Industrial & commercial security applications
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to e...
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirement...
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed towar...
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering and Ocean Outdoor have completed five joint projects together. Follow-up appointments for the next two projects are already scheduled. "Let's see what happens," was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. “We have to. So much is changing and new technology is develo...
The Honourable Society of Lincoln’s Inn is one of the four Inns of Court and operates as an active and thriving society of lawyers, sprawling across 11 acres in central London and dating as far back as 1422. The title of “Lincoln’s Inn” refers both to the Society and the location, which houses the Society’s facilities, numerous barristers’ chambers, and several solicitors’ offices. Inns of Court The Inns of Court originally provided accommodation for...
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyse video...
News
Sweden-based AP&T supplies production solutions to manufacturers worldwide, including automation, presses, furnace systems, and tooling, for the manufacturing of press-hardened vehicle parts for the automotive industry. Car manufacturers are using lighter sheet materials, such as aluminium and thinner steel, to form robust parts for car body frames. When pressed, these lighter materials still produce a strong body frame meeting required safety standards without adding unnecessary weight to a car’s build which can drain both fuel and battery life. Measure and monitor sheet materials AP&T needed a solution to measure and monitor sheet materials before and after pressing. It is necessary to guarantee even heat distribution from the furnace before the sheets are pressed, the exact placement of the sheets, and to ensure that there are no hot spots after the sheets were cooled in the press tool. If any of these three conditions is not met, the required mechanical properties of the safety-relevant components will not be reached. This causes rejected parts, wasted materials, and additional manufacturing time. Also, the press tool itself might be damaged. The IPHA System - Thermal imaging for non-contact temperature monitoring To save car manufacturers time and money by preventing defect-pressed parts, AP&T reached out to Swedish thermal imaging integrator Termisk. Termisk designed an Infrared Press Hardening Analysis (IPHA) vision system that can measure the three main factors affecting sheet pressing quality: temperature before and after pressing, and sheet placement in the press. Using Teledyne FLIR thermal imaging cameras mounted to the sides of press machines, the IPHA system measures the temperature of metal sheets using the Teledyne FLIR A70 smart sensor camera (previously A315) or Teledyne FLIR A615 camera depending on the required image quality. Accurately measuring heat distribution on shaped metal sheets The IPHA system features a Teledyne FLIR thermal imaging camera on each side of the press with wide-angle lenses. The setup ensures the temperature is measured accurately for the whole surface area of the 3D-shaped sheet material. The process is automated, so once pieces are inside the press, the press-line controller system signals to IPHA to take an image and analyse it. Once the positioning and temperature are determined as ok, a signal is sent back to the press line to proceed. High-resolution thermal images Similarly, it then measures the sheet temperature and inspects heat distribution after pressing, after the shaped part is cooled. Unless there are any issues or alarms raised, there is minimal interference needed from an operator. The high-resolution thermal images make it quick and easy to identify hot spots and measure the areas where the material has not reached the correct temperatures. The system makes tool pressing and changeovers quick and simple too. The software allows manufacturers to pre-set temperature analysis parameters for the different pressing tools used. This allows the IPHA system to re-configure quickly during changeovers. Accurate and flexible thermal imaging solutions Teledyne FLIR’s A70 image streaming camera is ideal for advanced condition monitoring. In this case, the Teledyne FLIR A70 is capable of monitoring the temperature and heat distribution on steel sheets, even with raised parts, using non-contact temperature sensors. The wide-area monitoring capabilities of the A70 cameras mean that two cameras: one on each side of the press is enough to monitor the large steel sheets. The cameras will alert operators to any issues so they can investigate and rectify them immediately to prevent wasted materials and additional production time. Teledyne FLIR A615 camera For sites that require higher thermal imaging quality, the Teledyne FLIR A615 camera is a powerful alternative to the A70 in IPHA. Offering the same non-contact temperature measurement, the A615 provides higher accuracy and can detect temperature differences even at long distances. Termisk has implemented at least 40 IPHA systems for pressed part manufacturer AP&T worldwide. The thermal imaging solution can be installed on new lines or retrofitted to existing lines.
Over the years, Dahua has continuously invested in the development and innovation of Full-colour technology to solve the monitoring challenges brought by low illumination. In 2018, the company launched the Starlight and Starlight+ technologies which enable cameras to effectively capture colour details in low-light environments. 24/7 colour monitoring Focusing on further improving low-light monitoring, Dahua officially released the Full-colour concept in 2020, realising 24/7 colour monitoring by introducing F1.0 super aperture, 1/1.8 '' high-performance sensor for large targets, and Dahua’s self-developed ISP 4.0 technology. The colour information of key targets in the scene can be captured even at night, which can be used as evidence in case of an investigation or backtracking. Dahua Full colour 2.0 technology Dahua TechMonth showcases some of the integrations of Full-colour technology for customers and end users In 2021, the company continued to upgrade its technology and launched the Dahua Full colour 2.0 technology. It further expanded the Full-colour “family” and integrated 4K, panoramic, zoom, and other technologies to facilitate the development of high-end products, provide a more comprehensive product system, and enhance low-light surveillance. To elaborate more about this remarkable technology, Dahua TechMonth showcases some of the integrations of Full-colour technology that create more business value for customers and end users. Recap of solutions Following is a short recap of these amazing solutions: Full-colour + TiOC The TiOC (three-in-one camera) has 3 main features: Smart Dual Illuminators, Active Deterrence, and AI. It can effectively warn off intruders with active deterrence, and notify users in time with real-time alarm, providing pro-active video surveillance to properties that require 24/7 security. TiOC utilises Full-colour technology to capture colour footage in dark scenarios. Also, its smart exposure technology realises time-sharing control and prevents the interference of flashing red & blue light in the image. To see TiOC in action, check out this video. Full-colour + Panoramic The Dahua Full-colour Dual Lens 180° Panoramic PTZ & IPC devices are equipped with dual sensors that deliver a 180-degree field of view. After the right and left lenses to capture an image, the camera calculates the feature values of the left and right images to avoid warping and pixel loss using standardised image correction technology. The Dahua advanced pixel-level metadata fusion algorithm then enables seamless splicing of the image, resulting in a seamless 180° wide-angle image. Panoramic IPC The Panoramic IPC offers EPTZ that provides a panoramic image of the scene, as well as sub-images that focus on specific areas or targets. For the panoramic PTZ camera, both panoramic and detailed views support AI functions and can be independently deployed in different directions to cover wider areas. Full-colour + ZOOM The motorised varifocal lens of the upgraded Dahua Full-colour 2.0 network cameras has approx. 5x optical zoom capability and auto-focus function, providing clear colour details of the monitored scene even after zooming in. With its long-distance illumination capability, the camera can also capture a clear full-coluor image even from far distances. Full-colour + 4K The Dahua Full-colour 4K camera delivers enhanced colour images and surveillance footage 24/7. It adopts a 1/1.2” image sensor (currently Dahua's best low-light IPC sensor) that provides a 110% pixel size increase compared to a common 8MP sensor. Its F1.0 large aperture can capture more available light and the maximum light energy that the sensor can receive is increased by 2 times. Success Case: Schwarze Berge Wildlife Park Located in Rosengarten Germany, the Schwarze Berge (Black Mountains) Wildlife Park covers an area of about 50 hectares. It is home to nearly a thousand of animals from approximately 100 species grazing in Europe. The administration of the park was looking for a comprehensive camera system that can perform many tasks. “We chose Dahua because it customised a complete solution to meet all our needs,” says Arne Vaubel, Managing Director of the Schwarze Berge (Black Mountains) Wildlife Park. Full-colour and thermal imaging In this project, a full series of innovative cameras equipped with key technologies" “In this project, a full series of innovative cameras equipped with key technologies, such as Full-colour and thermal imaging are adopted." "We are glad to see that through our cameras, the park can monitor the living environment and health status of wild animals at any moment without disturbing them, which also helps the park realise efficient operation and management,” explains Kai Wockenfuß, Pre-Sales Support Technical Engineer of Dahua Technology GmbH. Fixed-focal Warm LED Bullet WizMind Network Camera One notable Dahua camera deployed in the park is the 8MP Full-colour Fixed-focal Warm LED Bullet WizMind Network Camera. It is equipped with a high-performance sensor and large aperture lens, enabling it to capture clear colour images when it’s dark or during the night. With its photosensitivity technology, the camera can capture more available light and display more colourful footage of the monitored scene, providing 24/7 monitoring of the wildlife in the park. The future of Dahua Full-colour technology With the success of Dahua Full-colour in the market, what does the future holds for this amazing technology? For starters, minimising white light pollution is at the top of the list. Some cameras with full colour capabilities in the market still use white light, which can affect the human eye and cause severe light pollution in the monitored scene. Touchless Full-colour cameras are one solution that Dahua has been exploring through its multi-spectrum algorithm. The Dahua Multi Spectrum Fusion technology extracts the details and brightness of the visible spectrum and infrared spectrum to make the fusion brightness close to the visible light brightness, which then enables the camera to provide better images. AI integration Another aspect that Dahua is focusing on is the deeper integration of Full-colour with AI Another aspect that Dahua is focusing on is the deeper integration of Full-colour with AI. Full-colour technology is continuously being upgraded, and with that comes more intelligent solutions that can realise clear HD images at night, like it is during day time. The TiOC, for example, combines Full-colour, AI, and Active Deterrence (warning lights and siren) into one comprehensive solution, realising a closed-loop system that involves early warning, active deterrence, and backtracking. It has been recognised by many authoritative organisations in the industry and even received distinctive awards. Intelligent analysis and computing What’s more, with the constant development of this technology can enable Full-colour imaging to be directly applied to intelligent analysis and computing. It will become a mainstream technology that everyone can avail and use to optimise their scenarios, which is in line with Dahua’s mission of “Enabling a safer society, and smarter living.”
More than one million electric vehicles are registered in the U.S.—and they all have to plug in somewhere. As EV charging stations pop up across the country, one of the chief questions will be how charging station users are identified, authenticated, and connected with membership or payment systems. Radio-frequency identification cards and tokens and smartphone authentication apps have emerged as two viable options for EV charging authentication. Which is best? It may depend on the user base they plan to serve. User authentication for EV charging Most electric vehicle owners have a spot to plug in while at home, either in their own garage or carport or in a designated charging spot in a tenant parking garage. But electric vehicles also need spots to charge while owners are out and about. The EV charging market is broadly divided into two tiers: Level 2 charging stations, which operate at 208-240 V and use AC power. These stations will add 20-25 miles of range in about an hour of charging. The U.S. Department of Transportation listed more than 22,800 public Level 2 EV charging stations across the nation as of mid-2020. They are commonly found in public parking lots and garages, hotels, grocery stores, malls, and other commercial areas. They may also be installed in private parking garages and business parking lots for use by tenants, employees or fleet drivers. Collecting membership data Direct Current Fast Chargers (DCFS) are designed to charge an EV battery to about 80% in 20-30 minutes. There are currently about 15,000 DCFC stations across the U.S., but their numbers are expected to explode as more people start taking EVs on longer road trips. They are commonly found along major interstate highways. As the market evolves, user authentication requirements for EV charging stations are likely to vary by type, location, and user base. Some commercial locations may provide Level 2 EV charging as a free amenity to shoppers, guests or employees. If there is no charge for the service, there may be no need to authenticate users at all— people can simply park and plug at any available spot. However, there may be a benefit to collecting membership data (e.g., shopper reward club). Private charging stations Public, for-profit EV charging stations, like gas stations, need a method to collect payment for their services. In some cases (especially at roadside DCFS stations), users may simply pay for the minutes used with a credit card—just like at the gas station pump. However, many EV charging station users are already accustomed to identifying themselves with an RFID membership card or a smartphone app. Charging networks like ChargePoint and Blink enable members to access any EV charging station within their networks with a card or smartphone app, which connects to their membership, account, and payment information. Private charging stations—such as those offered to tenants, employees or fleet drivers—may not require payment but need to ensure that only authorised drivers are accessing power and taking up valuable parking spots. An RFID card or smartphone app can be used to identify authorised drivers and track charging behaviours. Moving forward, many EV charging stations may find that they need a mix of options for users, including membership cards, smartphone apps, and a credit card payment option for out-of-network drivers. Choosing between RFID and smartphone apps In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue When user identification and authentication are desirable, which is the better option: RFID cards or smartphone authentication? Both have their uses in the EV charging market. In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue. And for some users bases, they may not have to issue a new card at all—they can take advantage of an RFID card they already carry. In many cases, it is possible to leverage existing employee IDs and membership cards for access to privately controlled EV charging stations. RFID membership cards may be a good bet for: Fleet drivers who already carry an RFID card for vehicle access. Employee parking lots and garages where people already use a card for entry. EV charging parking spots at gyms or other locations where users want to limit charging access to active members. EV charging stations Most consumers would prefer not to have to carry a physical membership card for every retail outlet On the other hand, public charging stations may find that consumers would prefer to use a smartphone app rather than receive another membership card to carry in a physical wallet. Many consumers prefer to carry only their phone and one or two essential cards (such as a driver’s licence and a single credit or debit card). As more retailers enable consumers to pay via a digital wallet app on their smartphones, some don’t even carry a physical credit card anymore. Most consumers would prefer not to have to carry a physical membership card for every retail outlet they visit—and that includes EV charging stations. Smartphone apps for user authentication are simple to set up and highly secure. Instead of RFID, they typically use either Bluetooth® Low Energy (BLE) or Near-field Communication (NFC) protocols. Public charging stations For the user, the experience is almost identical to RFID authentication, except they wave a smartphone over the reader instead of a card. Apps have other user benefits, too. A custom app for EV charging can be configured to help users locate or reserve charging stations, check their balance and usage history, and change their payment options right on their phone. These features make smartphone authentication ideal for consumers These features make smartphone authentication ideal for consumers accessing a network of public charging stations. However, EV charging network managers should keep in mind that some users may still want a physical membership card. Smartphone-based authentication There are still some user populations, such as older consumers and those from lower income brackets, where smartphone ownership is not ubiquitous. If users are primarily using EV charging for a fleet vehicle, they may not want to download an application for work on their personal cell phone. Other users may find smartphone apps confusing or simply prefer to have a card for other reasons. The answer for both public EV charging networks and private charging station owners is to have an RFID reader that is capable of both card-based and smartphone-based authentication. This will provide maximum flexibility as user preferences change. Finding the right RFID reader for EV charging The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations The best RFID reader for EV charging is one that is flexible enough to meet the needs of all user populations and evolve as requirements change. The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations. The readers support 60+ RFID transponder technologies along with BLE and NFC smartphone authentication. This means that one reader can support all common technologies already in use across the entire user base—both nationally and internationally. This capability becomes important for applications where users want to enable drivers to use an existing RFID card (such as their employee or fleet ID card or an access card for a tenant parking garage) for access to charging locations. It also provides more flexibility as technologies or preferences change in the future. Supporting advanced encryption TWN4 MultiTech supports advanced encryption and security configurations for highly secure transactions between the card or smartphone and the reader. This is important for EV charging applications tied to payment or employee/driver identification. ELATEC readers are mobile-ready. The ELATEC Mobile Badge BLE NFC App offers simple and effective components for building or extending a mobile application for EV charging networks. Non-managed mobile credentialing using the ELATEC app is free. TWN4 MultiTech readers also work with multiple existing third-party managed credential systems, such as KleverKey, Safetrust, and Transact. The TWN4 MultiTech is easy to customise with the powerful Software Development Kit (DevPack) and App Blaster and Director utilities. Readers can be easily configured to support custom functionality (such as LED light flashing sequences or sounds for user feedback) and integration with backend software for easier member management. The DevPack tools make the TWN4 family the most powerful, versatile, and sustainable readers on the market. Hardware communication interfaces As electric vehicles move from niche to mainstream, EV charging infrastructure will need to grow and evolve to accommodate millions more drivers—both in the consumer market and in commercial fleets. With TWN4 MultiTech, EV charging station managers will be ready. Interested in learning more about technical considerations for RFID? Download 11 Considerations for Embedded System RFID Readers for additional advice, including operating power and consumption requirements, antenna placement, hardware communication interfaces, and more.
Integrated security manufacturer, TDSi has unveiled its enhanced, free-of-charge training offering, which includes an updated training facility, enhanced online booking system and a refreshed training syllabus, which focuses on its GARDiS ecosystem range. Jon Hooley, the Technical Support Manager at TDSi, commented “Over the last couple of years, much of our training has had to be conducted remotely online, but with the relaxation of social distancing rules earlier this year, we have had the perfect opportunity to further evolve and enhance our face-to-face training facilities.” Fully refurbished training facilities He adds, “Our fully refurbished and updated training facilities in Poole reflect the latest technology developments, with a firm focus on GARDiS as our flagship range of fully integrated web-enabled systems, their installation and integration with other systems.” With installers and end users upgrading from TDSi’s classic EXgarde security software solution to GARDiS, TDSi is catering for increased demand for further practical training on the flagship range. Along with TDSi’s headquarters in Poole, Dorset, United Kingdom (UK), it also offers training at its partner - Texecom’s state-of-the-art facility, located in Haslingden, Lancashire, in order to provide further choice on where to train geographically in the United Kingdom. With sessions taking place at both locations each month, TDSi’s training is highly flexible to the needs of those taking part. Revamped and fully wireless training room The sessions usually cater for six people to ensure an excellent one-to-one training experience" The revamped and fully wireless training room in Poole has been designed to provide the ideal training environment for TDSi’s Gold and Platinum-accredited partners, as Jon Hooley stated, “The majority of participants are security installers looking to enhance their knowledge and expertise in using TDSi’s integrated security systems.” Jon Hooley adds, “The sessions usually cater for six people to ensure an excellent one-to-one training experience. We do also offer bespoke paid-for options that are particularly well suited to larger groups, bespoke content requirements for end-users for example, along with an additional option of on-premises training if required.” New enhanced online booking system The new enhanced online booking system also makes the process quicker and easier, as Nick Mercer, the Marketing Manager at TDSi, commented “Bookings for the Approved Installer Training Course are now placed through the website and the whole booking process can be done in minutes.” Nick Mercer adds, “Installers registering their place will receive immediate confirmation, along with a digital ticket via email and bookings are easily managed for amends or cancellations. The platform also enables us to expand the training we offer, to include additional remote sessions, such as webinars and online training, in the future.” Well-equipped and dedicated training facility Reflecting upon TDSi’s enhanced training, Jon Hooley concludes, “While online training is invaluable, it can’t completely replace the hands-on experience and benefits of a well-equipped and dedicated training facility, and we are very excited to be welcoming our partners to the new training room.”
The Security Industry Association (SIA) announced a major milestone in its SIA OSDP Verified initiative that over 100 device models have been named OSDP Verified through the comprehensive programme, which validates device conformance to the SIA Open Supervised Device Protocol (OSDP) standard. SIA OSDP standard SIA OSDP standard is an access control communications protocol standard maintained by SIA to improve interoperability, add advanced functionalities, and support AES-128 encryption for security. Already in use by many leading manufacturers, the standard offers compliance with access control installations that require advanced security or are used in government per FIPS 201-3. SIA OSDP Verified list Buyers have the confidence that the products from the SIA OSDP Verified list have been third-party tested and performed Products that are OSDP Verified are displayed in the OSDP Verified Product List and can use the SIA OSDP Verified mark in their product marketing materials. With this milestone, security integrators, specifiers, and practitioners have a wider array of OSDP offerings to recommend, and buyers have the confidence products from the SIA OSDP Verified list have been third-party tested and performed within the requirements of the OSDP standard. Programme expansion “Since its launch in April 2020, the SIA OSDP Verified programme has tested and validated 115 products from 18 brands substantial progress in just a little over two years, highlighting the market need and success of the programme,” said Edison Shen, director of standards and technology at SIA. “The programme has also welcomed three international manufacturers, and we’re seeing growing interest in both domestic and international participation.” Authoritative source The establishment of the SIA OSDP Verified programme was a response to the growing adoption of OSDP in the industry The establishment of the SIA OSDP Verified programme was a response to the growing adoption of OSDP in the industry to provide an authoritative source of OSDP solutions and the market confusion for non-verified claims of product compliance with the OSDP standard. By becoming OSDP Verified and displaying the SIA OSDP Verified mark on their products, access control manufacturers can instill confidence in their customers that their devices have gone through rigorous testing as required by the OSDP standard. Benefits of SIA OSDP Verified Benefits of becoming SIA OSDP Verified include: An authoritative listing of OSDP solutions A consultative process that provides vendors with implementation and remediation guidance A lightweight, non-punitive programme with no annual membership fees Continuous access to open-source testing tools and community feedback that promotes device conformance through the product life cycle
The National Cyber Security Centre (NCSC) and SANS Institute have announced details of the third edition of CyberThreat - a technical and interactive Summit that will be hosted virtually and in person. The event, designed for technical professionals across the cybersecurity industry, will return on September 12th and 13th at the Park Plaza, Westminster Bridge in London, encouraging global knowledge sharing and expertise across defensive and offensive disciplines. CyberThreat Summit CyberThreat will feature keynote speeches on the latest online dangers to organisations and insights from industry spokespeople and cyber practitioners about how to defend against sophisticated cyber attacks. The event will include interactive elements for in-person attendees, such as large-scale Capture the Flags (CTF) and “hackathons” that run over the two days. Hands-on activities There will be a blend of technical talks and hands-on activities, covering both offensive and defensive techniques" As part of the event itinerary, there will be a blend of technical talks and hands-on activities, covering both offensive and defensive techniques, as well as opportunities to network with a wide range of peers. Joining information for registrants can be found on the SANS Institute page. Through a partnership with NCSC, 75 delegate places are available to public sector employees free of charge. New opportunities Paul Chichester, Director of Operations, NCSC said, “CyberThreat is a vital event for our technology community bringing together a broad range of practitioners to develop, challenge, and inspire each other, all with a laser focus on the threats we face and the techniques we can employ to counter them." “While society has pulled together recently, our increased reliance on technology has presented new opportunities to those with malicious intent and added to the challenges we face. I am delighted that we are once again in a position for the NCSC to play its role in this event.” Share and gain new cybersecurity skills The event is designed to address the cyber skills gap and enhance cyber talent by developing new talent" James Lyne, CTO, SANS said, “Cyber Threat provides a unique opportunity for practitioners from both government and the commercial world to share cybersecurity experiences and to acquire new technical skills and knowledge.” “The event is designed to address the cyber skills gap and enhance cyber talent by developing and enthusing both new and existing talent." Combating the threat James continues, “While the last two years have brought significant disruption to the world, technology and technologists have been instrumental in enabling the international response to the pandemic, and reducing the impact on our economies, our businesses, our educators, and our families.” “The threat landscape has continued to grow and evolve, but by sharing cutting edge techniques and new solutions to ongoing problems, we can learn to combat those threats together as a community.”
Expert commentary
A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Integrity of gift card programs While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies. They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are certified to improve the monitoring and analysis of gift card trade patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Latest versions of AI and LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift card revenues, client trust, and label integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams as well as customer trust and brand integrity.
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
Security beat
With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse future trends. Or you could try statistical or economic modelling. Or you could develop multiple scenarios based on various assumptions to explore potential outcomes. Or you could just check your email. At this time of year, my email is full of industry folks looking to predict what the future holds in 2025. Ranging from artificial intelligence (AI) to privacy, the retail market to drones, here is a sampling of forecasts for 2025 provided by various players in the security market, courtesy of my email messages. What’s Ahead for AI? From Faisal Pandit, VP & GM, Global Security Products, Johnson Controls (JCI): “The future of security operations includes customisable, scalable solutions where users can control if, when, and how they use AI to improve efficiency depending on the size and function of their organisation.” Says Kevin Woodworth, Vice President, Global Product Management, Intrusion, JCI: “Next year will see a growing focus from product developers on designing systems that streamline setup and configuration through increased AI integration. This reflects a broader trend of leveraging AI to simplify use and enhance adaptability as solutions evolve, rather simply employing it because it’s popular.” From Peter Evans, CEO of Xtract One Technologies: “AI algorithms will significantly advance in distinguishing between harmless, everyday items and potential threats. With this, we will see false alerts become even more rare.” Says JP Castellanos, Director of Threat Intelligence, Binary Defense: “Machine learning (ML)-powered anomaly detection will move beyond proof-of-concept to become mission-critical, enabling teams to uncover unknown threats and behavioural anomalies in real time – well before they escalate.” Evans of Xtract: “As AI becomes more advanced in threat detection, it will lead to more sophisticated protection of individual privacy. We can expect to see more AI techniques utilised for threat identification that do not capture personal data and are privacy-first.” Predictions on interoperability and compliance Woodworth of JCI: “New products added to singular systems must be interoperable. In 2025, organisations will need to embrace interoperability. AI will progress past reactive measures to achieve predictive capabilities.” Pandit of JCI: “With organisations increasing their focus on the regulatory environment, there will be an uptick in specialised certification programs to meet these needs. New security roles will emerge that will be focused on tracking and applying relevant regulatory changes.” Expanding capabilities for video cameras Woodworth of JCI: “Beyond capturing images, cameras will be able to detect potential threats and also mitigate them instantly, issuing vocal warnings, controlling access, or escalating issues without human intervention.” Looking ahead to retail developments Hansel Oh, Director of Product Marketing at Brivo: “Centralized, cloud-based security platforms will enhance credential management and monitor logistical operations to enable retailers to battle cargo theft.” Stephen Burd, Vice President, Essence Security: “With an increase in police response times, sophisticated crime, and smash and grabs, 2025 will see a huge demand for security solutions that go beyond simply notifying the police and will look to actively intervene and prevent damage or loss from occurring.” The role of drones and training Mary-Lou Smulders, CMO, Dedrone by Axon: “Drones will transition from being viewed as supplementary tools to becoming essential components of public safety operations. As departments recognise their effectiveness in various scenarios, the perception of drones will shift, and they will be integrated into core operational frameworks alongside traditional assets like patrol cars while replacing helicopters as a cost-effective and versatile alternative.” Erik Hohengasser, Electrical Technical Lead at NFPA: “As the skilled trades evolve, there will be an increasing demand for specialised and technical training. Predictive analytics, virtual simulations and hands-on experiential learning will become especially valuable due to allowing employees to gain real-world expertise in safe and controlled environments.”
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Case studies
Makita, one of the world's renowned manufacturers of cordless, electric, and garden tools, has opened a completely new headquarters in Banska Bystrica, Slovakia. At this location, Makita stock and distribute batteries for cordless tools plus run wholesale supply logistics from their warehouse. Single, intuitive system At a facility like this, simplicity and clarity for both security managers and daily site users were essential. They demanded a single, intuitive system to control every access point, currently and in the future. Key requirements A comprehensive range of devices to secure fire/escape doors, entrances, and interior doors. User-friendly software to control and filter employee or visitor access to specific areas of the plant. Easy, cost-efficient installation for both hardware and software elements of the solution. A system able to scale up or down as the facility’s security needs or space usage changes over time. Incedo-enabled devices and door solutions A unified Incedo Business software system manages and monitors everything from a single point The diversity of Incedo-enabled devices and door solutions in ASSA ABLOY Opening Solutions’ award-winning hardware range convinced Makita for this site and for new sites and future refurbishments around Slovakia. The new Makita facility in Banská Bystrica currently has an Incedo system controlling access through 2 main entrances, 2 fire doors, 6 emergency exit doors, and one interior door fitted with an Aperio® wireless electronic escutcheon. A unified Incedo Business software system manages and monitors everything from a single point. Platform-based solution Incedo is a fully modular, platform-based solution incorporating wired and wireless door-locking devices from across the ASSA ABLOY Opening Solutions range; card, token, and secure mobile key credentials which may be used interchangeably; and a growing range of third-party security solutions. So, should security demands change at Banská Bystrica, their Incedo system can adapt. Flexible, future-proof access solution With Incedo software, Makita can switch between local and cloud-managed solutions whenever they choose. System size is scalable up or down, anytime and on demand. Makita Slovakia currently has a totally flexible, future-proof Incedo access solution designed to grow with their business.
In a mountain area in Yunnan Province (China), Dahua Technology safeguards the safe production of a 700+ mu photovoltaic power station, providing intelligent fire prevention and control measures in its vast facilities. The implemented solution significantly increased the accuracy of fire alarms by more than 10 times, as well as the efficiency of fire alarm response by 30%, which help ensure the stable delivery of clean energy to its surrounding areas. Superior lighting conditions The advantageous location of the power station provides superior lighting conditions that yield abundant solar energy generation. Covering an area of over 700 acres, the photovoltaic power station produces over 30 million kWh of green electricity annually for its surrounding area. It is equivalent to saving about 370,000 tons of standard coal and reducing carbon dioxide emissions by over 900,000 tons. Pain Point 1: Long Inspection Time During the fire season in summer, the photovoltaic system areas must also be checked regularly During the first few years of its operation, the power station was only manned by 5 people working deep in the mountain. These hardworking personnel were responsible for the stable operation of more than 30 photovoltaic arrays. Their daily tasks include inspecting the main transformer, GIS, switch room, station transformer, SVG room, and other equipment areas of the power plant, with each inspection usually taking 2-3 hours. During the fire season in summer, the photovoltaic system areas must also be checked regularly. Two inspectors must work at least 5-6 hours a day under the hot sun, taking at least one month to complete the comprehensive inspection. Pain Point 2: Mountainous Terrain The distance between these photovoltaic system areas from the power station is generally dozens of kilometers. It can be reached by driving, but some areas are located on steep hillsides. If the car can't reach them, people can only walk or climb to get there. Even if every area is inspected, potential hazards may not be accurately identified due to the inaccuracy of the previous manual monitoring method. Pain Point 3: Manual Monitoring For fire alarms, the location of the fire point is found based on the understanding of the terrain In the past, local villagers serve as important fire "informants", especially in the photovoltaic system in remote areas. When a fire is found, the villagers immediately notify the personnel on duty. The staff then reports to the centralised control centre first and cooperates with the forest fire personnel to deal with the fire. For fire alarms, the location of the fire point is found based on the understanding of the terrain. The information flow, instructions delay, and manual positioning of the fire point drastically extend the response time. 24/7 remote fire safety inspection & monitoring The fire prevention of photovoltaic power stations requires attention to several aspects, including identifying whether it is a fire in the surrounding forest or a fire on the equipment itself. Failure to accurately detect and respond to this fire emergencies can cause severe damages and loss. Robust system The plant inspection that usually takes 1 month can be completed in less than 10 minutes" Dahua has integrated technology with the inspection mode of the photovoltaic power station to create a robust system that can monitor the fire situation in the power plant and its surrounding areas 24/7 and eliminate unnecessary journeys between mountains during the inspection. The dual-lens cameras installed at high points were configured with cruising paths, enabling them to conduct uninterrupted online inspections of the power plant and display the images through the system. “The plant inspection that usually takes 1 month can be completed in less than 10 minutes. I couldn't even think that it was possible before,” said Mr. Cai, inspector at the power station. Inspection process During the inspection process, algorithms are used to determine whether there is smoke or fire in each area. When a fire is detected, the system will locate the fire source within a range of 3-5 kilometres and find the fire point within 30-50 metres. Improved fire response efficiency by 30% According to Mr. Cai, in addition to eliminating the need for further inspections, improving the efficiency of the overall handling process is another key advantage of this solution. Through integrated communication, the previous reporting and communication methods have been transformed into multi-party terminal equipment discussions. Based on on-site audio and video data, multiple parties can easily communicate and discuss plans and strategies. Real-time information At present, the timely rate of fire alarms in the power plant has increased by over 10 times At the same time, fire alarm information and the fire point location determined by the platform will be sent to relevant personnel in real-time, allowing them to accurately and quickly reach the corresponding location to distinguish the fire. At present, the timely rate of fire alarms in the power plant has increased by over 10 times, and the efficiency of fire alarm response has improved by 30%. Intelligent fire safety solution Fire safety is crucial for production enterprises, especially for photovoltaic power stations. With the advent of technology and innovation, Dahua’s intelligent fire safety solution not only can help protect the power plants and their staff, but also can ensure that thousands of households are provided with green, environmentally friendly, and low-carbon electricity.
Makita, one of the world's major manufacturers of cordless, electric, and garden tools, has opened a completely new headquarters in Banska Bystrica,Slovakia. At this location, Makita stock and distribute batteries for cordless tools plus run wholesale supply logistics from their warehouse. At a facility like this, simplicity and clarity for both security managers and daily site users were essential. They demanded a single, intuitive system to control every access point for current times and in the future. Key requirements A comprehensive range of devices to secure fire/escape doors, entrances, and interior doors. User-friendly software to control and filter employee or visitor access to specific areas of the plant. Easy, cost-efficient installation for both hardware and software elements of the solution. A system able to scale up or down as the facility’s security needs or space usage changes over time. Incendo access solution A unified Incedo Business software system manages and monitors everything from a single point The diversity of Incedo-enabled devices and door solutions in ASSA ABLOY Opening Solutions’ award-winning hardware range convinced Makita for this site and for new sites and future refurbishments around Slovakia. The new Makita facility in Banská Bystrica has an Incedo system controlling access through 2 main entrances, 2 fire doors, 6 emergency exit doors, and one interior door fitted with an Aperio® wireless electronic escutcheon. A unified Incedo Business software system manages and monitors everything from a single point. Modular, platform-based Incedo is a fully modular, platform-based solution incorporating wired and wireless door-locking devices from across the ASSA ABLOY Opening Solutions range; card, token, and secure mobile key credentials which may be used interchangeably; and a growing range of third-party security solutions. So, should security demands change at Banská Bystrica, their Incedo system can adapt. Flexible and future-proof With Incedo software, Makita can switch between local and cloud-managed solutions whenever they choose. System size is scalable up or down, anytime and on demand. Makita Slovakia has a totally flexible, future-proof Incedo access solution designed to grow with their business.
In 2020, the forest areas in Dali Prefecture, Yunnan Province were reported to have reached 1.855 million hectares, ranking among the top in the country. In addition to absorbing carbon dioxide, conserving water sources, and maintaining water and soil, these ancient forests also shelter a large number of rare wild animals and plants. These natural wonders are a risk if a forest fire breaks out, causing drastic damage and endangering the inhabitants of the forest. Wireless transmission systems Since 2020, Dahua has been assisting Dali Prefecture in building front-end systems and installing wireless transmission systems in key protected zones as well as areas prone to forest fires. More than 500 cases of illegal use of fire in the wild and 7 cases of forest fires have been detected since then. 24/7 real-time monitoring Dali Prefecture's forest coverage rate reached 65.51% in 2020. Twenty-eight nature reserves of various types and levels were established throughout the prefecture, with a total area of 181,000 hectares. The vast forest constitutes an ecological security barrier, but its massive area makes it difficult to monitor forest fires. "Burning straws, cooking fires, etc. are all common wildfires, but even seemingly insignificant areas can become the source of forest fires," a local forest ranger said. Visible light and thermal imaging technology The dual-spectrum thermal imaging cameras deployed in the forest enable the fire prevention video monitoring system Multiple round-the-clock patrol points were set up to monitor and observe the surrounding forest areas 24/7, with 3 people in each shift (changes every three days). The mountains are high and the slopes are steep, and sometimes thorns are everywhere, especially at night. Nevertheless, with the help of modern technology, these diligent forest rangers always persevere in accomplishing their tasks and duties. The dual-spectrum thermal imaging cameras deployed in the forest enable the fire prevention video monitoring system to complete an automatic cruising round in just 15 minutes. Based on visible light and thermal imaging technology, it can detect a fire source of about 2 square metres within a range of 5-10 kilometers. Accurate multi-dimensional positioning of fire source Flammable coniferous trees such as Yunnan pine and Huashan pine are widely spread in the forest areas of Dali Prefecture. Large-scale and high-intensity forest fires could start in these areas in a short period. In case of a sudden fire, quickly locating the source of the fire can add more significant time for firefighting. Smart fire detection system Technologies such as dual-spectrum video monitoring, intelligent image analysis and recognition, and three-dimensional positioning enable the smart system to detect a fire, quickly locate the fire source and automatically send an alarm to on-duty personnel. In forests with hundreds of hectares (or even thousands of hectares), the source of the fire can be accurately located within 50 metres, allowing the firefighting team to quickly reach the location and providing more time to control the fire. The efficient investigation, assessment, and handling of the fire situation Extinguishing forest fires requires the full cooperation of the frontline and the command centre. The command centre quickly communicates with the frontline about firefighting strategies based on the actual fire situation. But how can they understand the situation at the scene if they are far away? It enables operators to check and assess the situation in time, and quickly deal with the fire This particular job is handed over to the visual forest fire prevention video monitoring system. This smart security system synchronously displays real-time images in the monitoring centre, combined with other corresponding data such as space, time, fire type, etc. It enables operators to check and assess the situation in time, and quickly deal with the fire according to the corresponding plan. Full coverage of network transmission in forest areas Considering its vast areas, transmitting valuable information from the forest could be a daunting task. "The mountain area is large and widely spread. Sometimes, there’s even no mobile phone signal. To allow the command centre to see the scene in time, we also built a wireless transmission with front-end equipment." "The smart system covers all the video points in the forest and sends forest fire information back to the command centre in real-time," a Dahua technical engineer explained. Early detection, reporting, and handling The forest fire prevention video monitoring system that Dahua helped build in Dali Prefecture offers wide-coverage, all-weather, high-precision, and intelligent 24/7 monitoring that can automatically detect fire and locate its source in time. Early detection, reporting, and handling of the fire situation using digital intelligence can effectively safeguard the safety of these local ecological barriers. With abundant experience in developing smart fire prevention systems, Dahua will continue to innovate and create technological breakthroughs to protect the environment and natural resources.
A manufacturing facility is a tough testing ground for any access control solution. By their nature, premises usually require multiple types of locks, including a range of cylinder types and sizes, as well as padlocks. They often need locks that work both inside and outdoors. For this reason, many manufacturing plants retain outdated mechanical locking solutions, sacrificing the added control of an electronic solution. Programmable key solution criteria The right programmable key solution offers a flexible, powerful alternative. Key-based access control retains many advantages of mechanical security, notably the range of cylinders that manufacturing facilities need. It supplements this with added convenience for users: Instead of wasting time looking for the right key, or carrying large bunches, a user’s electronic key is programmed to unlock every opening for which they have authorisation, doors, and cabinets, indoors or outside. RheinfelsQuellen H. Hövelmann This beverage group has been run by the Hövelmann family since 1905 and is in its fourth generation Headquartered in Duisburg, RheinfelsQuellen H. Hövelmann is a family-owned company with a long history. This beverage group has been run by the Hövelmann family since 1905 and is currently in its fourth generation. Its product range includes nationally distributed brands Sinalco, Aquintéll, and Staatl. Fachingen, as well as others distributed within North Rhine-Westphalia such as Rheinfels Quelle, Römerwall, Burgwallbronn, Ardey Quelle, Urquell, and Rheinperle. Challenge A company like RheinfelsQuellen is always on the move: New divisions are established, employees relocate or processes change. Suppliers, contractors, and the company’s own 650 personnel come and go. This means that access authorisations must change regularly. At the same time, areas and locations to be protected require different security levels, and access control devices need reliable weather resistance in outdoor areas. All-in-one solution For its Duisburg HQ and other locations around North Rhine–Westphalia, RheinfelsQuellen opted for an eCLIQ key-operated electronic access control system. In addition to administrative buildings, production facilities, and outdoor areas are also secured with around 530 eCLIQ devices. eCLIQ Cylinders offer a high level of protection against tampering and intelligent attacks ASSA ABLOY’s eCLIQ is a fully electronic version of the CLIQ® programmable key access control solution. Cylinders offer a high level of protection against tampering and intelligent attacks. All eCLIQ keys are extremely robust, with a waterproof casing and thus meet the high demands placed on outdoor access control by challenging environmental conditions. CLIQ Web Manager This key-based access control system is managed independently by the CLIQ Web Manager (CWM), a flexible, easily scalable, cloud-based platform. System data may be accessed at any time, and from any location, via the CWM interface. The software's flexibility makes it especially suited to large access systems and/or for administering multiple locations which are geographically dispersed. “We are very satisfied with eCLIQ and would choose this secure and flexible locking solution time and time again,” says Marcus Schlötels, Project Manager at RheinfelsQuellen H. Hövelmann.
Finland’s Osuuskauppa PeeÄssä retail co-operative, a nationwide S-Group co-operative federation member, has deployed March Networks video surveillance systems across its footprint of 73 retail and service establishments. The co-op boasts 121,000 customer-owners in Finland’s Northern Savonia region, whose capital and largest city, Kuopio, is 384 kilometres north of Helsinki. The 73 retail and service locations include three Prisma Hypermarkets, 29 S-Market grocery stores, 15 convenience stores, 15 restaurants, six ABC gas stations, three hotels, a SOKOS department store, and a Kodin Terra hardware store. March Networks video surveillance systems The rollout began in September 2019 and currently includes 85 March Networks recorders, a mix of 8000 Series Hybrid NVRs and 9000 Series IP Recorders, and more than 1,500 March Networks cameras. A new hotel and supermarket currently under construction will bring the camera count close to 2,000. “We used to have several different video surveillance systems and 10 different camera models from six manufacturers,” said Kimmo Keränen, IT Manager for PeeÄssä retail co-operative. “Maintenance was almost impossible and the picture quality in some cases was very poor.” Time management challenge Central management was a key feature for PeeÄssä retail while looking for in its new surveillance system “On top of that, there was no synchronised timekeeping, so one system could be five minutes off and another one could be an hour off. That was a real problem because correct timekeeping is everything when you’re looking for evidence.” For this reason, central management was a key feature PeeÄssä retail co-operative was looking for in its new surveillance system. “A majority of the 19 S-Group regional co-ops were already using March Networks systems, so the decision was easy to make,” said Jan Österlund, ICT Manager with SafeIT, a systems integrator and March Networks Certified Solution Provider serving the S-Group and PeeÄssä accounts. Central monitoring and management With more than 1,000 NVRs and tens of thousands of cameras across the larger S-Group co-ops, central management is a huge timesaver. Österlund can push out firmware upgrades and device settings with a few simple mouse clicks using March Networks Command Enterprise Software. The advanced system management software is ideal for managing large distributed video surveillance architecture. Its health monitoring and mass management capabilities make it easy to look after thousands of recorders and cameras from one central location. “We can schedule upgrades by location type and opening hours to minimise any interference with recording during business hours,” explained Osterlund. Recorders and cameras in use The 8000 and 9000 Series recorders are 32-channel or 64-channel devices with either 20 TB or 40 TB of onboard storage, sufficient to capture 30 days of archived video. The majority of the 1,500 cameras are March Networks SE2 Indoor and Outdoor IR Domes, but SE2 IR MicroBullets, SE2 Pendant PTZ Domes, and legacy analogue cameras are also used for specific applications. Searchlight software integration Searchlight helps organisations gather business intelligence, which can help retailers with customer service S-Group is transitioning to a new point-of-sale system and has plans to integrate it with March Networks’ Searchlight for Retail software, which will allow the co-ops, including PeeÄssä, to identify suspicious transactions and instantly link to the associated video. Searchlight also helps organisations gather business intelligence, which can help retailers with operations, marketing, and customer service. “We are looking forward to acquiring the Brickstream 3D Gen2 sensors for queue management and people counting, and March Networks ME6 IR Domes for AI-powered analytics,” said Keränen. GDPR Compliance The March Networks system in place at PeeÄssä complies with the European Union’s General Data Protection Regulation (GDPR), which came into effect in 2018 and aims to protect the personal data and privacy of EU citizens. System features like privacy masks, which allow users to block out specific parts of a camera’s field of view, are important for meeting the regulation. “GDPR compliance is one of the reasons why we recommended March Networks,” said Österlund. Video access, training, and monitoring Video is currently monitored by guards in three control rooms, but managers also have access to live and recorded video from their locations. Altogether, approximately 100 PeeÄssä staff have access to the video. “Training everyone to use the system was very easy,” remarked Österlund. “The March Networks system is very user-friendly, so we supplied step-by-step instructions on how to log in, pick a camera, play the video, and export it.” Crime management Video is regularly used to supply evidence for shoplifting and internal fraud investigations Video is regularly used to supply evidence for shoplifting and internal fraud investigations, but the much-improved video quality from the March Networks system was also welcomed by local law enforcement. The Eastern Finland Police Department has mapped the location of PeeÄssä’s publicly facing cameras in the National Police Board’s database of surveillance cameras to help access video for criminal investigation purposes. “Almost every week, we are asked for video from the police department,” said Keränen. Installation, time, and cost savings SafeIT’s experience with the March Networks deployments at other S-Group co-ops helped to streamline the installation at PeeÄssä. “We supplied local integrators with clear guidance on how to set up the cameras and NVRs,” said Österlund. Standardising on March Networks allows the PeeÄssä co-op to save time and reduce costs for system maintenance. The state-of-the-art video surveillance system is also much easier to use. “We are very satisfied with March Networks,” said Keränen. “It was a big project, but well worth doing.”
Products
Round table discussion
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security end user asks: How trustworthy are integrators and/or manufacturers?
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download