Application security
Umazi, a pioneer in digital identity verification solutions, has welcomed the latest report from CFIT, Fighting Economic Crime Through Digital Verification: The Case for Adopting a Digital Company ID in the UK. The report highlights the potential to revolutionise business operations in the UK by improving efficiency, security, and trust. Innovating business verification CFIT has convened over 70 pioneer organisations to design and develop the Digital Company ID—a unique digital represen...
Umazi, a pioneer in digital identity verification solutions, has welcomed the latest report from CFIT, Fighting Economic Crime Through Digital Verification: The Case for Adopting a Digital Company ID in the UK. The report highlights the potential to revolutionise business operations in the UK by improving efficiency, security, and trust. Innovating business verification CFIT has convened over 70 pioneer organisations to design and develop the Digital Company ID—a unique digital represen...
Magenta Security Services, one of the UK’s pioneer security firms, has achieved an exceptional score of 87.5% in its most recent SIA Approved Contractor Scheme (ACS) audit - placing the company firmly within the top 5% of security companies nationwide. With only the top 10% of security firms scoring above 75%, Magenta’s remarkable result reflects the company’s consistent dedication to quality, compliance, and operational excellence across every area of its business. Exceeding...
Skills for Security is proud to announce Nimbus Digital and Gallagher Security as its new Platinum Sponsors. The latest partnerships reflect a shared commitment to investing in the future of fire safety and security professionals. Digital compliance solutions Nimbus Digital, a pioneer provider of fire safety management and digital compliance solutions, and Gallagher Security, an award-winning global pioneer in innovative security and access technology, join Skills for Security in its mission...
DigiCert, a pioneer global provider of digital trust, announces the integration of UltraDNS into its flagship DigiCert ONE platform. The combination automates essential management processes between Public Key Infrastructure and Domain Name Systems—two foundational components of digital trust—to reduce outage risks and streamline operations. Streamline PKI operations DigiCert, ONE addresses challenges by enhancing cryptographic agility and automating key processes DNS teams manual...
The company has introduced the IndoorCam. Designed for private households, small offices, and small to medium businesses, it combines Wi-Fi flexibility with Ajax’s professional security standards. Featuring a fallback communication channel via the Jeweller radio protocol, built-in AI, and encrypted data transmission, IndoorCam ensures reliable monitoring. Smart video surveillance with built-in AI PIR sensor detects motion at a distance of up to 4 m, while built-in AI recognises peo...
News
Viakoo, a pioneer in Cyber-Physical Systems and Internet of Things vulnerability remediation, announced significant platform enhancements, strategic partnerships, and a clear path forward to address the escalating challenge of AI-driven cyber threats to the physical security industry. The company made the announcement at ISC West 2025, underscoring its commitment to a proactive, collaborative approach. In a related move, Viakoo has also issued an Open Letter to the Physical Security community, advocating for a vendor-neutral, united effort to tackle the evolving security and operational complexities within physical security systems. Enhanced Viakoo action platform Demonstrated at ISC West 2025, the flagship Viakoo Action Platform features powerful new capabilities designed to empower physical security teams to operate securely and quickly: Reasoning Engine: based on 2 billion hours of production use at leading organisations. Modernised User Interface: Featuring a sleek dark mode, a rapid UI refresh for enhanced responsiveness, and proven scalability to manage tens of thousands of devices, the platform offers an improved and more efficient user experience as well as the latest in cyber protection. Accelerated Reporting: Organisations can now generate detailed reports across all levels of their security infrastructure hierarchy with unprecedented speed, providing critical insights for proactive threat management and compliance. Streamlined CPS Application and Device Integration: The platform significantly reduces the time required to onboard previously unsupported devices from months to days, ensuring comprehensive coverage and faster time-to-value. AI-Powered Support and Knowledge Base: Leveraging artificial intelligence, Viakoo’s support system now offers intuitive natural language query capabilities and context-aware knowledge base searching, enabling faster issue resolution and improved user experience. Strategic partnerships expand Viakoo Action Platform running directly on the Mercury embedded application Building on its position as the platform with the broadest integration ecosystem in the physical security industry (now exceeding 100 partners), Viakoo announced a key partnership with Mercury Security. Attendees at ISC West can witness the seamless integration of the Viakoo Action Platform running directly on the Mercury embedded application environment in the Mercury booth (#27109). This deep integration provides enhanced security and operational efficiencies for joint customers. Recognising the urgent need to address the rapidly evolving landscape of AI-driven cyber threats, Viakoo is actively engaging with industry leaders and experts. Visionaries The company’s advisory board, including prominent figures like Todd Christensen (Business Information Security Officer, Medical-Surgical Business Unit at McKesson Corporation), Maria Sumnicht (National Director Cybersecurity, Task Force on National and Homeland Security), and Michael Parker (CMO at ReversingLabs) is playing a crucial role in guiding Viakoo’s strategic direction and ensuring its solutions are at the forefront of threat identification and remediation. The Open Letter issued by Viakoo further emphasises the necessity for industry-wide collaboration to establish effective defenses against these sophisticated attacks. Quote from Viakoo CEO “This year at ISC West marks a pivotal moment for the physical security industry as we collectively confront the increasing sophistication of cyber threats,” stated Bud Broomhead , CEO of Viakoo. “The enhancements to our Viakoo Action Platform, coupled with our expanding partnerships and the guidance of our esteemed advisory board, directly address our customers’ urgent need for continuous visibility, operational resilience, and robust security across their physical security and other CPS systems. Viakoo remains dedicated to its vision of autonomously securing these critical environments and eliminating risk.”
WeSuite, the creator of award-winning sales management software for security technology providers, is thrilled to announce its strategic integration with System Surveyor. The pioneer platform for site surveys and system design. Security integrators often face the challenge of helping their customers visualise and fully understand proposed solutions during the sales process. Streamlining proposal process This powerful integration enables users to seamlessly link one or multiple System Surveyor surveys directlyBy integrating the site survey and design directly into the written scope of work within the proposal, customers can easily verify that the solution meets their specific needs. Proposals with clear, well-defined scopes of work streamline the decision-making process, making it faster and easier for customers to sign on the dotted line. This powerful integration enables WeSuite users to seamlessly link one or multiple System Surveyor surveys directly to estimates within the WeSuite platform. The partnership enhances proposal documents by automatically incorporating System Surveyor layouts into specified proposal pages, ensuring consistent, professional presentations that showcase system designs with precision. Seamless system integration “We’re excited to launch this integration with System Surveyor because it’s a natural fit,” said Tracy Larson, President of WeSuite. “WeSuite ensures precision and profitability in estimating and automates generation of proposal and contracts, while System Surveyor brings the design to life.” “Together, our platforms streamline the documentation and management of systems from sales through delivery and ongoing account management." Optimising workflows "This integration with System Surveyor and WeSuite is a great next step to streamline the sales process," said Maureen Carlson, Co-Founder and President of System Surveyor. "Our customer communities want to put their best foot forward to provide a professional design and an easy-to-understand, accurate proposal.” “Together, our platforms enable system integrators to more effectively and efficiently capitalise on the incredible opportunity to serve their customers in a growth market.”
The company announces the release of Ajax DoorBell, with built-in AI, IR sensor, and app control. Ajax DoorBell sets a new standard for the video doorbell experience by combining uninterrupted operation with advanced security features. The device is seamlessly integrated into the Ajax ecosystem and guarantees exceptional efficiency and security confidence. The Doorbell is available for order now. Professional security at the front door DoorBell flawlessly performs its primary function: welcoming guests without making them wait DoorBell flawlessly performs its primary function: welcoming guests without making them wait. As soon as a visitor rings the doorbell, an Ajax user receives a notification, sees who’s at the door, and can start a conversation via an Ajax app. No delays or freezing—proprietary Ajax technologies ensure a clear and seamless exchange on both sides. The DoorBell also functions as a vigilant security camera: it notifies about the movement of people, animals, or vehicles, and records video on the Ajax NVR or Ajax Cloud Storage, which will soon be available among Ajax services. The device also informs security companies even without Wi-Fi–via the Ajax hub. High-image quality image and two-way audio communication Ajax DoorBell offers excellent image quality. It has a 4 MP CMOS camera sensor with HDR technology and IR illumination at a distance of up to 6 metres, so the image is always clear regardless of lighting conditions. The video doorbell implements the company's proprietary solutions for noise and echo cancellation, and it has a significantly higher volume level compared to other devices on the market. AI-driven object recognition The video doorbell has a built-in AI that recognises people, animals, and vehicles. Users can customise detection and receive notifications for all or only a specific type of object. Enhanced Wi-Fi connection with a reliable backup DoorBell is still connected to the Ajax hub thanks to the fallback communication channel The main communication channel is Wi-Fi with a range of up to 500 metres in the absence of obstacles, and up to 30 metres even through concrete walls. This is more than enough for stable operation, for example, in a large private home. For installers, this means less installation hassle, as there’s no need to position the router directly near the entrance. Even if Wi-Fi fails, DoorBell is still connected to the Ajax hub thanks to the fallback communication channel – the Jeweller and Wings radio protocols. Both proprietary protocols are designed to detect interference and jamming, with built-in frequency hopping for enhanced protection. Instant access to footage Thanks to JetSparrow's proprietary video protocol, video is instantly transmitted from the device directly to Ajax applications with minimal delay. This also guarantees data confidentiality, as no third parties are involved in the process. Functionality without aesthetic compromises DoorBell is designed with both function and aesthetics in mind. DoorBell’s compact enclosure fits in the tightest spaces, such as narrow door frames or wall-adjacent doorways. Its minimalist design, available in four neutral colours, complements any exterior. Additionally, a coloured LED ring around the button adds a stylish yet functional element: it guides users and indicates the current state of the device.
Mercury Security, the pioneer in open architecture access control hardware, is launching a new addition to its industry-defining controller platform—the Mercury embedded application environment, an open platform that enables technology partners and OEMs to develop and deploy custom applications directly on Mercury MP Controllers. “We have a lot of exciting things happening at Mercury,” said Steve Lucas, vice president of sales at Mercury Security. “We are excited to show customers the Mercury embedded application environment running on Mercury MP Intelligent Controllers, along with a range of new solutions targeting the platform. We’re giving our partners the ability to develop directly on the controller, unlocking new levels of system intelligence at the edge.” Traditional access controllers Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge—reducing latency, increasing availability and enhancing system redundancy. By shifting intelligence closer to the door, the platform improves system responsiveness, minimises network dependency and enables advanced operational features. It also simplifies interoperability, seamlessly integrating controllers, IoT devices, elevators, readers, locks and more. Access control and IoT ecosystem Mercury embedded application environment delivers unmatched flexibility For access control and IoT ecosystem stakeholders who need a secure, scalable and customisable platform, the Mercury embedded application environment delivers unmatched flexibility—supporting third-party app integration and enabling custom business logic to run directly on the controller. Instead of just linking a reader to a management system for access decisions, Mercury controllers act as a nexus, integrating multiple systems and devices for broader functionality and stronger performance. Intelligent security systems “The access control industry is shifting toward more decentralised, intelligent security systems,” said Daniel Gundlach, vice president, head of Physical Access Control Solutions business unit in North America at HID. “Our embedded application environment gives our partners the tools to build smarter, more adaptable solutions that align with today’s challenges and tomorrow’s opportunities.” Key launch partners and apps Mercury is showcasing the broad capabilities of its embedded application environment in collaboration with key launch partners and their certified apps: ASSA ABLOY HES KS210 OSDP Access Control Server Cabinet Lock: With the Mercury KS210 device app, OEMs can now quickly & easily add support for up to 32 KS210 OSDP server cabinet locks without the need to build custom integrations. HID pivCLASS: Enables pivCLASS support on Mercury MP Intelligent Controllers, adding PKI-based authentication at the door to meet security standards required in government facilities and other regulated industries. SecuriThings: This system-class app simplifies security audits by discovering devices on the network and generating detailed reports on their status, including firmware versions, host connectivity and other key security metrics. Viakoo: This SaaS application maintains system health across CPS environments, such as physical security. System reliability is ensured with real-time monitoring, vulnerability identification, lifecycle data, and other critical details. Viakoo takes action to remediate vulnerabilities with firmware updates, password rotations, and certificate management. New standard in access control Mercury MP Controllers quickly set a new standard in access control, offering unprecedented flexibility Launched in June 2024, Mercury MP Controllers quickly set a new standard in access control, offering unprecedented flexibility. These controllers are the foundation for the Mercury embedded application environment, enabling software providers and integrators to seamlessly combine access control technologies, elevator control, building automation, IoT applications and third-party solutions into a unified, centralised infrastructure. This flexible approach eliminates vendor lock-in and provides the freedom to choose the right solution for specific customer requirements while future-proofing investments. OEMs and integrators Mercury Security, an HID company, has pioneered flexible hardware solutions that empower OEMs and integrators to create best-in-class systems for over 30 years. Mercury MP Controllers support a wide range of consistent standards, including OSDP, MQTT and TLS, ensuring interoperability across access control, building automation and IoT applications. The Mercury embedded application environment is available for developers now.
A rapidly growing European team, exciting new product releases and new look stand are the hallmarks of what looks set to be a calendar highlight for Gallagher Security at this year’s, The Security Event (TSE) in Birmingham next week. In what will be his first major trade show with Gallagher Security, Executive Vice President – Europe, Spencer Marshall says, “TSE is set to be a standout event for Gallagher Europe, with a full strength team in attendance, a number of exciting new product showcases and, as always, a rich opportunity to connect with the wider security industry, we’re looking forward to a really successful event.” Latest innovation in product suite Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch The Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch. QuickSwitch gives businesses a streamlined, simplified pathway to migrate from legacy systems to Gallagher’s world-class security solution. True to its name, installation is fast, reducing labour costs and minimising disruptions typical of a complex migration process. Most importantly, QuickSwitch helps businesses mitigate risks associated with legacy systems, creating peace of mind through a platform that unlocks greater value. With three variants each covering multiple boards, businesses are empowered to make the switch from a multitude of systems. Other powerful enhancements and integrations Also expected to be a major talking point on the Gallagher stand, and available with the upcoming Command Centre v9.30 release, a game-changing solution that redefines remote security. This groundbreaking release makes securing even the most remote assets easier and more cost-effective, while also delivering superior oversight, insight, and control. Launching with a suite of other powerful enhancements and integrations, v9.30 is one of the most advanced, feature-rich releases to date. Cyber advancements and features Gallagher will also be showcasing its multi-award-winning C7000 product range Gallagher will also be showcasing its multi-award-winning Controller 7000 (C7000) product range, including the recently released C7000 Enhanced, tipped as the controller designed with user confidence in mind. Building on the cyber advancements and features of the multi-award-winning C7000 Standard variant released in November 2023, the C7000 Enhanced offers increased reliability, redundancy, and resilience for customers. Gallagher’s award-winning site management platform Visitors to the Gallagher stand will also get to experience the employee badge in Apple Wallet. Released in May 2024, the employee badge in Apple Wallet is fully integrated with Gallagher’s award-winning site management platform, Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Rounding out Gallagher’s innovative solution showcase will be the global manufacturer’s perimeter fence solution, providing a powerful first line of defense for critical sites. Able to detect, delay, and deter intruders, Gallagher’s innovative pulse fencing systems ensure maximum security and compliance. Full strength of the Gallagher Europe team Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April A full-strength Gallagher Europe team will be in attendance, with Gordon Swallow, Sales Manager – UK South and European Technical Manager, Matt Wills taking part in panel discussions during the event. Matt Wills will be joining a discussion hosted by Lee Odess addressing; "Securing Europe's Foundations: Trends and Opportunities in Critical Infrastructure Protection." Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April discussing, "Technologies Shaping the Future of Security Systems: Cloud and AI Technologies," Chaired by Kieran Byrne AXIS Communications. Current and emerging needs of the industry Gallagher Security, Regional Marketing Manager – Europe, Bethan Thompson says, “These events are vitally important to ensure we best understand the current and emerging needs of our industry. The opportunity to come together with Channel Partners, End Users and members of the wider security industry helps us to shape our strategy and cements our commitment to innovating with people at the heart of everything we do.” She adds, “We’re looking forward to another successful event, unlocking greater value for our users, and the wider security industry through the power of our people and our industry-pioneering, innovation solutions suite.” Visit Gallagher Security at TSE, 8-10 April at stand 5/F90.
Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS Security achievement Cequence AWS Security Competency attainment highlights the firm's validated expertise across seven types This Cequence AWS Security Competency achievement highlights the company’s validated expertise across seven foundational categories of cybersecurity use cases: Perimeter Protection, Identity and Access Management, Threat Detection and Response, Infrastructure Protection, Data Protection, Compliance and Privacy, and Application Security. Partners that excel across all seven foundational security categories unlock the exclusive opportunity to qualify for the prestigious 8th designation: Core Security Partner. Each foundational category contains multiple cybersecurity capabilities, each with technical and operational requirements. Cybersecurity solutions from AWS Partners In 2022, AWS revamped the AWS Security Competency program to streamline access for customers, ensuring they can confidently adopt cybersecurity solutions from AWS Partners that have been rigorously validated by AWS. AWS security experts annually validate the tools used and operational processes of each AWS Security Competency partner to address specific cloud security challenges aligned to the categories and use cases that they have applied for. Cequence's advanced expertise commitment AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner The AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner to help them achieve their goals for business risk and cloud strategy confidence. Cequence proudly earns the distinguished AWS Security Competency, underscoring its leadership in API security and bot management making it a premier AWS Partner. This achievement highlights Cequence's advanced expertise and unwavering commitment to delivering cutting-edge cybersecurity solutions that meet AWS's rigorous standards for protecting cloud environments. Agility and innovation of AWS “Cequence is excited to achieve AWS Security Competency status,” said Ameya Talwalkar, CEO at Cequence Security. “This milestone reflects our dedication to empowering organisations to secure their API ecosystems." "By harnessing the agility and innovation of AWS, we equip businesses to defend against sophisticated bot attacks and API abuse, allowing them to focus on growth and innovation with confidence. Together with AWS, we provide the expertise needed to navigate the complexities of API security, ensuring that organisations can operate resiliently and securely.” Advanced cybersecurity solutions AWS empowers organisations, from startups to global enterprises, with scalable, flexible, and cost-effective solutions. To ensure seamless integration and deployment of these solutions, AWS established the AWS Competency Program, designed to help customers identify trusted AWS Partners with deep industry expertise. As an AWS Security Competency Partner, Cequence stands at the forefront, delivering advanced cybersecurity solutions tailored to safeguard cloud environments while leveraging the full power of AWS.
Viakoo, a pioneer in Cyber-Physical Systems and Internet of Things vulnerability remediation, announced significant platform enhancements, strategic partnerships, and a clear path forward to address the escalating challenge of AI-driven cyber threats to the physical security industry. The company made the announcement at ISC West 2025, underscoring its commitment to a proactive, collaborative approach. In a related move, Viakoo has also issued an Open Letter to the Physical Security community, advocating for a vendor-neutral, united effort to tackle the evolving security and operational complexities within physical security systems. Enhanced Viakoo action platform Demonstrated at ISC West 2025, the flagship Viakoo Action Platform features powerful new capabilities designed to empower physical security teams to operate securely and quickly: Reasoning Engine: based on 2 billion hours of production use at leading organisations. Modernised User Interface: Featuring a sleek dark mode, a rapid UI refresh for enhanced responsiveness, and proven scalability to manage tens of thousands of devices, the platform offers an improved and more efficient user experience as well as the latest in cyber protection. Accelerated Reporting: Organisations can now generate detailed reports across all levels of their security infrastructure hierarchy with unprecedented speed, providing critical insights for proactive threat management and compliance. Streamlined CPS Application and Device Integration: The platform significantly reduces the time required to onboard previously unsupported devices from months to days, ensuring comprehensive coverage and faster time-to-value. AI-Powered Support and Knowledge Base: Leveraging artificial intelligence, Viakoo’s support system now offers intuitive natural language query capabilities and context-aware knowledge base searching, enabling faster issue resolution and improved user experience. Strategic partnerships expand Viakoo Action Platform running directly on the Mercury embedded application Building on its position as the platform with the broadest integration ecosystem in the physical security industry (now exceeding 100 partners), Viakoo announced a key partnership with Mercury Security. Attendees at ISC West can witness the seamless integration of the Viakoo Action Platform running directly on the Mercury embedded application environment in the Mercury booth (#27109). This deep integration provides enhanced security and operational efficiencies for joint customers. Recognising the urgent need to address the rapidly evolving landscape of AI-driven cyber threats, Viakoo is actively engaging with industry leaders and experts. Visionaries The company’s advisory board, including prominent figures like Todd Christensen (Business Information Security Officer, Medical-Surgical Business Unit at McKesson Corporation), Maria Sumnicht (National Director Cybersecurity, Task Force on National and Homeland Security), and Michael Parker (CMO at ReversingLabs) is playing a crucial role in guiding Viakoo’s strategic direction and ensuring its solutions are at the forefront of threat identification and remediation. The Open Letter issued by Viakoo further emphasises the necessity for industry-wide collaboration to establish effective defenses against these sophisticated attacks. Quote from Viakoo CEO “This year at ISC West marks a pivotal moment for the physical security industry as we collectively confront the increasing sophistication of cyber threats,” stated Bud Broomhead , CEO of Viakoo. “The enhancements to our Viakoo Action Platform, coupled with our expanding partnerships and the guidance of our esteemed advisory board, directly address our customers’ urgent need for continuous visibility, operational resilience, and robust security across their physical security and other CPS systems. Viakoo remains dedicated to its vision of autonomously securing these critical environments and eliminating risk.”
WeSuite, the creator of award-winning sales management software for security technology providers, is thrilled to announce its strategic integration with System Surveyor. The pioneer platform for site surveys and system design. Security integrators often face the challenge of helping their customers visualise and fully understand proposed solutions during the sales process. Streamlining proposal process This powerful integration enables users to seamlessly link one or multiple System Surveyor surveys directlyBy integrating the site survey and design directly into the written scope of work within the proposal, customers can easily verify that the solution meets their specific needs. Proposals with clear, well-defined scopes of work streamline the decision-making process, making it faster and easier for customers to sign on the dotted line. This powerful integration enables WeSuite users to seamlessly link one or multiple System Surveyor surveys directly to estimates within the WeSuite platform. The partnership enhances proposal documents by automatically incorporating System Surveyor layouts into specified proposal pages, ensuring consistent, professional presentations that showcase system designs with precision. Seamless system integration “We’re excited to launch this integration with System Surveyor because it’s a natural fit,” said Tracy Larson, President of WeSuite. “WeSuite ensures precision and profitability in estimating and automates generation of proposal and contracts, while System Surveyor brings the design to life.” “Together, our platforms streamline the documentation and management of systems from sales through delivery and ongoing account management." Optimising workflows "This integration with System Surveyor and WeSuite is a great next step to streamline the sales process," said Maureen Carlson, Co-Founder and President of System Surveyor. "Our customer communities want to put their best foot forward to provide a professional design and an easy-to-understand, accurate proposal.” “Together, our platforms enable system integrators to more effectively and efficiently capitalise on the incredible opportunity to serve their customers in a growth market.”
The company announces the release of Ajax DoorBell, with built-in AI, IR sensor, and app control. Ajax DoorBell sets a new standard for the video doorbell experience by combining uninterrupted operation with advanced security features. The device is seamlessly integrated into the Ajax ecosystem and guarantees exceptional efficiency and security confidence. The Doorbell is available for order now. Professional security at the front door DoorBell flawlessly performs its primary function: welcoming guests without making them wait DoorBell flawlessly performs its primary function: welcoming guests without making them wait. As soon as a visitor rings the doorbell, an Ajax user receives a notification, sees who’s at the door, and can start a conversation via an Ajax app. No delays or freezing—proprietary Ajax technologies ensure a clear and seamless exchange on both sides. The DoorBell also functions as a vigilant security camera: it notifies about the movement of people, animals, or vehicles, and records video on the Ajax NVR or Ajax Cloud Storage, which will soon be available among Ajax services. The device also informs security companies even without Wi-Fi–via the Ajax hub. High-image quality image and two-way audio communication Ajax DoorBell offers excellent image quality. It has a 4 MP CMOS camera sensor with HDR technology and IR illumination at a distance of up to 6 metres, so the image is always clear regardless of lighting conditions. The video doorbell implements the company's proprietary solutions for noise and echo cancellation, and it has a significantly higher volume level compared to other devices on the market. AI-driven object recognition The video doorbell has a built-in AI that recognises people, animals, and vehicles. Users can customise detection and receive notifications for all or only a specific type of object. Enhanced Wi-Fi connection with a reliable backup DoorBell is still connected to the Ajax hub thanks to the fallback communication channel The main communication channel is Wi-Fi with a range of up to 500 metres in the absence of obstacles, and up to 30 metres even through concrete walls. This is more than enough for stable operation, for example, in a large private home. For installers, this means less installation hassle, as there’s no need to position the router directly near the entrance. Even if Wi-Fi fails, DoorBell is still connected to the Ajax hub thanks to the fallback communication channel – the Jeweller and Wings radio protocols. Both proprietary protocols are designed to detect interference and jamming, with built-in frequency hopping for enhanced protection. Instant access to footage Thanks to JetSparrow's proprietary video protocol, video is instantly transmitted from the device directly to Ajax applications with minimal delay. This also guarantees data confidentiality, as no third parties are involved in the process. Functionality without aesthetic compromises DoorBell is designed with both function and aesthetics in mind. DoorBell’s compact enclosure fits in the tightest spaces, such as narrow door frames or wall-adjacent doorways. Its minimalist design, available in four neutral colours, complements any exterior. Additionally, a coloured LED ring around the button adds a stylish yet functional element: it guides users and indicates the current state of the device.
Mercury Security, the pioneer in open architecture access control hardware, is launching a new addition to its industry-defining controller platform—the Mercury embedded application environment, an open platform that enables technology partners and OEMs to develop and deploy custom applications directly on Mercury MP Controllers. “We have a lot of exciting things happening at Mercury,” said Steve Lucas, vice president of sales at Mercury Security. “We are excited to show customers the Mercury embedded application environment running on Mercury MP Intelligent Controllers, along with a range of new solutions targeting the platform. We’re giving our partners the ability to develop directly on the controller, unlocking new levels of system intelligence at the edge.” Traditional access controllers Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge—reducing latency, increasing availability and enhancing system redundancy. By shifting intelligence closer to the door, the platform improves system responsiveness, minimises network dependency and enables advanced operational features. It also simplifies interoperability, seamlessly integrating controllers, IoT devices, elevators, readers, locks and more. Access control and IoT ecosystem Mercury embedded application environment delivers unmatched flexibility For access control and IoT ecosystem stakeholders who need a secure, scalable and customisable platform, the Mercury embedded application environment delivers unmatched flexibility—supporting third-party app integration and enabling custom business logic to run directly on the controller. Instead of just linking a reader to a management system for access decisions, Mercury controllers act as a nexus, integrating multiple systems and devices for broader functionality and stronger performance. Intelligent security systems “The access control industry is shifting toward more decentralised, intelligent security systems,” said Daniel Gundlach, vice president, head of Physical Access Control Solutions business unit in North America at HID. “Our embedded application environment gives our partners the tools to build smarter, more adaptable solutions that align with today’s challenges and tomorrow’s opportunities.” Key launch partners and apps Mercury is showcasing the broad capabilities of its embedded application environment in collaboration with key launch partners and their certified apps: ASSA ABLOY HES KS210 OSDP Access Control Server Cabinet Lock: With the Mercury KS210 device app, OEMs can now quickly & easily add support for up to 32 KS210 OSDP server cabinet locks without the need to build custom integrations. HID pivCLASS: Enables pivCLASS support on Mercury MP Intelligent Controllers, adding PKI-based authentication at the door to meet security standards required in government facilities and other regulated industries. SecuriThings: This system-class app simplifies security audits by discovering devices on the network and generating detailed reports on their status, including firmware versions, host connectivity and other key security metrics. Viakoo: This SaaS application maintains system health across CPS environments, such as physical security. System reliability is ensured with real-time monitoring, vulnerability identification, lifecycle data, and other critical details. Viakoo takes action to remediate vulnerabilities with firmware updates, password rotations, and certificate management. New standard in access control Mercury MP Controllers quickly set a new standard in access control, offering unprecedented flexibility Launched in June 2024, Mercury MP Controllers quickly set a new standard in access control, offering unprecedented flexibility. These controllers are the foundation for the Mercury embedded application environment, enabling software providers and integrators to seamlessly combine access control technologies, elevator control, building automation, IoT applications and third-party solutions into a unified, centralised infrastructure. This flexible approach eliminates vendor lock-in and provides the freedom to choose the right solution for specific customer requirements while future-proofing investments. OEMs and integrators Mercury Security, an HID company, has pioneered flexible hardware solutions that empower OEMs and integrators to create best-in-class systems for over 30 years. Mercury MP Controllers support a wide range of consistent standards, including OSDP, MQTT and TLS, ensuring interoperability across access control, building automation and IoT applications. The Mercury embedded application environment is available for developers now.
A rapidly growing European team, exciting new product releases and new look stand are the hallmarks of what looks set to be a calendar highlight for Gallagher Security at this year’s, The Security Event (TSE) in Birmingham next week. In what will be his first major trade show with Gallagher Security, Executive Vice President – Europe, Spencer Marshall says, “TSE is set to be a standout event for Gallagher Europe, with a full strength team in attendance, a number of exciting new product showcases and, as always, a rich opportunity to connect with the wider security industry, we’re looking forward to a really successful event.” Latest innovation in product suite Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch The Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch. QuickSwitch gives businesses a streamlined, simplified pathway to migrate from legacy systems to Gallagher’s world-class security solution. True to its name, installation is fast, reducing labour costs and minimising disruptions typical of a complex migration process. Most importantly, QuickSwitch helps businesses mitigate risks associated with legacy systems, creating peace of mind through a platform that unlocks greater value. With three variants each covering multiple boards, businesses are empowered to make the switch from a multitude of systems. Other powerful enhancements and integrations Also expected to be a major talking point on the Gallagher stand, and available with the upcoming Command Centre v9.30 release, a game-changing solution that redefines remote security. This groundbreaking release makes securing even the most remote assets easier and more cost-effective, while also delivering superior oversight, insight, and control. Launching with a suite of other powerful enhancements and integrations, v9.30 is one of the most advanced, feature-rich releases to date. Cyber advancements and features Gallagher will also be showcasing its multi-award-winning C7000 product range Gallagher will also be showcasing its multi-award-winning Controller 7000 (C7000) product range, including the recently released C7000 Enhanced, tipped as the controller designed with user confidence in mind. Building on the cyber advancements and features of the multi-award-winning C7000 Standard variant released in November 2023, the C7000 Enhanced offers increased reliability, redundancy, and resilience for customers. Gallagher’s award-winning site management platform Visitors to the Gallagher stand will also get to experience the employee badge in Apple Wallet. Released in May 2024, the employee badge in Apple Wallet is fully integrated with Gallagher’s award-winning site management platform, Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Rounding out Gallagher’s innovative solution showcase will be the global manufacturer’s perimeter fence solution, providing a powerful first line of defense for critical sites. Able to detect, delay, and deter intruders, Gallagher’s innovative pulse fencing systems ensure maximum security and compliance. Full strength of the Gallagher Europe team Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April A full-strength Gallagher Europe team will be in attendance, with Gordon Swallow, Sales Manager – UK South and European Technical Manager, Matt Wills taking part in panel discussions during the event. Matt Wills will be joining a discussion hosted by Lee Odess addressing; "Securing Europe's Foundations: Trends and Opportunities in Critical Infrastructure Protection." Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April discussing, "Technologies Shaping the Future of Security Systems: Cloud and AI Technologies," Chaired by Kieran Byrne AXIS Communications. Current and emerging needs of the industry Gallagher Security, Regional Marketing Manager – Europe, Bethan Thompson says, “These events are vitally important to ensure we best understand the current and emerging needs of our industry. The opportunity to come together with Channel Partners, End Users and members of the wider security industry helps us to shape our strategy and cements our commitment to innovating with people at the heart of everything we do.” She adds, “We’re looking forward to another successful event, unlocking greater value for our users, and the wider security industry through the power of our people and our industry-pioneering, innovation solutions suite.” Visit Gallagher Security at TSE, 8-10 April at stand 5/F90.
Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS Security achievement Cequence AWS Security Competency attainment highlights the firm's validated expertise across seven types This Cequence AWS Security Competency achievement highlights the company’s validated expertise across seven foundational categories of cybersecurity use cases: Perimeter Protection, Identity and Access Management, Threat Detection and Response, Infrastructure Protection, Data Protection, Compliance and Privacy, and Application Security. Partners that excel across all seven foundational security categories unlock the exclusive opportunity to qualify for the prestigious 8th designation: Core Security Partner. Each foundational category contains multiple cybersecurity capabilities, each with technical and operational requirements. Cybersecurity solutions from AWS Partners In 2022, AWS revamped the AWS Security Competency program to streamline access for customers, ensuring they can confidently adopt cybersecurity solutions from AWS Partners that have been rigorously validated by AWS. AWS security experts annually validate the tools used and operational processes of each AWS Security Competency partner to address specific cloud security challenges aligned to the categories and use cases that they have applied for. Cequence's advanced expertise commitment AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner The AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner to help them achieve their goals for business risk and cloud strategy confidence. Cequence proudly earns the distinguished AWS Security Competency, underscoring its leadership in API security and bot management making it a premier AWS Partner. This achievement highlights Cequence's advanced expertise and unwavering commitment to delivering cutting-edge cybersecurity solutions that meet AWS's rigorous standards for protecting cloud environments. Agility and innovation of AWS “Cequence is excited to achieve AWS Security Competency status,” said Ameya Talwalkar, CEO at Cequence Security. “This milestone reflects our dedication to empowering organisations to secure their API ecosystems." "By harnessing the agility and innovation of AWS, we equip businesses to defend against sophisticated bot attacks and API abuse, allowing them to focus on growth and innovation with confidence. Together with AWS, we provide the expertise needed to navigate the complexities of API security, ensuring that organisations can operate resiliently and securely.” Advanced cybersecurity solutions AWS empowers organisations, from startups to global enterprises, with scalable, flexible, and cost-effective solutions. To ensure seamless integration and deployment of these solutions, AWS established the AWS Competency Program, designed to help customers identify trusted AWS Partners with deep industry expertise. As an AWS Security Competency Partner, Cequence stands at the forefront, delivering advanced cybersecurity solutions tailored to safeguard cloud environments while leveraging the full power of AWS.


Expert commentary
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasises not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification programme developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The programme emphasises the importance of both physical and digital security, recognising that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardised procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardised procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centres. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasising a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Case studies
Porthaven Care Homes, a provider of high-quality care services in the UK, recently completed the opening of its latest addition, Cavell Park Care Home, located in Maidstone, Kent. This marks another significant addition to their growing portfolio of 18 purpose-built care homes, each designed with a person-centred approach. Located near the historic town of Maidstone, Cavell Park Care Home provides a peaceful and secure environment for up to 80 residents. The care home offers a wide range of services - all within a setting that combines safety, comfort, and aesthetic appeal. Elevating security standards To ensure the safety of residents while also maintaining an inviting atmosphere, Jacksons Fencing was chosen to install a combination of black metal bow-top railings and matching gates at varying heights around the care home. The 1.8-metre-high bow top railings surround the gardens where residents enjoy much of their leisure time, while 1.2 metre high fencing was installed around the car park and entrance. First impressions matter The railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors The design of the bow top railings features rounded pales, posts, and curved hoop tops which score highly for both safety and aesthetics, creating a secure and inviting environment while minimising injury risk. Additionally, the railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors, ensuring that the fencing is resistant to vandalism or break-in attempts. Weather-resistant railings Made from galvanised tubular steel, these railings are strong and weather-resistant. The polyester powder coating ensures a sleek, durable finish that won't crack or peel, offering long-lasting protection against wear and tear. This combination makes the railings both visually appealing and a sustainable investment. The design of the railings complements the home’s contemporary architecture and seamlessly blends with the surrounding landscaped gardens, creating a harmonious and secure environment for residents. Each railing installation is backed by a 25-year Service Life Guarantee from Jacksons Fencing, providing long-term peace of mind that the fencing will continue to deliver security and aesthetic value for years to come. A sense of safety and autonomy The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access Located adjacent to the reception entrance, the garden’s visibility offers visitors and prospective residents immediate assurance that their loved ones are in a safe and welcoming space. The vertical pale design of the fence ensures high visibility, which not only improves supervision but also enhances the autonomy of residents by making them feel connected to the outside world. The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access, while maintaining ease of entry for staff and residents. Bow top fencing and gates Reflecting on the success of the project, Peter Jackson, Managing Director at Jacksons Fencing, commented, “The installation of our bow top fencing and gates has not only provided Cavell Park Care Home with a secure and well-defined perimeter but also ensured exceptional durability. Jacksons Fencing’s products are designed to withstand the test of time, offering long-term protection while retaining an attractive finish." “A care home is more than just a building - it’s a community where safety, comfort, and a sense of belonging are paramount,” continued Peter. “We’re proud to have played a role in bringing this vision to life and blending robust security with sleek design.”
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation. Announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Carbon Cliff-Barstow School District (CCBSD) in Rock Island County, Illinois. Strengthening security with AI The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related eventsThe AI technology will be implemented at the district’s Pre-K through 8th grade school to enhance security and reduce response times in the event of a gun-related threat. The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related events at Illinois K-12 school districts this year alone. Recognising the ongoing threat of gun-related violence, the district is taking an important step by integrating ZeroEyes’ AI gun detection system to further bolster its security measures and protect against potential threats. Commitment to campus safety CCBSD maintains a comprehensive, multi-layered security programme in partnership with the Rock Island County Sheriff's Department to ensure the safety of students and staff. Alongside the district’s school resource officer, CCBSD has invested in a third-party monitored alarm system and recently upgraded its camera infrastructure. An on-site behavioural interventionist is also employed to build strong relationships with students and families. Strengthening security “We take great pride in ensuring the safety and success of all students and staff members at our school,” said Eric Lawson, Superintendent of CCBSD. “By incorporating ZeroEyes, we’re adding another important layer of safety to our campus, and we’re confident that this proactive approach will help us promote a safe learning environment.” Smart solutions with ZeroEyes CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois, part of the Quad Cities region. The district’s mission is to prepare students to be academically successful and career-ready, foster a love for learning, and help students reach their full potential as confident, lifelong learners. The district’s 40 staff members are dedicated to ensuring the safety and educational success of every student. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto CCBSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC. Protecting with precision The industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Innovating school security “The safety of students and staff is a priority for Carbon Cliff-Barstow, and we are honored to play a role in supporting that mission," said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our AI gun detection system will provide the district with the actionable intelligence needed to mitigate potential threats, helping to ensure a safer environment for students and staff."
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced that a pioneering teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). The hospital, known for its forward-thinking approach to medicine and healthcare, is part of the National Health Service (NHS) Trust in the Northeast of the UK. Over the past decade, the hospital has made significant advancements in its security infrastructure, transitioning from analog CCTV systems to a fully IP-based setup. As part of this transformation, the hospital recently installed 25 i-PRO X-Series edge-processing cameras. The hospital's goal was to enhance the security of its large campus using the latest AI-enabled camera technology while optimising operations. The Challenge The main challenge the hospital faced was upgrading portions of its existing security system The main challenge the hospital faced was upgrading portions of its existing security system with state-of-the-art, AI-enabled cameras without exceeding strict public sector budget constraints and with minimal disruption to the daily operations of a busy hospital. Additionally, with a vast campus and numerous security vulnerabilities, the hospital required a solution that could extend the capabilities of existing non-AI cameras while providing enhanced monitoring capabilities. High level of security "The primary challenge was upgrading the system within budget limitations while maintaining a high level of security and operational efficiency," said Chris Lakin, Director at Oracle Vision, the system integrator overseeing the project. "This client wanted a solution that could integrate with their current infrastructure, provide advanced AI capabilities to better protect hospital patients, staff, and assets while being adaptable for future needs." The solution Cameras enabled the hospital to add AI functionality to their existing, non-AI cameras After a detailed assessment, the hospital decided to install i-PRO X-Series edge-processing cameras, a premium and innovative solution that delivers exceptional value while seamlessly integrating with Milestone’s XProtect VMS platform. Importantly, these cameras enabled the hospital to add AI functionality to their existing, non-AI cameras—an innovation that allowed them to maximise the potential of their current equipment without needing to replace all cameras. X-Series AI cameras The X-Series AI cameras are equipped with the AI Processing Relay feature, which allows non-AI cameras, including those from other manufacturers, to gain AI capabilities. Such an approach maximises the life of existing surveillance systems while significantly reducing false alarms. The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras by installing 25 i-PRO X-Series AI cameras and linking them with their existing non-AI models. i-PRO’s AI Processing Relay app The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras "It was a bit of a no-brainer for the hospital. With i-PRO, they didn’t need to replace their entire fleet of cameras to gain important new functionality. We were able to upgrade their existing system by adding AI capabilities to 75 existing non-AI cameras, helping them maximise value while staying within budget,” says Lakin. “The flexibility of i-PRO’s AI Processing Relay app is impressive. It turns any connected camera into an AI-enhanced solution. This system now allows the hospital to achieve a level of security and operational insight that wasn’t previously possible with their older equipment.” Advanced AI capabilities The i-PRO X-Series AI cameras include on-site learning features that allow the hospital’s security team to customise what the cameras can detect and monitor. For example, operators can teach the cameras to recognise specific objects, such as vehicles or individuals, and receive alerts when certain behaviours or activities occur in sensitive areas like emergency entrances. Benefits from AI-driven analytics The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control, identify suspicious behaviour, and even integrate with their Paxton access control system. The cameras are connected to the hospital’s XProtect Smart Wall, where events triggered by AI analytics or access control events, such as a security breach or abnormal behaviour, automatically display on screen, allowing staff to respond in real time. Futureproofing with advanced AI features The i-PRO X-Series cameras utilise Ambarella’s AI SoC (CV52) to provide high-performance edge computing, enabling the hospital to handle complex analytics locally without burdening the network. With the capability to run nine different AI applications, such as i-PRO’s Privacy Guard, which blurs the faces or the entire bodies of patients for privacy, the cameras can allow the hospital to enhance its security while also gathering operational metrics such as tracking the movement of specific equipment or personnel across the campus. Features of i-PRO’s cameras i-PRO’s cameras feature a WDR of up to 144dB, ensuring best image quality i-PRO’s cameras also feature a Wide Dynamic Range (WDR) of up to 144dB, ensuring superior image quality in all lighting conditions. With models offering up to 6MP resolution and IR illumination up to 70 metres, the cameras deliver high-definition video regardless of the environment. Results By implementing i-PRO’s X-Series AI cameras, the hospital has enhanced its security infrastructure while remaining within tight budgetary constraints. The advanced AI capabilities provide the hospital with real-time alerts and automation features that streamline its security operations. Most notably, the flexibility of i-PRO’s cameras allowed the hospital to effectively upgrade 100 cameras with AI features by installing only 25 i-PRO cameras, providing exceptional value while future-proofing its investment.
Interface Systems, a managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, announced that Nicker Management, a fast-food franchise operator in the Los Angeles area, has successfully implemented Interface’s Virtual Security Guard solution. By deploying Interface’s advanced security technology, Nicker Management has enhanced safety, reduced operational costs, and provided a secure environment for employees and customers. Nicker Management Nicker Management, led by sisters Nicole Harper Rawlins (CEO) and Kerri Harper-Howie (Co-owner), operates 24 fast-food restaurants across South LA, Compton, Lynwood, and Carson. Faced with persistent security challenges, including loitering, panhandling, and criminal activity, the company sought a modern, cost-effective solution to protect its employees and guests. Addressing critical security concerns Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants “We’re faced with lots of challenges with crime, unhoused people, and individuals suffering from mental and/or substance abuse issues,” said Harper Rawlins. “It creates significant risk at our restaurants. Over the years, we experimented with a range of security solutions, and hiring on-site guards quickly became costly and unsustainable.” After evaluating various options, Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants, ensuring a proactive and scalable approach to security. How can Virtual Guard Solution help? 24/7 Monitoring & Rapid Response – Trained intervention specialists continuously monitor restaurant locations to deter loitering, panhandling, and aggressive behavior in real time. Automated Voice-Downs – Proactive announcements throughout the day signal active monitoring and reinforce security presence. Virtual Tours – Scheduled and unscheduled remote video assessments help identify threats, suspicious activities, and compliance issues. Employee Security Escorts – Live monitoring ensures employees' safe passage to and from their vehicles during vulnerable times such as shift changes, and opening, and closing hours. Secure working environment “Knowing there’s a professionally trained security team on standby gives us confidence that we can maintain a secure working environment at all hours,” said Harper Rawlins. The deployment of Virtual Guard has streamlined security operations at Nicker Management’s restaurant, allowing staff to focus on providing excellent customer service without the burden of handling security incidents. 24/7 monitoring With 24/7 monitoring by Virtual Guard, employees and customers feel safer, and staff no longer have to handle security threats alone. In addition, automated alerts also remind employees of key procedures during shift changes. The system's effectiveness was demonstrated during a recent incident when a loiterer refused to leave the restaurant lobby. The staff triggered a silent alarm, and the Virtual Guard team immediately responded with a voice-down, prompting the individual to leave without further incident. Optimises costs “Interface’s Virtual Guard solution empowers franchise businesses like Nicker Management to address security risks effectively while optimising operational costs,” said Sean Foley, Chief Revenue Officer at Interface Systems. “Our innovative approach allows employees to focus on delivering excellent service, knowing their safety is in trusted hands.”
Porthaven Care Homes, a provider of high-quality care services in the UK, recently completed the opening of its latest addition, Cavell Park Care Home, located in Maidstone, Kent. This marks another significant addition to their growing portfolio of 18 purpose-built care homes, each designed with a person-centred approach. Located near the historic town of Maidstone, Cavell Park Care Home provides a peaceful and secure environment for up to 80 residents. The care home offers a wide range of services - all within a setting that combines safety, comfort, and aesthetic appeal. Elevating security standards To ensure the safety of residents while also maintaining an inviting atmosphere, Jacksons Fencing was chosen to install a combination of black metal bow-top railings and matching gates at varying heights around the care home. The 1.8-metre-high bow top railings surround the gardens where residents enjoy much of their leisure time, while 1.2 metre high fencing was installed around the car park and entrance. First impressions matter The railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors The design of the bow top railings features rounded pales, posts, and curved hoop tops which score highly for both safety and aesthetics, creating a secure and inviting environment while minimising injury risk. Additionally, the railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors, ensuring that the fencing is resistant to vandalism or break-in attempts. Weather-resistant railings Made from galvanised tubular steel, these railings are strong and weather-resistant. The polyester powder coating ensures a sleek, durable finish that won't crack or peel, offering long-lasting protection against wear and tear. This combination makes the railings both visually appealing and a sustainable investment. The design of the railings complements the home’s contemporary architecture and seamlessly blends with the surrounding landscaped gardens, creating a harmonious and secure environment for residents. Each railing installation is backed by a 25-year Service Life Guarantee from Jacksons Fencing, providing long-term peace of mind that the fencing will continue to deliver security and aesthetic value for years to come. A sense of safety and autonomy The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access Located adjacent to the reception entrance, the garden’s visibility offers visitors and prospective residents immediate assurance that their loved ones are in a safe and welcoming space. The vertical pale design of the fence ensures high visibility, which not only improves supervision but also enhances the autonomy of residents by making them feel connected to the outside world. The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access, while maintaining ease of entry for staff and residents. Bow top fencing and gates Reflecting on the success of the project, Peter Jackson, Managing Director at Jacksons Fencing, commented, “The installation of our bow top fencing and gates has not only provided Cavell Park Care Home with a secure and well-defined perimeter but also ensured exceptional durability. Jacksons Fencing’s products are designed to withstand the test of time, offering long-term protection while retaining an attractive finish." “A care home is more than just a building - it’s a community where safety, comfort, and a sense of belonging are paramount,” continued Peter. “We’re proud to have played a role in bringing this vision to life and blending robust security with sleek design.”
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation. Announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Carbon Cliff-Barstow School District (CCBSD) in Rock Island County, Illinois. Strengthening security with AI The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related eventsThe AI technology will be implemented at the district’s Pre-K through 8th grade school to enhance security and reduce response times in the event of a gun-related threat. The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related events at Illinois K-12 school districts this year alone. Recognising the ongoing threat of gun-related violence, the district is taking an important step by integrating ZeroEyes’ AI gun detection system to further bolster its security measures and protect against potential threats. Commitment to campus safety CCBSD maintains a comprehensive, multi-layered security programme in partnership with the Rock Island County Sheriff's Department to ensure the safety of students and staff. Alongside the district’s school resource officer, CCBSD has invested in a third-party monitored alarm system and recently upgraded its camera infrastructure. An on-site behavioural interventionist is also employed to build strong relationships with students and families. Strengthening security “We take great pride in ensuring the safety and success of all students and staff members at our school,” said Eric Lawson, Superintendent of CCBSD. “By incorporating ZeroEyes, we’re adding another important layer of safety to our campus, and we’re confident that this proactive approach will help us promote a safe learning environment.” Smart solutions with ZeroEyes CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois, part of the Quad Cities region. The district’s mission is to prepare students to be academically successful and career-ready, foster a love for learning, and help students reach their full potential as confident, lifelong learners. The district’s 40 staff members are dedicated to ensuring the safety and educational success of every student. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto CCBSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC. Protecting with precision The industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Innovating school security “The safety of students and staff is a priority for Carbon Cliff-Barstow, and we are honored to play a role in supporting that mission," said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our AI gun detection system will provide the district with the actionable intelligence needed to mitigate potential threats, helping to ensure a safer environment for students and staff."
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced that a pioneering teaching hospital in Northeast England, has enhanced its security infrastructure with i-PRO X-Series cameras integrated with Milestone’s XProtect Video Management Software (VMS). The hospital, known for its forward-thinking approach to medicine and healthcare, is part of the National Health Service (NHS) Trust in the Northeast of the UK. Over the past decade, the hospital has made significant advancements in its security infrastructure, transitioning from analog CCTV systems to a fully IP-based setup. As part of this transformation, the hospital recently installed 25 i-PRO X-Series edge-processing cameras. The hospital's goal was to enhance the security of its large campus using the latest AI-enabled camera technology while optimising operations. The Challenge The main challenge the hospital faced was upgrading portions of its existing security system The main challenge the hospital faced was upgrading portions of its existing security system with state-of-the-art, AI-enabled cameras without exceeding strict public sector budget constraints and with minimal disruption to the daily operations of a busy hospital. Additionally, with a vast campus and numerous security vulnerabilities, the hospital required a solution that could extend the capabilities of existing non-AI cameras while providing enhanced monitoring capabilities. High level of security "The primary challenge was upgrading the system within budget limitations while maintaining a high level of security and operational efficiency," said Chris Lakin, Director at Oracle Vision, the system integrator overseeing the project. "This client wanted a solution that could integrate with their current infrastructure, provide advanced AI capabilities to better protect hospital patients, staff, and assets while being adaptable for future needs." The solution Cameras enabled the hospital to add AI functionality to their existing, non-AI cameras After a detailed assessment, the hospital decided to install i-PRO X-Series edge-processing cameras, a premium and innovative solution that delivers exceptional value while seamlessly integrating with Milestone’s XProtect VMS platform. Importantly, these cameras enabled the hospital to add AI functionality to their existing, non-AI cameras—an innovation that allowed them to maximise the potential of their current equipment without needing to replace all cameras. X-Series AI cameras The X-Series AI cameras are equipped with the AI Processing Relay feature, which allows non-AI cameras, including those from other manufacturers, to gain AI capabilities. Such an approach maximises the life of existing surveillance systems while significantly reducing false alarms. The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras by installing 25 i-PRO X-Series AI cameras and linking them with their existing non-AI models. i-PRO’s AI Processing Relay app The hospital was able to enhance its video protection capabilities with new AI features across 100 cameras "It was a bit of a no-brainer for the hospital. With i-PRO, they didn’t need to replace their entire fleet of cameras to gain important new functionality. We were able to upgrade their existing system by adding AI capabilities to 75 existing non-AI cameras, helping them maximise value while staying within budget,” says Lakin. “The flexibility of i-PRO’s AI Processing Relay app is impressive. It turns any connected camera into an AI-enhanced solution. This system now allows the hospital to achieve a level of security and operational insight that wasn’t previously possible with their older equipment.” Advanced AI capabilities The i-PRO X-Series AI cameras include on-site learning features that allow the hospital’s security team to customise what the cameras can detect and monitor. For example, operators can teach the cameras to recognise specific objects, such as vehicles or individuals, and receive alerts when certain behaviours or activities occur in sensitive areas like emergency entrances. Benefits from AI-driven analytics The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control The hospital also benefits from AI-driven analytics, which helps security staff manage crowd control, identify suspicious behaviour, and even integrate with their Paxton access control system. The cameras are connected to the hospital’s XProtect Smart Wall, where events triggered by AI analytics or access control events, such as a security breach or abnormal behaviour, automatically display on screen, allowing staff to respond in real time. Futureproofing with advanced AI features The i-PRO X-Series cameras utilise Ambarella’s AI SoC (CV52) to provide high-performance edge computing, enabling the hospital to handle complex analytics locally without burdening the network. With the capability to run nine different AI applications, such as i-PRO’s Privacy Guard, which blurs the faces or the entire bodies of patients for privacy, the cameras can allow the hospital to enhance its security while also gathering operational metrics such as tracking the movement of specific equipment or personnel across the campus. Features of i-PRO’s cameras i-PRO’s cameras feature a WDR of up to 144dB, ensuring best image quality i-PRO’s cameras also feature a Wide Dynamic Range (WDR) of up to 144dB, ensuring superior image quality in all lighting conditions. With models offering up to 6MP resolution and IR illumination up to 70 metres, the cameras deliver high-definition video regardless of the environment. Results By implementing i-PRO’s X-Series AI cameras, the hospital has enhanced its security infrastructure while remaining within tight budgetary constraints. The advanced AI capabilities provide the hospital with real-time alerts and automation features that streamline its security operations. Most notably, the flexibility of i-PRO’s cameras allowed the hospital to effectively upgrade 100 cameras with AI features by installing only 25 i-PRO cameras, providing exceptional value while future-proofing its investment.
Interface Systems, a managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, announced that Nicker Management, a fast-food franchise operator in the Los Angeles area, has successfully implemented Interface’s Virtual Security Guard solution. By deploying Interface’s advanced security technology, Nicker Management has enhanced safety, reduced operational costs, and provided a secure environment for employees and customers. Nicker Management Nicker Management, led by sisters Nicole Harper Rawlins (CEO) and Kerri Harper-Howie (Co-owner), operates 24 fast-food restaurants across South LA, Compton, Lynwood, and Carson. Faced with persistent security challenges, including loitering, panhandling, and criminal activity, the company sought a modern, cost-effective solution to protect its employees and guests. Addressing critical security concerns Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants “We’re faced with lots of challenges with crime, unhoused people, and individuals suffering from mental and/or substance abuse issues,” said Harper Rawlins. “It creates significant risk at our restaurants. Over the years, we experimented with a range of security solutions, and hiring on-site guards quickly became costly and unsustainable.” After evaluating various options, Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants, ensuring a proactive and scalable approach to security. How can Virtual Guard Solution help? 24/7 Monitoring & Rapid Response – Trained intervention specialists continuously monitor restaurant locations to deter loitering, panhandling, and aggressive behavior in real time. Automated Voice-Downs – Proactive announcements throughout the day signal active monitoring and reinforce security presence. Virtual Tours – Scheduled and unscheduled remote video assessments help identify threats, suspicious activities, and compliance issues. Employee Security Escorts – Live monitoring ensures employees' safe passage to and from their vehicles during vulnerable times such as shift changes, and opening, and closing hours. Secure working environment “Knowing there’s a professionally trained security team on standby gives us confidence that we can maintain a secure working environment at all hours,” said Harper Rawlins. The deployment of Virtual Guard has streamlined security operations at Nicker Management’s restaurant, allowing staff to focus on providing excellent customer service without the burden of handling security incidents. 24/7 monitoring With 24/7 monitoring by Virtual Guard, employees and customers feel safer, and staff no longer have to handle security threats alone. In addition, automated alerts also remind employees of key procedures during shift changes. The system's effectiveness was demonstrated during a recent incident when a loiterer refused to leave the restaurant lobby. The staff triggered a silent alarm, and the Virtual Guard team immediately responded with a voice-down, prompting the individual to leave without further incident. Optimises costs “Interface’s Virtual Guard solution empowers franchise businesses like Nicker Management to address security risks effectively while optimising operational costs,” said Sean Foley, Chief Revenue Officer at Interface Systems. “Our innovative approach allows employees to focus on delivering excellent service, knowing their safety is in trusted hands.”


Round table discussion
2025 is likely to see further advancements in artificial intelligence, with potential impacts on various aspects of society, including the security industry. The new year will also require security professionals to adapt to changing market conditions and develop contingency plans for unforeseen events. Industry changes will accelerate and challenge everyone in the security market to keep up. Making specific predictions for the new year can be a struggle, but we asked our Expert Panel Roundtable: What will be the big news for security in the year ahead?
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Products

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download