole Surgery explained why the MTL™300 was the ideal choice for the upgrade, “For a distinguished property like Northcote Manor, it was essential to implement a high-security solution that wouldn’t interfere with the building’s stunning historic appeal." "The Mul-T-Lock MTL™300 suite provides the right balance with a cylinder design that is easy to install on existing doors. The master key system allows staff to access essential areas quickly and efficiently, reducing the need for multiple keys and improving overall management.” Secure and flexible access management system The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor, while maintaining a secure, flexible, and efficient access management system specifically designed to give authorised personnel-controlled access to the hotel’s rooms and facilities. Ian Thresher, Mul-T-Lock regional sales manager for the South-West, shared his thoughts on the partnership, “Northcote Manor’s decision to work with Keyhole Surgery as an established Mul-T-Lock authorised dealer and to implement the MTL™300 master key suite reflects a forward-thinking approach to hospitality security." Precise security management "MTL™300 offers an elegant, streamlined solution that aligns perfectly with the hotel’s dedication to both guest comfort and operational excellence." "By reducing key clutter and enabling precise security management, this system helps Northcote Manor retain its renowned beauty and charm safely for many, many years to come.”
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, announces that the Northeastern School District (NESD) in York County, Pennsylvania has adopted ZeroEyes' AI gun detection and intelligent situational analysis solution. This proactive step will help protect students, staff, and visitors from gun-related threats. The cutting-edge security system identifies firearms in real-time and delivers actionable intelligence to first responders. Extensive security cameras Gun-related violence continues to be a pressing issue in the United States. Data from the ZeroEyes Gun Violence Research Center shows that 35.9% of shootings analysed in Pennsylvania occurred on K-12 school campuses. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts NESD’s existing security measures include two full-time school resource officers and extensive security cameras. Additionally, the district is transitioning to electronic key card access for all doors, replacing traditional hard keys, and is reviewing remote lockdown capabilities and mass internal notification systems. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts. Mass internal notification systems "A colleague introduced us to ZeroEyes, and we were immediately impressed by the potential of their AI gun detection technology," said Dr. Jason Bottiglieri, Superintendent of NESD. "When we learned about the Pennsylvania Commission on Crime and Delinquency (PCCD) grant, which focuses on enhancing school safety in Central Pennsylvania, we saw an opportunity to bring this critical solution to our district.” NESD is a midsized, suburban public school district located in the South Central region of Pennsylvania. NESD comprises eight buildings, including four elementary schools, two intermediate schools, one middle school, and one high school. The district serves over 4,000 students and employs approximately 300 teachers and 500-600 staff members. Law enforcement veterans If these experts determine the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. Cutting-edge technology "It’s inspiring to see schools like NESD take decisive action to enhance campus security,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thrilled to support their mission to protect students, faculty, and staff. Our collaboration reflects a shared commitment to leveraging cutting-edge technology to help mitigate potential tragedies and save lives."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
White papers
![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Total cost of ownership for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/tco-headersecurity-informed-sizes-920-x-533-px.png)
Total cost of ownership for video surveillance
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download![5 surprising findings from OT vulnerability assessments](https://www.sourcesecurity.com/img/white-papers/612/920x533_1715779296.png)
5 surprising findings from OT vulnerability assessments
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![Precision and intelligence: LiDAR's role in modern security ecosystems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713973583.png)
Precision and intelligence: LiDAR's role in modern security ecosystems
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![Palm vein recognition](https://www.sourcesecurity.com/img/white-papers/612/920x533_1730899753.jpg)
Palm vein recognition
Download![Physical access control](https://www.sourcesecurity.com/img/white-papers/612/920x533_1729871143.png)
Physical access control
Download![The 2024 state of physical access trend report](https://www.sourcesecurity.com/img/white-papers/612/920x533_1727192888.jpg)
The 2024 state of physical access trend report
Download![The security challenges of data centers](https://www.sourcesecurity.com/img/white-papers/612/920x533_1724854634.jpg)
The security challenges of data centers
Download![Security practices for hotels](https://www.sourcesecurity.com/img/white-papers/612/920x533_1723114696.png)
Security practices for hotels
Download![Access control system planning phase 2](https://www.sourcesecurity.com/img/white-papers/612/920x533_1722432285.jpg)
Access control system planning phase 2
Download![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Total cost of ownership for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/tco-headersecurity-informed-sizes-920-x-533-px.png)
Total cost of ownership for video surveillance
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download![5 surprising findings from OT vulnerability assessments](https://www.sourcesecurity.com/img/white-papers/612/920x533_1715779296.png)
5 surprising findings from OT vulnerability assessments
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![Precision and intelligence: LiDAR's role in modern security ecosystems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713973583.png)
Precision and intelligence: LiDAR's role in modern security ecosystems
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![Palm vein recognition](https://www.sourcesecurity.com/img/white-papers/612/920x533_1730899753.jpg)
Palm vein recognition
Download![Physical access control](https://www.sourcesecurity.com/img/white-papers/612/920x533_1729871143.png)
Physical access control
Download![The 2024 state of physical access trend report](https://www.sourcesecurity.com/img/white-papers/612/920x533_1727192888.jpg)
The 2024 state of physical access trend report
Download![The security challenges of data centers](https://www.sourcesecurity.com/img/white-papers/612/920x533_1724854634.jpg)
The security challenges of data centers
Download![Security practices for hotels](https://www.sourcesecurity.com/img/white-papers/612/920x533_1723114696.png)
Security practices for hotels
Download![Access control system planning phase 2](https://www.sourcesecurity.com/img/white-papers/612/920x533_1722432285.jpg)
Access control system planning phase 2
Download![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download