Application security
Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS S...
Viakoo, a pioneer in Cyber-Physical Systems and Internet of Things vulnerability remediation, announced significant platform enhancements, strategic partnerships, and a clear path forward to address the escalating challenge of AI-driven cyber threats to the physical security industry. The company made the announcement at ISC West 2025, underscoring its commitment to a proactive, collaborative approach. In a related move, Viakoo has also issued an Open Letter to the Physical Security community,...
WeSuite, the creator of award-winning sales management software for security technology providers, is thrilled to announce its strategic integration with System Surveyor. The pioneer platform for site surveys and system design. Security integrators often face the challenge of helping their customers visualise and fully understand proposed solutions during the sales process. Streamlining proposal process This powerful integration enables users to seamlessly link one or multiple System Su...
The company announces the release of Ajax DoorBell, with built-in AI, IR sensor, and app control. Ajax DoorBell sets a new standard for the video doorbell experience by combining uninterrupted operation with advanced security features. The device is seamlessly integrated into the Ajax ecosystem and guarantees exceptional efficiency and security confidence. The Doorbell is available for order now. Professional security at the front door DoorBell flawlessly performs its primary func...
Kollmorgen servo motors are now available with our fourth-generation SFD-M smart feedback device. Offered at no additional cost over Kollmorgen’s earlier SFD models, this encoder offers four times greater positioning accuracy and uses energy-harvesting technology to track absolute multi-turn positioning even when the system is powered off. Revolutionising motion feedback SFD-M allows machine builders to achieve high-resolution multi-turn feedbackKollmorgen, a global pioneer in motion co...
SAFR from RealNetworks, the world’s foremost AI computer vision platform for access control and security, invites ISC West 2025 attendees to experience its revolutionary suite of AI-powered solutions at booth #25089. SAFR's facial recognition technology delivers unparalleled certainty through industry-pioneer accuracy, enabling organisations to monitor and analyse visual data at speeds far beyond human capabilities—all while maintaining the highest standards of data privacy an...
News
Sabio Group announced the expansion of its acclaimed ‘Disrupt’ programme across Europe for 2025, taking its digital customer experience (CX) transformation event to three major European cities. The expansion of its flagship event comes at a critical time for the CX industry, with artificial intelligence rapidly evolving, cost of living pressures continuing, and volatile energy prices creating significant challenges for contact centres and frontline customer service staff. Expanding disrupt across Europe Sabio is now extending Disrupt’s reach, and will host events across three major European capitalsSince launching in 2017, Disrupt has become the must-attend event for CX innovators, consistently attracting around 1000 decision-makers to its annual London event and its sister event in Madrid. This year, Sabio is now extending Disrupt’s reach, and will host events across three major European capitals as the need for CX expert services has never been higher on the continent, adding Paris to its locations. The wider 2025 programme, themed 'Delivering on the Promise', will showcase how global brands are leveraging cutting-edge AI, automation, and data solutions through real-world case studies and live demonstrations. Transforming the CX Landscape “Today's CX professionals are navigating the most profound technological shift we've seen in decades, while simultaneously managing heightened customer expectations and economic pressures,” said Stuart Dorman, Chief Innovation Officer at Sabio Group. “There has never been a greater need for expert services in CX technology than there has today and Disrupt creates an essential forum where industry leaders can exchange practical strategies and witness transformative solutions first-hand. From real-time translation technology to emotional wellbeing programmes for frontline staff, we're showcasing innovations that deliver immediate impact.” Innovation takes center stage Sabio’s Disrupt 2025 programme launches in Madrid, Abanca, Renfe and Securitas Sabio’s Disrupt 2025 programme launches in Madrid on April 3rd featuring industry pioneers including Abanca, Renfe and Securitas Direct sharing their transformation journeys. The flagship UK event follows at London's Tobacco Dock on May 20th, before Disrupt makes its French debut in Paris on June 3rd. Sabio is also looking at extending its programme even further with more European locations currently being assessed. AI-powered CX evolution Daniel Seaborne, Managing Director for UK & South Africa at Sabio Group said, “Our London event has set the benchmark for CX excellence since 2017. For 2025, we're bringing together our strongest speaker lineup yet, showcasing organisations that are redefining customer service through strategic AI implementation and innovative agent support systems.” Gabriel Rodriguez, Managing Director for Sabio Spain, added: “Spanish enterprises are embracing digital transformation at remarkable speed. Our Madrid event will demonstrate how leading Spanish brands are balancing technological innovation with the human touch that remains fundamental to meaningful customer relationships.” Highlighting Paris debut Hervé Racine, Managing Director for Sabio France, Italy and Morocco, stated: “The French market has distinctive customer experience expectations, particularly around personalisation and service efficiency. Our Paris event will address regional and global CX challenges while connecting French CX leaders with global innovations that are setting new benchmarks of excellence.” Explore CX solutions together Attendees at all of Sabio’s Disrupt events can expect exclusive insights into how major brands are tackling today's most pressing CX challenges through a combination of keynotes, interactive workshops, live demonstrations and strategic networking opportunities.
Regula, a global developer of forensic devices and identity verification solutions, now has 15,000 templates in its identity document template database, the most comprehensive in the world. This significant update ensures that businesses and government agencies around the globe can verify the latest IDs, including the most advanced biometric documents, with the highest accuracy. Global ID verification simplified Incorporating ID templates from 251 countries and territories and capable of reading 138 national languagesRegula’s proprietary identity document template database contains detailed descriptions of each document’s security features. Combined with the advanced capabilities of Regula Document Reader SDK, this enables online ID verification with the same level of precision previously achievable only in on-site scenarios. Incorporating ID templates from 251 countries and territories and capable of reading 138 national languages, this database enables the recognition and proper verification of nearly every ID from any corner of the world, even the rarest ones. Tracking global shifts in identity documents The latest expansion of Regula’s ID template database reflects the global shift towards more sophisticated identity documents. More and more countries are introducing biometric passports, which are considered the most secure at the moment. For example, among the recent additions to Regula’s database are the first-ever biometric passports issued by India, Sri Lanka, and Guyana. Apart from the format, documents’ security features are also becoming more complex and elaborate. First and foremost, ID issuers are switching from paper substrates in favour of polycarbonate pages, which are much harder to counterfeit. For this reason, states like Benin, Burkina Faso, Chile, and Djibouti have recently issued new IDs with polycarbonate data pages. Advanced ID security features MLIs significantly enhance document protection with hard to illegally duplicate by designAnother advanced security feature that has become quite widespread across different identity documents is the Multiple Laser Image (MLI). An MLI embeds two distinct images within a document. Typically, these include the passport holder’s photo and their personal data. Special lenses positioned above the images can visualise either image clearly by tilting the document. Hard to illegally duplicate by design, MLIs significantly enhance document protection. Among the IDs that were added to Regula’s ID template database with the latest update, the US driver’s licence from Wisconsin, as well as the ID cards of Jamaica, San Marino, and Yemen contain such security features. Combating fraud with precision “The growing complexity of identity documents presents notable challenges for ID verification workflows. Businesses and government agencies must be prepared to properly verify all the document security features so as not to miss any forgery or identity fraud attempts.” “Furthermore, they have to handle multiple ID versions from the same country simultaneously, as many older documents remain in circulation alongside the new formats. By keeping pace with evolving security features and document standards, we help streamline ID verification workflows, reduce fraud risks, and maintain compliance with global regulations,” says Ihar Kliashchou, Chief Technology Officer at Regula. Expanding global ID coverage Among the new IDs added to Regula’s database to hit 15,000 templates are the following, issued in 2024-2025: Passports: Azerbaijan Benin Burkina Faso Burundi Chile Djibouti Germany Guyana India Kosovo Malawi Myanmar Netherlands Romania Saint Kitts and Nevis Slovakia Sri Lanka Tajikistan ID cards: Argentina Bosnia and Herzegovina Chile Guatemala Jamaica Kazakstan Kosovo Netherlands Nigeria Norway Philippines Puerto Rico San Marino Slovakia Somalia Sri Lanka Vietnam Yemen Driver’s licences: Azerbaijan Denmark Honduras Iran Kosovo Mongolia Puerto Rico Slovakia Sweden Venezuela Bolivia US states: Michigan, Mississippi, New Hampshire, North Carolina, Tennessee, Wisconsin
Data isn’t just the driver for project planning and design. The Eplan Data Portal offers users access to high-quality product catalogues from a continually growing pool of renowned component manufacturers. The portal has now passed the mark of more than two-million sets of static device data from around five hundred manufacturers! By using integrated configurators, users have far more than four million data sets at their fingertips. It’s a nearly limitless and ever-increasing variety of components that can quickly and easily be integrated into projects – and the data quality is naturally top notch. Data excellence in action More than four million device data sets available means an enormous amount of variety for projects More than four million device data sets available means an enormous amount of variety for projects. However, it isn’t just the quantity, but rather the quality of the data. “Quantity and quality is something that goes hand in hand for us,” says Eplan Head of Content Quality Management Rainer Ackermann. “We have high expectations for the quality and completeness of the data sets so that we can offer our users the greatest possible added value. That’s also why we continue to work on the Eplan Data Standard, or EDS.” Manufacturers are also striving to meet these expectations of providing data sets that are as comprehensive as possible. This can include components for control cabinets, the 3D representation of a device, dimensions for drilling patterns, connection diagrams as well as commercial data, device numbers and text descriptions. Siemens automation and technology integrated Siemens has been represented in the Data Portal with energy automation and building automation products for many years. Now, protection and automation devices from the Siprotec 5 family have been added. Protection, automation, and monitoring of the power grid are essential for a resilient network. "We need a secure and reliable power supply to establish a sustainable infrastructure and achieve our net-zero goals," explains Stefan Werben, Portfolio Manager of Siprotec Medium Voltage Products at Siemens, adding:"We are pleased that we can now additionally support those customers who have chosen Eplan as their engineering platform to efficiently realize their projects in the construction, operation, and expansion of plants." Innovation in building control Sauter, a pioneer technology manufacturer in the field of building automation, system integration and building services, headquartered in Basel, Switzerland, and Freiburg, Germany, added to the Eplan Data Portal their ecos504/505 range of products for integrated room automation. “The positive feedback from our customers as well as from within our own company has motivated us to provide even more device data in the Eplan Data Standard,” says Sauter Head of Marketing and Product Management Peter Schoenenberger. Data depth ensured Rittal has around 7,300 devices stored in the Eplan Data Portal, these include cabinets, and cabinet accessoriesA majority of the device data stored in the portal – 1.4 of more than 2 million components – are already available in the Eplan Data Standard. The EDS increases and guarantees the quality of the data sets so that they can be used efficiently – ideally from engineering through to production. Rittal has around 7,300 devices stored in the Eplan Data Portal – around 5,600 of them in the Eplan Data Standard. These include control cabinets, control cabinet accessories, Blue e+ climate control devices and more. There are almost no limits globally speaking as well: If a device data set is created using ECLASS as a step file in an IEC format (the European standard), the Eplan software automatically also supports the NFPA device data set (the American standard). Simplify data with Eplan With this multi-standard support in one single data set, macros can also be saved in accordance with various standards that the Eplan Electric P8 software then recognises automatically. Furthermore, modifiable data from configurators and selectors of various manufacturers can also be used. These have linked their product catalogues directly with the Eplan Data Portal. Development continues Less visible but at least as important is the continued development of the data quality in the Eplan Data Portal. This year the focus is on preassembled cables. To ensure that machine cabling works as efficiently as possible with the new Eplan Cable proD solution, 3D data for the connectors is also being successively introduced. Technically speaking, functional improvements are also on the horizon: The Eplan Data Portal will be able to be directly integrated into local device management with the upcoming release of the new Eplan Platform 2026. This will again even further simplify selecting components and accelerate project planning and design work.
RGB Spectrum®, a pioneer in mission-critical video solutions for real-time decision support, will showcase its next-generation control room technology at ISC West 2025, held at the Venetian Expo in Las Vegas. Attendees visiting Booth #7050 will experience a fully immersive control room setting featuring RGB Spectrum’s latest innovations, expanded technology partnerships, and interactive demonstrations that redefine real-time data visualisation for command-and-control applications. Seamless multi-user control with XtendPoint XtendPoint streamlines decision-making by providing real-time access to essential data At the core of RGB Spectrum’s showcase is the XtendPoint™ KVM-over-IP solution, designed to empower operators with secure, high-performance control of remote systems, whether across a single facility or an entire enterprise. For mission-critical environments such as emergency communications centres, police command operations, and security operations centres (SOCs), XtendPoint streamlines decision-making by providing real-time access to essential data. Zio AV-over-IP platform integration RGB Spectrum’s Zio AV-over-IP platform extends the XtendPoint solution’s functionality, delivering seamless video wall and display integration for mission-critical environments. On display will be the Zio W4008 series that supporting a mix of local baseband, IP video and web-based inputs. The integration with XtendPoint connects video walls to operator consoles, enhancing situational awareness and workflow efficiency over networks. Future-ready control room consoles by Tresco Tresco’s AEGIS console and Compose control room furniture configurator will be on display Complementing RGB Spectrum’s control room setting, Tresco’s AEGIS console and Compose control room furniture configurator will be on display, demonstrating unparalleled flexibility, performance, and operator ergonomics. Developed to meet the most pressing challenges in modern control room environments, AEGIS ensures rapid deployment and streamlined procurement, while Compose simplifies design and customisation. Key advantages Performance-driven design – Ergonomic, intuitive workspaces that enhance efficiency and reduce fatigue. Streamlined procurement – Faster quoting and purchasing with real-time pricing transparency. Future-proof adaptability – Scalable solutions that evolve with operational needs. Seamless integration – Built to work with existing control room technologies, ensuring a cohesive ecosystem. Immersive operator experience: Cutting-edge display technology RGB Spectrum’s full-scale control room demo at ISC West 2025 provides an interactive environment where visitors can experience the future of operator workflows. The booth will feature: RGB Spectrum’s new 43” curved monitors, offering an immersive 360-degree viewing experience. Samsung’s 98” LED video wall display and 24” desktop monitors for enhanced visualisation. Custom seating solutions by Concept Seating, optimising comfort for 24/7 operations. A custom-built mount by AMD, ensuring seamless integration and stability. Experience the future of command and control Attendees are invited to Booth #7050 for a live demo of RGB Spectrum’s command-and-control solutions and to interact with the latest in video wall processing and operator-centric technologies. To top it off, enjoy a bourbon-tasting experience on Thursday, April 3rd from 3:30 pm to 5:00 pm while engaging with industry experts on how the right technology can revolutionise mission-critical operations.
Security Central is excited to announce the addition of Adam Emmett as our new Southeast Account Executive. With over 12 years of experience in the security industry, Adam brings a deep understanding of dealer success, emerging technology, and relationship-driven growth. Since beginning his career in security product manufacturing in 2013, Adam has built a strong reputation in the industry. A legacy of innovation With a passion for dealer growth and industry innovation, Adam brings nationwide experienceAdam has a long-standing connection with Security Central, dating back to the start of his career. While much of his experience has been in sales across the Southeast. His work has taken him nationwide—helping dealers expand their businesses and maximize new opportunities through innovative technology solutions. His passion for dealer growth, industry innovation, and service excellence makes him a perfect fit for Security Central. Strengthening dealer relationships "Adam’s experience in product integration and passion for dealer success align perfectly with Security Central’s commitment to unmatched support and cutting-edge solutions," said Caroline Brown, CEO of Security Central. "His ability to foster strong relationships will be invaluable as we continue to elevate our presence in the Southeast." Based in Georgia, Adam will serve as the primary point of contact for dealers in Georgia, North Carolina, South Carolina, and Tennessee. Adam joins forces with the Southeastern Sales Manager, Darryl Bray, to reinforce client relationships in the Southeast and ensuring that tradition meets tomorrow.
Cequence Security, a pioneer in API security and bot management, announced that it is now an Amazon Web Services (AWS) Web Application Firewall (WAF) Ready Partner. This designation recognises Cequence’s solution as validated by AWS Partner Network (APN) Solutions Architects and seamlessly integrates with AWS WAF. Security posture with minimal effort AWS WAF, available across all AWS Regions, can be deployed directly from the AWS console, empowering organisations to strengthen their security posture with minimal effort. Being an AWS WAF Ready Partner differentiates Cequence as an APN member with a product that works with AWS WAF and is generally available for and fully supports AWS customers. Internet threats and vulnerabilities AWS WAF Ready Partners help customers quickly identify easy-to-deploy solutions AWS WAF Ready Partners help customers quickly identify easy-to-deploy solutions that can help detect, mitigate, and analyse some of the most common Internet threats and vulnerabilities. Securing web applications has never been more challenging. Fifty-five percent of organisations say protecting their web applications has become more difficult over the past two years, while 93% have faced at least one attack on their web applications and APIs in the past 12 months. This threat landscape is only growing as attackers increasingly harness generative artificial intelligence (AI) to automate and refine their methods. Organisations face a range of security challenges Traditional application attacks: Exploits targeting known vulnerabilities, including OWASP Top 10 risks, along with malware and denial-of-service attacks that disrupt application availability. Unmanaged APIs: Cloud-native architectures and interconnected applications have made APIs prime targets for injection attacks, misconfigurations, and other exploits—often bypassing traditional defences like WAFs entirely, leaving them even more exposed. Bot and fraud attacks: AI-driven bots are being used at scale for scraping, inventory hoarding, and account fraud, making detection and mitigation increasingly difficult. Seamlessly securing APIs and applications UAP offers real-time visibility into managed and unmanaged APIs, detecting exposures Cequence’s Unified API Protection (UAP) platform enhances existing WAFs and API gateways by providing proactive security tailored to modern API architectures. Unlike traditional security tools, UAP offers real-time visibility into both managed and unmanaged APIs, detecting vulnerabilities, misconfigurations, and anomalous behaviour to prevent threats before they escalate. By unifying API discovery, compliance enforcement, and threat protection, UAP helps organisations adopt a proactive security posture, safeguarding critical applications, preventing fraud, ensuring compliance, and seamlessly integrating with existing infrastructure. Malicious bots and API-based attacks “Achieving the AWS WAF Ready designation strengthens our ability to ensure that AWS customers continue to receive advanced API security solutions,” said Ameya Talwalkar, CEO of Cequence. “While WAFs play a role in security, they are not sufficient to combat today’s sophisticated threats. Malicious bots and API-based attacks can bypass traditional defences. Cequence provides AWS customers with comprehensive protection, addressing the critical security gaps that WAFs may miss.”


Expert commentary
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasises not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification programme developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The programme emphasises the importance of both physical and digital security, recognising that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardised procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardised procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centres. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasising a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation. Announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Carbon Cliff-Barstow School District (CCBSD) in Rock Island County, Illinois. Strengthening security with AI The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related eventsThe AI technology will be implemented at the district’s Pre-K through 8th grade school to enhance security and reduce response times in the event of a gun-related threat. The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related events at Illinois K-12 school districts this year alone. Recognising the ongoing threat of gun-related violence, the district is taking an important step by integrating ZeroEyes’ AI gun detection system to further bolster its security measures and protect against potential threats. Commitment to campus safety CCBSD maintains a comprehensive, multi-layered security programme in partnership with the Rock Island County Sheriff's Department to ensure the safety of students and staff. Alongside the district’s school resource officer, CCBSD has invested in a third-party monitored alarm system and recently upgraded its camera infrastructure. An on-site behavioural interventionist is also employed to build strong relationships with students and families. Strengthening security “We take great pride in ensuring the safety and success of all students and staff members at our school,” said Eric Lawson, Superintendent of CCBSD. “By incorporating ZeroEyes, we’re adding another important layer of safety to our campus, and we’re confident that this proactive approach will help us promote a safe learning environment.” Smart solutions with ZeroEyes CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois, part of the Quad Cities region. The district’s mission is to prepare students to be academically successful and career-ready, foster a love for learning, and help students reach their full potential as confident, lifelong learners. The district’s 40 staff members are dedicated to ensuring the safety and educational success of every student. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto CCBSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC. Protecting with precision The industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Innovating school security “The safety of students and staff is a priority for Carbon Cliff-Barstow, and we are honored to play a role in supporting that mission," said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our AI gun detection system will provide the district with the actionable intelligence needed to mitigate potential threats, helping to ensure a safer environment for students and staff."
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced that a pioneering teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). The hospital, known for its forward-thinking approach to medicine and healthcare, is part of the National Health Service (NHS) Trust in the Northeast of the UK. Over the past decade, the hospital has made significant advancements in its security infrastructure, transitioning from analog CCTV systems to a fully IP-based setup. As part of this transformation, the hospital recently installed 25 i-PRO X-Series edge-processing cameras. The hospital's goal was to enhance the security of its large campus using the latest AI-enabled camera technology while optimising operations. The Challenge The main challenge the hospital faced was upgrading portions of its existing security system The main challenge the hospital faced was upgrading portions of its existing security system with state-of-the-art, AI-enabled cameras without exceeding strict public sector budget constraints and with minimal disruption to the daily operations of a busy hospital. Additionally, with a vast campus and numerous security vulnerabilities, the hospital required a solution that could extend the capabilities of existing non-AI cameras while providing enhanced monitoring capabilities. High level of security "The primary challenge was upgrading the system within budget limitations while maintaining a high level of security and operational efficiency," said Chris Lakin, Director at Oracle Vision, the system integrator overseeing the project. "This client wanted a solution that could integrate with their current infrastructure, provide advanced AI capabilities to better protect hospital patients, staff, and assets while being adaptable for future needs." The solution Cameras enabled the hospital to add AI functionality to their existing, non-AI cameras After a detailed assessment, the hospital decided to install i-PRO X-Series edge-processing cameras, a premium and innovative solution that delivers exceptional value while seamlessly integrating with Milestone’s XProtect VMS platform. Importantly, these cameras enabled the hospital to add AI functionality to their existing, non-AI cameras—an innovation that allowed them to maximise the potential of their current equipment without needing to replace all cameras. X-Series AI cameras The X-Series AI cameras are equipped with the AI Processing Relay feature, which allows non-AI cameras, including those from other manufacturers, to gain AI capabilities. Such an approach maximises the life of existing surveillance systems while significantly reducing false alarms. The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras by installing 25 i-PRO X-Series AI cameras and linking them with their existing non-AI models. i-PRO’s AI Processing Relay app The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras "It was a bit of a no-brainer for the hospital. With i-PRO, they didn’t need to replace their entire fleet of cameras to gain important new functionality. We were able to upgrade their existing system by adding AI capabilities to 75 existing non-AI cameras, helping them maximise value while staying within budget,” says Lakin. “The flexibility of i-PRO’s AI Processing Relay app is impressive. It turns any connected camera into an AI-enhanced solution. This system now allows the hospital to achieve a level of security and operational insight that wasn’t previously possible with their older equipment.” Advanced AI capabilities The i-PRO X-Series AI cameras include on-site learning features that allow the hospital’s security team to customise what the cameras can detect and monitor. For example, operators can teach the cameras to recognise specific objects, such as vehicles or individuals, and receive alerts when certain behaviours or activities occur in sensitive areas like emergency entrances. Benefits from AI-driven analytics The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control, identify suspicious behaviour, and even integrate with their Paxton access control system. The cameras are connected to the hospital’s XProtect Smart Wall, where events triggered by AI analytics or access control events, such as a security breach or abnormal behaviour, automatically display on screen, allowing staff to respond in real time. Futureproofing with advanced AI features The i-PRO X-Series cameras utilise Ambarella’s AI SoC (CV52) to provide high-performance edge computing, enabling the hospital to handle complex analytics locally without burdening the network. With the capability to run nine different AI applications, such as i-PRO’s Privacy Guard, which blurs the faces or the entire bodies of patients for privacy, the cameras can allow the hospital to enhance its security while also gathering operational metrics such as tracking the movement of specific equipment or personnel across the campus. Features of i-PRO’s cameras i-PRO’s cameras feature a WDR of up to 144dB, ensuring best image quality i-PRO’s cameras also feature a Wide Dynamic Range (WDR) of up to 144dB, ensuring superior image quality in all lighting conditions. With models offering up to 6MP resolution and IR illumination up to 70 metres, the cameras deliver high-definition video regardless of the environment. Results By implementing i-PRO’s X-Series AI cameras, the hospital has enhanced its security infrastructure while remaining within tight budgetary constraints. The advanced AI capabilities provide the hospital with real-time alerts and automation features that streamline its security operations. Most notably, the flexibility of i-PRO’s cameras allowed the hospital to effectively upgrade 100 cameras with AI features by installing only 25 i-PRO cameras, providing exceptional value while future-proofing its investment.
Interface Systems, a managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, announced that Nicker Management, a fast-food franchise operator in the Los Angeles area, has successfully implemented Interface’s Virtual Security Guard solution. By deploying Interface’s advanced security technology, Nicker Management has enhanced safety, reduced operational costs, and provided a secure environment for employees and customers. Nicker Management Nicker Management, led by sisters Nicole Harper Rawlins (CEO) and Kerri Harper-Howie (Co-owner), operates 24 fast-food restaurants across South LA, Compton, Lynwood, and Carson. Faced with persistent security challenges, including loitering, panhandling, and criminal activity, the company sought a modern, cost-effective solution to protect its employees and guests. Addressing critical security concerns Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants “We’re faced with lots of challenges with crime, unhoused people, and individuals suffering from mental and/or substance abuse issues,” said Harper Rawlins. “It creates significant risk at our restaurants. Over the years, we experimented with a range of security solutions, and hiring on-site guards quickly became costly and unsustainable.” After evaluating various options, Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants, ensuring a proactive and scalable approach to security. How can Virtual Guard Solution help? 24/7 Monitoring & Rapid Response – Trained intervention specialists continuously monitor restaurant locations to deter loitering, panhandling, and aggressive behavior in real time. Automated Voice-Downs – Proactive announcements throughout the day signal active monitoring and reinforce security presence. Virtual Tours – Scheduled and unscheduled remote video assessments help identify threats, suspicious activities, and compliance issues. Employee Security Escorts – Live monitoring ensures employees' safe passage to and from their vehicles during vulnerable times such as shift changes, and opening, and closing hours. Secure working environment “Knowing there’s a professionally trained security team on standby gives us confidence that we can maintain a secure working environment at all hours,” said Harper Rawlins. The deployment of Virtual Guard has streamlined security operations at Nicker Management’s restaurant, allowing staff to focus on providing excellent customer service without the burden of handling security incidents. 24/7 monitoring With 24/7 monitoring by Virtual Guard, employees and customers feel safer, and staff no longer have to handle security threats alone. In addition, automated alerts also remind employees of key procedures during shift changes. The system's effectiveness was demonstrated during a recent incident when a loiterer refused to leave the restaurant lobby. The staff triggered a silent alarm, and the Virtual Guard team immediately responded with a voice-down, prompting the individual to leave without further incident. Optimises costs “Interface’s Virtual Guard solution empowers franchise businesses like Nicker Management to address security risks effectively while optimising operational costs,” said Sean Foley, Chief Revenue Officer at Interface Systems. “Our innovative approach allows employees to focus on delivering excellent service, knowing their safety is in trusted hands.”
Porthaven Care Homes, a provider of high-quality care services in the UK, recently completed the opening of its latest addition, Cavell Park Care Home, located in Maidstone, Kent. This marks another significant addition to their growing portfolio of 18 purpose-built care homes, each designed with a person-centred approach. Located near the historic town of Maidstone, Cavell Park Care Home provides a peaceful and secure environment for up to 80 residents. The care home offers a wide range of services - all within a setting that combines safety, comfort, and aesthetic appeal. Elevating security standards To ensure the safety of residents while also maintaining an inviting atmosphere, Jacksons Fencing was chosen to install a combination of black metal bow-top railings and matching gates at varying heights around the care home. The 1.8-metre-high bow top railings surround the gardens where residents enjoy much of their leisure time, while 1.2 metre high fencing was installed around the car park and entrance. First impressions matter The railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors The design of the bow top railings features rounded pales, posts, and curved hoop tops which score highly for both safety and aesthetics, creating a secure and inviting environment while minimising injury risk. Additionally, the railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors, ensuring that the fencing is resistant to vandalism or break-in attempts. Weather-resistant railings Made from galvanised tubular steel, these railings are strong and weather-resistant. The polyester powder coating ensures a sleek, durable finish that won't crack or peel, offering long-lasting protection against wear and tear. This combination makes the railings both visually appealing and a sustainable investment. The design of the railings complements the home’s contemporary architecture and seamlessly blends with the surrounding landscaped gardens, creating a harmonious and secure environment for residents. Each railing installation is backed by a 25-year Service Life Guarantee from Jacksons Fencing, providing long-term peace of mind that the fencing will continue to deliver security and aesthetic value for years to come. A sense of safety and autonomy The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access Located adjacent to the reception entrance, the garden’s visibility offers visitors and prospective residents immediate assurance that their loved ones are in a safe and welcoming space. The vertical pale design of the fence ensures high visibility, which not only improves supervision but also enhances the autonomy of residents by making them feel connected to the outside world. The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access, while maintaining ease of entry for staff and residents. Bow top fencing and gates Reflecting on the success of the project, Peter Jackson, Managing Director at Jacksons Fencing, commented, “The installation of our bow top fencing and gates has not only provided Cavell Park Care Home with a secure and well-defined perimeter but also ensured exceptional durability. Jacksons Fencing’s products are designed to withstand the test of time, offering long-term protection while retaining an attractive finish." “A care home is more than just a building - it’s a community where safety, comfort, and a sense of belonging are paramount,” continued Peter. “We’re proud to have played a role in bringing this vision to life and blending robust security with sleek design.”
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.


Round table discussion
2025 is likely to see further advancements in artificial intelligence, with potential impacts on various aspects of society, including the security industry. The new year will also require security professionals to adapt to changing market conditions and develop contingency plans for unforeseen events. Industry changes will accelerate and challenge everyone in the security market to keep up. Making specific predictions for the new year can be a struggle, but we asked our Expert Panel Roundtable: What will be the big news for security in the year ahead?
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Products

A modern guide to data loss prevention
Download
The truth behind 9 mobile access myths
Download
7 proven solutions for law enforcement key control and asset management
Download
Access control system planning phase 2
Download
Security practices for hotels
Download