Milestone Systems - Experts & Thought Leaders
White papers from Milestone Systems
Essential data security strategies for healthcare
DownloadVideo technology strategies for hospitals are moving beyond security
DownloadSafeguard Students With New Techniques And Technology
DownloadLevelling up with campus safety
DownloadAssessing safety readiness for education campuses
DownloadThe future of healthcare security is connectivity
DownloadImproving city mobility using connected video technology
DownloadVideo technology: making cities safer & improving lives
DownloadCharting the path to safe cities
Download14 success stories about how video technology is improving city life
DownloadLatest Milestone Systems news & announcements
With 1,300 cameras recording 24/7 and more than 1,000 investigations to process per year, Massachusetts General Hospital’s security team was not able to keep up with the vast amounts of recorded video. Now, BriefCam Syndex Pro for fast video review, search and analysis, embedded within a Milestone XProtect video management software (VMS) platform is making efficient and effective video investigation possible. Unique challenges to security Massachusetts General Hospital’s (MGH) Police, Security and Outside Services Department provides some security services to many other Partners hospitals and facilities. Following its recent digital conversion, unified on the Milestone XProtect VMS platform, MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly to the existing IP network. The hospital environment presents unique challenges to security, Michelman points out “The number of investigations we were doing was taking huge amounts of time in terms of reviewing video, and that was really a waste of time,” said Bonnie Michelman, MGH Executive Director of Police, Security and Outside Services and Consultant for Partners Healthcare. The hospital environment presents unique challenges to security, Michelman points out. MGH’s 17-acre urban campus, comprising 29 contiguous and 14 separate buildings (including underground and freestanding garage facilities), is complex. The security team must also take into account not only the main location, but also dozens of satellite facilities around the Boston area. Enterprise risk management “We can’t cover all of these facilities with security staff,” said Michelman. “We need to augment heavily with very good, state-of-the-art technology that allows us to combine our intelligence, labour, policies and procedures, in order to create a better holistic approach to enterprise risk management.” Charged with creating a safe environment, MGH’s security team at the same time is challenged by the clinical team’s needs for increased efficiency through lowering length of stay and moving patients through the hospital as quickly as possible. The 24-hour Emergency Room, with its anxious, highly volatile population presents challenges of its own. In addition, patient elopement and patient wandering – unauthorised departures from the medical facility, whether intentional or unintentional – pose liability threats that can be very damaging to a hospital. Providing customer satisfaction A unified system was required to balance the video surveillance needs of a busy hospital campus A unified system was required to balance the video surveillance needs of a busy hospital campus with remote satellite locations while upholding the highest level of security possible, maintaining operational flow, and providing customer satisfaction that includes expectations of privacy. Michelman, together with MGH Senior Manager, Systems and Technology Robert Leahy, decided on the Milestone XProtect VMS platform. Camera count was increased from 400 to 1,300, and standardised with Axis network cameras connected directly to the IP network. To deal with the marked increase in video data, MGH’s team chose BriefCam Syndex Pro, a powerful set of tools intended to reduce the time and effort needed to conduct video reviews, post-event video investigation and real-time video monitoring. The BriefCam solution ties in seamlessly with the Milestone video management solution, providing efficient workflow for investigators. Presenting video metadata According to Michelman, BriefCam has already proven invaluable. A two year long ROI examination of video surveillance use at MGH has shown a progressive rise in success rates with the use of video in incident investigations. According to Michelman, BriefCam has already proven invaluable “I see BriefCam as a very important part of our toolbox of excellent practices for protecting what is a very complex environment of tangible and intangible assets,” said Michelman. BriefCam Syndex Pro’s ability to present video metadata in graphic visualisation format, such as bar graphs, pie charts and the like, has opened up new realms of possibilities to extend the role of CCTV video beyond security into organisational efficiency and more informed, data-driven decision making. Better investigative focus “In the past, there might have been things that would have been a ‘nice to do,’ but we couldn’t do it because we didn’t have resources to watch many hours of video,” said Michelman. “Now we can manage the content and we can see trends, which in turn can drive redeployment of resources, and by extension, facilitate a better investigative focus and success.” BriefCam Syndex Pro embedded within Milestone XProtect VMS platform is helping MGH in its mission to effectively and efficiently protect and safeguard the hospital community. Michelman said: “We’re happy with these products, but it’s not just about the quality of the technology, it’s about the quality of the partnership. You know, it’s easy to sell a product, but to sustain it, service it, and be there after it is in is really very critical for us.”
Being isolated on the edge of wilderness means there’s a need for a video system that’s both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC) since 2009 has relied on video management software (VMS) from Milestone Systems to enhance security, safety, and efficiency. Challenge - Help to keep scaling At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times, and Milestone XProtect has supported the airport’s needs along the way. As of 2020, over 220 cameras were in use, and the airport shows no signs of slowing down As of 2020, over 220 cameras were in use, and the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash and expanded parking facilities. XProtect’s open platform software As the need to increase security continues, XProtect’s open platform software will continue to enable both IT team growth and the seamless integration of new cameras and data storage capabilities. Solution - Integrations are in the fly zone Milestone XProtect Professional Plus and Smart Client Network cameras from Axis Communications and Panasonic Optimised video server hardware from Razberi Integrated video analytics from Agent Vi All video is stored for up to a full year, with most of the system’s 200 cameras set for motion recording, 24/7. Result - Greater situational awareness for higher security The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport has to contend with a great deal of plane de-icing for several months each year. This occurs at a distance from the main buildings and, thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing clients to monitor progress on their own has saved airport staff time and resources. The airport uses the system to closely monitor the security checkpoint, too, capturing video documentation in case of an incident. Baggage areas are also monitored, so it’s possible to investigate lost bags and left-behind items by reviewing video. New 4K, multi-sensor cameras New 4K, multi-sensor cameras support a largely unmanned investigatory system New 4K, multi-sensor cameras support a largely unmanned investigatory system. They capture everything and provide enough data to zoom in after the fact, if needed. Additionally, the team has deployed video analytics from Agent Vi to provide a layer of automated alarms and notifications for flagging abnormal occurrences. Video analytics can detect events, such as travelers moving against the foot traffic flow and crossing into restricted areas. Milestone’s XProtect Smart Client Milestone’s XProtect Smart Client has shifted general situational awareness in the airport, as a new standard for authorising users’ remote access to the surveillance from multiple locations. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive overview of activity. The ongoing use of Milestone Systems’ video management software (VMS) makes it possible to maintain the independence and efficiency of a small team of personnel, thereby delivering maximum security at the base of the Grand Teton Mountains. Situational awareness for the JAC team and their clients Andrew Wells, the IT Manager for the Jackson Hole Airport (JAC), said “Situational awareness for our team and our clients allows us to be as secure and efficient as possible with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport (JAC) lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in USA. It is unique for being entirely within Grand Teton National Park. It is the busiest airport in the US state of Wyoming, with nearly 500,000 in-bound passengers annually. The airport covers over 500 acres and has one runway that supports 11 hard-stands, nine boarding gates and three baggage carousels.
The Commonwealth of Puerto Rico needed to implement a centralised and efficient perimeter security system for all public schools on the island. Intrusions and assaults at educational institutions have increased, and Hurricane Maria further exacerbated problems with the destruction of infrastructure. The solution: The need to repair hurricane damage also provided opportunities to invest in modern improvements. The Department of Education chose to install a video surveillance system with more than 10,000 cameras, speakers, and other security devices in 856 schools. In the same way, a centralised control centre was established using the Corporate version of Milestone Systems XProtect® video management software (VMS). Devices installed Milestone Systems: XProtect VMS Software XProtect Smart Client Milestone Interconnect Cameras from Axis Communications and Uniview DH-Vision Seneca Servers and Optex Sensors The advantages: Audiovisual material captured by the system helps agencies to evaluate and manage areas for public use Endowed with the same annual budget that allowed the monitoring of 250 institutions, the new system enabled the Puerto Rico Department of Education to cover all 856 public schools. Since the system has been operational, there has been a 97% reduction in intrusions within educational institutions. In addition to protecting the educational programme, the audiovisual material captured by the system helps other government agencies to evaluate and manage areas for public use and investigate incidents. Need for a centralised security system Ensuring a safe environment is a growing challenge for schools and colleges: theft, fights, and bullying are some of the problems that not only affect students, but also teachers, employees, and, ultimately, the government entities that subsidize the educational system. In Puerto Rico, for example, the Department of Education was concerned about the increase in unauthorised intrusions, robberies, and assaults within its schools. This index shot up after Hurricane Maria destroyed much of the island’s infrastructure in 2017. Even before this natural phenomenon, there was no centralised security system that integrated an overview of all schools. There were disparate installations of video surveillance equipment (cameras, alarms, and lighting) but only in approximately 250 of the schools. Centralised command centre González said, the proposal was born to begin the process to acquire a video surveillance system for public schools After the hurricane, top priority was given to providing perimeter security for all schools through an effective centralised command centre instead of investing in the repair and purchase of separate systems. “The hurricane damaged the island’s communication and lighting systems, a circumstance that promoted intrusions into schools and increased vandalism. We had no visibility of what was happening and we could not find a way to avoid these escalations,” said César González Cordero, Security Commissioner for the Puerto Rico Department of Education. He adds, “However, we could not afford to buy and repair equipment individually for all schools, so a centralised and coordinated effort was necessary.” Based on this context, González said, the proposal was born to begin the process to acquire a video surveillance system for public schools in Puerto Rico, focused on perimeter security. Perimeter security for all schools Genesis Security Services, Inc. of Puerto Rico was selected to develop the perimeter security project for the 856 public schools on the island. This Puerto Rican corporation was founded in 1997 in Yabucoa, Puerto Rico by brothers Roberto and Emilio Morales, who are leaders in security services at the government level. “We have been providing security to the Department of Education for more than 15 years through our onsite guard service. That is why we knew the design, location, assets, and vulnerabilities of various educational establishments. This was a great advantage when executing the project,” said Yasel Morales, Technology Director at Genesis. Video system Milestone XProtect video management software supports more than 8,500 security and surveillance devices In October 2018, the installation of cameras and other devices began in all schools. The video system mission control was built inside the Genesis Central Station, located in the Carolina municipality (in the island's northeast region). Video data from all schools are returned to Central Station, where it is managed with the Milestone Systems XProtect Corporate open platform VMS. Leveraging the power of the open platform, Milestone XProtect video management software supports more than 8,500 security and surveillance devices, and more than 450 software integrations from more than 3,500 technology partners. NVRs, DVRs and cloud solutions Alliance partners include providers of network video cameras, cloud solutions, DVRs and NVRs, servers and storage equipment, alarm and detection systems, video analytics, GPS technology, laser and radar scanners, boxes of emergency calls, and more. “At the Central Station, we have fifteen workstations, with the same number of operators per shift. There we have a videowall of ten monitors distributed between the stations. Likewise, we have two dispatch centers that serve as backup: one in the municipality of Yauco and the other in the municipality of San Juan,” Morales explained. Uniview DH-Vision 4-megapixel cameras, audio speakers As part of the project, approximately 10,000 Uniview DH-Vision 4-megapixel cameras were installed in 856 schools (an average of 12 cameras per campus). Audio speakers from Axis Communications and a range of Optex sensors also were integrated. The combination of these technologies made it possible for every school to have an anti-intrusions system with its alerts feeding back to the Central Station. XProtect Express+, Milestone Interconnect Milestone Interconnect connects remote sites for a low-cost video surveillance solution Each campus has a Seneca brand server with the XProtect Express+ software installed. This communicates with the Corporate version at the Central Station through Milestone Interconnect™, a licensing platform that opens a communication channel between different hardware that normally cannot communicate with each other. Milestone Interconnect connects remote sites for a low-cost video surveillance solution. It is the ideal surveillance for a wide variety of industries that want an inexpensive way to get centralised supervision of multiple locations spread across one region. Remote management and monitoring With Milestone Interconnect, engineers and managers can easily monitor critical and remote areas from one central location. This means faster intrusion management because operators in the central system can access the video and receive alarms from remotely connected sites. This reduces the need to have local security personnel, maintenance, operation, and other costs, including visits onsite. Virtual gates Genesis created virtual gates using cameras that, in addition to protecting school spaces, also ensure the safety of substations and solar panels, which are considered important assets for institutions. If someone crosses the virtual gate, an alert is generated locally and passed to the Central Station through Interconnect. Operators then make a visual confirmation and, if applicable, the emergency protocol is activated. “The emergency protocol is to contact the Security Commissioner and the Department of Operations. For this liaison, we internally designate an inspector. Once informed, they activate the security officers at the sites, who are trained to give quick responses and inform the police,” said Morales. Identifying suspicious activities Due to the management software, Genesis can easily find any recording of the schools Due to the management software, Genesis can easily find any recording of the schools and send it to the Security Commissioner, who can also receive the alerts directly through an application on his mobile phone. It should be noted that all personnel handling the system, both operators and technicians, have Milestone Systems certifications, which they obtained on the manufacturer’s website. Security Commissioner González explained that the directors and residents of the schools may contact the Central Station if they wish to report any suspicious activity within a school after regular hours. Genesis operations centre González also clarified that “if for any reason a school principal requires a recording, he must contact us, and we request the information from the Genesis operations centre. This protocol is designed to respect the right to be in a place without feeling guarded at all times, as stipulated in the public policy of Puerto Rico. In total, this system directly benefits almost 400,000 people.” Increased security at a lower cost According to the Security Commissioner, since the first camera was installed, they went from two or three intrusions per day to one or zero. Even in October 2018, they had no record of intrusions. Genesis Security Services, Inc. confirmed that since the system has been operational, there has been a 97% reduction in school intrusions. Reduced physical assaults Video technology has helped dispel theft of property by employees and has helped reduce rates of physical assault Video technology has helped dispel problems such as theft of property by employees and, more importantly, has helped reduce rates of physical assault and bullying among students. These results have helped build trust among Puerto Rican families when they enroll their children in schools. “The system provides agility and precision. It is more efficient and immediate than communicating with a guard who has to enter a facility to verify what is happening. It’s great working with a system that has visibility 24/7 in schools,” said González. Cost savings On the other hand, due to this project, it was possible to reduce the cost of security in schools using technology, one of the main objectives of the Department of Education at the beginning. “We spent about $25 million annually covering just 250 schools with the guard system, and we had almost 600 schools left unattended. This project gave us the possibility of covering 100% of the public schools in Puerto Rico with the same budget,” González reported. Finally, it is important to note that many of these schools are located in vulnerable places on the island, so the system is also helping the Police and the Prosecutor’s Office to resolve cases that occurred around the educational facilities, and in general to contribute with the welfare of the community. Future projects On behalf of the Department of Education, the Puerto Rican Government is seeking ways to integrate this type of video analytics system with software programmes and databases of organisations that advocate for sexual assault victims. “In the future, we want to have a system that is capable of identifying if a sex offender crosses the perimeter in school zones so that we can warn in time,” said González. On the Genesis side, Morales said that the next step with this project would be to develop video analytics for the VMS, not only to give perimeter security but also statistics such as counting people and vehicles. They also plan on integrating access control systems into all schools.
Insights & Opinions from thought leaders at Milestone Systems
As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even more aspirational. Unfortunately, the widespread use of the term has also paradoxically undermined its meaning and power. However, today's concept of convergence has matured to provide new levels of benefit for security professionals. We asked our Expert Panel Roundtable: How has the meaning of “convergence” evolved in the security market? How are systems today more converged than ever?
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
A modern guide to data loss prevention
DownloadThe truth behind 9 mobile access myths
Download7 proven solutions for law enforcement key control and asset management
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download