Genetec, Inc. - Experts & Thought Leaders
White papers from Genetec, Inc.
How to migrate to an IP-based access control system
DownloadReducing the cost of video surveillance system deployment and operation
DownloadUnify Your Security Communications with Access Control, Video Surveillance, and ALPR
DownloadThree simple ways to optimise your bandwidth management in video surveillance
DownloadConsiderations and best practices for migrating to an IP-based access control system
DownloadHow to create a successful physical security roadmap
DownloadHow to implement a physical security strategy with privacy in mind
DownloadCybersecurity in the physical security world
DownloadCreating a secure and positive healthcare experience
DownloadUnified physical security
DownloadHow to migrate to an IP-based access control system
DownloadReducing the cost of video surveillance system deployment and operation
DownloadUnify Your Security Communications with Access Control, Video Surveillance, and ALPR
DownloadThree simple ways to optimise your bandwidth management in video surveillance
DownloadConsiderations and best practices for migrating to an IP-based access control system
DownloadHow to create a successful physical security roadmap
DownloadHow to implement a physical security strategy with privacy in mind
DownloadCybersecurity in the physical security world
DownloadCreating a secure and positive healthcare experience
DownloadUnified physical security
DownloadLatest Genetec, Inc. news & announcements
The Groupama Stadium — also known as the Grand Stade de Lyon— is a sports and recreation complex and soccer stadium that is located in the eastern metropolitan area of Lyon, France. With a maximum capacity of 59,186 seats, the venue hosts approximately 30 events per year such as sports games, concerts, and performances. The stadium is the third-largest stadium in France and the twenty-seventh in Europe. Situated in a town with only 25,000 residents, the stadium hosts twice as many spectators at its events. Efficiently managing crowds Under the leadership of Xavier Pierrot, Stadium Manager at Groupama Stadium, the team pays particular attention to the safety and well-being of community members as well as business owners, fans, players, journalists and staff. Their mission is to ensure the highest levels of safety while maintaining impeccable service. The stadium’s security team wanted a security system that would help them efficiently to manage crowds To achieve these goals, the stadium’s security team wanted a security system that would help them efficiently manage crowds and ensure the safest experience for guests. The stadium also needed an effective security system to help them identify threats and pull evidence for law enforcement agencies following any incidents. Groupama Stadium entrusted the IT and security solutions selection to Orange Business Services, who recommended the Genetec™ Security Center with the Omnicast™ video surveillance solution. Unified security platform Security Center is the unified security platform that combines video surveillance, access control and licence plate recognition systems into one intuitive solution. Prosegur, a specialist in security solutions integration, handled the system installation. The Omnicast video surveillance system met the complex’s specifications and budget. The security system is both reliable and easy to use for operators who can act quickly and discreetly in the event of an incident. “We followed the theme park model. Why? Quite simply because security is of the utmost importance but it must not be intrusive or become a source of anxiety. For families with children that are attending games, for example, this experience must be one of leisure. So, we needed a solid and reliable system. The Security Center platform had all the requirements to ensure the surveillance of the stadium in this particular context,” explained Xavier Pierrot. Remotely access video Operators use the Omnicast system to monitor over 260 Axis Communications cameras Thanks to the Federation™ feature of Security Center, operators centrally monitor video from all sites in the complex, including the training centre and practice facility. The security team can view live video or remotely access video any time of the day. They can also easily go back and search through archived video, if necessary. Operators use the Omnicast system to monitor over 260 Axis Communications cameras. The system provides coverage of all entrances, concession stands, 7,000 parking spaces and traffic routes around the site. Operators can easily find the cameras using the map interface of Security Center, Plan Manager. The map module provides a comprehensive view of any area of the site in one single click. Video surveillance solution “Since its installation, the Genetec Omnicast video surveillance solution has enabled us to resolve 100% of minor incidents; the vast majority of which were cases of theft or dropping of smoke bombs, and has helped us resolve major incidents that required the involvement of law enforcement,” says Xavier Pierrot. The entire security system is fully redundant, providing the highest levels of protection in this modern complex. All monitoring is now carried out from a central control room at the stadium, helping operators save time In case servers, PCs or power supplies malfunction, the failover and redundancy features of Security Center ensure that the system continues to run smoothly. All monitoring is now carried out from a central control room at the stadium, helping operators save time and become more efficient when responding to events. Teams never have to leave the control room for intervention because all decision makers including law enforcement, the organiser, first responders, firefighters, and security operators have access to the system. Retrieve video recordings With the Security Center Omnicast system, users can easily view video, retrieve video recordings, zoom into precise details, print photos, save specific bookmarks, or manage alarms to secure various zones of the stadium environment and its perimeter. Using the Genetec Software Development Kit (SDK), the team at the POL has been able to integrate the IP video system with another third-party system to facilitate the transfer of evidence. The integration allows for secure gateways to be set up with certain public partners such as the police headquarters or the Interior Ministry, enabling the transfer of information during large-scale events such as Euro 2016. Facial recognition system Groupama Stadium would like to integrate a facial recognition system within the unified platform In accordance with privacy laws, and as a next step, Groupama Stadium would like to integrate a facial recognition system within the unified platform, so its team can automatically be alerted to banned persons as they enter the stadium. “Since Security Center is flexible and scalable, we plan to continue evolving the platform and taking full advantage of its potential in order to better protect our guests, community members, and staff,” concluded Xavier Pierrot. The Omnicast system of Security Center manages 262 Axis Communications network cameras, including various models and a few 360° domes. All seats are monitored by three different cameras, two fixed and one dome to ensure several viewpoints. The cameras record continuously.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorised access onto the airfield, either runways or where aircrafts are being loaded or refuelled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fibre optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilise OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fibre optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fibre technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent tracking and event categorisation This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorisation, making it a very precise security system for airports.
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defence system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor centre. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
Insights & Opinions from thought leaders at Genetec, Inc.
If recent physical security events are a guide, the topic of artificial intelligence (AI) will be everywhere at the upcoming ISC West 2025 exhibition in Las Vegas. Cybersecurity solutions are another core focus at today's physical security events, and ISC West will likely follow the trend. Attendees will also be looking for advancements in access control systems, including biometric technologies and integrated security platforms, among other hot topics. We asked our Expert Panel Roundtable: What will be the big topics of discussion at ISC West 2025?
Technology advances in the security industry are transforming the way modern systems are designed and installed. Customers today are looking for greater scalability and flexibility, lower up-front costs, and operational efficiency. Cloud-based software as a service (SaaS) solutions, AI-enhanced tools, and IoT-enabled sensors and devices are increasingly in demand. The traditional role of the systems integrator is evolving as a result. While security integrators have always worked closely with end users, today’s pioneers go beyond installation and maintenance. They align security strategies with evolving business needs, integrating IT, cybersecurity, and data-driven insights into their offerings. A look at the past and present Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity Traditionally, systems integrators specialised in installing and maintaining wired physical security systems like CCTV, access control, and alarms. The service model was built around large, up-front investments and project-based installations. However, today customers are seeking comprehensive solutions. They’re looking to wirelessly integrate security infrastructure with cloud-based SaaS systems and IoT devices. While modern systems are often faster to deploy, they’re most effective when supported by ongoing consulting and strategic planning. Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity. Data requirements and modern systems Data requirements have also changed. Modern systems collect vast amounts of data. Advanced analytics, machine learning, and automation are now must-have tools for actionable insights. Security integrators can help end users set up custom dashboards, automations, and continuous system optimisation. Let’s look at some of the specific ways the role of systems integrators is evolving and how to adapt and succeed. Strengthen your IT expertise Integrators with IT expertise can ensure that hardware is optimised and maintained for peak performance The competitive landscape today includes not just security specialists but also IT-focused integrators and SaaS providers. Systems integrators with expertise in traditional physical security solutions plus IT experience offer unique value. They understand the real-world security challenges and opportunities, along with cybersecurity and network best practices. Integrators with IT expertise can also ensure that hardware is optimised and maintained for peak performance. Their experience with legacy systems allows them to offer practical recommendations on cost-effective approaches, such as upgrading or integrating older hardware with new digital solutions. Consider who’s making the purchase decisions Traditionally, security integrators primarily sold to security directors, facility managers, and operations teams. Now, multiple stakeholders may be involved in decision-making. IT teams, CIOs, and CTOs often weigh in on purchase decisions when cloud-based security and SaaS solutions are under consideration. Customers today aren’t just shopping for cameras, access control panels, alarms, and other hardware components. They’re looking for security ecosystems that can integrate with enterprise-wide IT infrastructure and business applications. When working with these different teams, consider outlining the system's return on investment (ROI). How can the solution reduce risk for various departments? Can it help improve operational efficiency or reduce the time required to onboard and train staff? Will it make regulatory compliance easier to manage? Focus on the long-term value for the entire organisation. Take a consultative approach Another way systems integrators are adding value is by offering vertical specialisation Installation fees remain important for many integrators, but there may be additional consultative opportunities to build long-term relationships with customers. Offer services such as roadmap planning, hardware and integration maintenance, training to certify end users on the manufacturer’s product, and cybersecurity services. While cloud-based solutions reduce on-premises maintenance, they don’t eliminate the need for ongoing support and training. Consider offering training opportunities. These can lead to other benefits as well. Better-educated and technically proficient customers are usually more willing to adopt new technologies. They understand the value of these investments and have more confidence that they’ll see results. Another way systems integrators are adding value is by offering vertical specialisation. Healthcare, sports venues, critical infrastructure, education, retail - each specialty has its own set of challenges, partner networks, regulatory restrictions, training needs, and business requirements. Integrators who specialise are uniquely positioned to offer key sector-specific insights that are invaluable to their clients. Embrace the cloud A key growth area for integrators is supporting customers in their shift to cloud deployments. Cloud solutions aren’t a one-size-fits-all solution. Each organisation is evaluating options and deciding whether cloud, hybrid, or fully on-prem solutions are the right fit for its unique needs. A key growth area for integrators is helping clients in their shift to cloud deployments Helping customers navigate and adopt cloud or hybrid solutions opens new opportunities to expand your business and deepen your relationship with your customers. Systems integrators who sell cloud solutions have the opportunity to add new layers to services for more value for customers. With a cloud solution that's easy and fast to deploy and managed and maintained by the provider, you can reduce overhead costs, staff training, and truck rolls via remote customer support. These benefits also allow you to spend time developing greater expertise in your customers’ processes. Using this knowledge, you can tailor your services towards potential productivity gains for your customers and turn them into additional sales. You ensure that your customers get the most out of the technology that’s available and that they have already purchased. Highlight your focus on cybersecurity Cybersecurity is no longer solely an IT department's responsibility. While dedicated IT security teams may still handle broader network defense, integrators play a crucial role in securing access control, surveillance, and IoT devices within a security framework. If unsecured, these devices can provide an entry point for cyber criminals to gain access to an organisation’s network. Cybersecurity is no longer solely an IT department's responsibility To best protect end users from cyberattacks, choose physical security systems with built-in security and privacy-by-design features. Help customers implement best practices to ensure their entire ecosystem is designed, built, and managed with end-to-end security in mind. Once implemented, work with your manufacturers, consultants, and end users to ensure that vulnerabilities are identified and mitigated. Every person on the network plays a role in keeping cyber threats at bay. Lean into the power of partnerships In today’s complex and dynamic security landscape, choosing the right technology partners is crucial. Ask potential partners to share their technology roadmap, and how you can offer feedback or participate in discussions about industry trends. Ideally, your partners will have a program in place to get input from integrators and end users, so they can develop products that are designed to address their most pressing issues and concerns. Your manufacturer partners should be working to help identify the evolving needs of customers and communicate these insights to systems integrators. Seek partners who actively support integrators to understand how security is evolving In addition to a good experience for the end user, strong manufacturer partners also offer solutions to streamline and automate workflows for integrators. It should be easy to order and check your shipping statuses online, for example. These are simple things that save you time and demonstrate your partner’s care for your business. Seek partners who actively support integrators to understand how security is evolving. While training is often offered on-site, some companies are now also offering blended learning models so integrators and their technicians can reduce classroom time and stay out in the field. Evolution is an opportunity Security integrators with traditional physical security expertise remain indispensable because they understand real-world risks and regulatory requirements. They can provide hands-on system deployment and optimisation. Now, there are new opportunities to build long term customer relationships. As the physical security industry undergoes this profound shift, adaptation is key. By embracing cloud and hybrid solutions, integrators can unlock new revenue streams, enhance customer relationships, and stay ahead of technological advancements. With the right partnerships and a forward-thinking mindset, systems integrators can navigate this transformation and take advantage of new opportunities being presented by evolving technology. Leverage your deep industry experience while upskilling in cloud, cybersecurity, and IT. The strongest approach is for end users, systems integrators, IT specialists, and manufacturers to work together to navigate industry changes.
Technology innovations and an evolving threat landscape will be core factors impacting the physical security market in 2025. Technology elements such as artificial intelligence (AI), multi-factor access control, and mobile devices will continue to drive growth in the greater industry. We asked our Expert Panel Roundtable: What is the outlook for the physical security industry in the year ahead?
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadSecurity practices for hotels
Download2025 Trends in video surveillance
DownloadMaximising security and performance
DownloadGenetec's Synergis Master Controller (SMC) - an intelligent IP door controller
Genetec showcased latest advances in IP license plate recognition, video surveillance and access control technology at ASIS 2012
Security Center Mobile - Instant information at the touch of a button