SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
    • Fischer's new rugged USB-C with RLS system
    • Trustonic joins RISC-V for hardware security solutions
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    46th IEEE Symposium on Security and Privacy

    46th IEEE Symposium on Security and Privacy

    Gartner Data & Analytics Summit London 2025

    Gartner Data & Analytics Summit London 2025

    Libya Build Tripoli 2025

    Libya Build Tripoli 2025

    Imagine 2025

    Imagine 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Data loss prevention
  • The Security Event 2025
  • How is AI transforming security?
  • Design vs systems
  • 6

Artificial intelligence (AI)

  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
  • More
    How is AI changing the security market?

    How is AI changing the security market?

    Expert panel
    Optimise your business with analytics and AI

    Optimise your business with analytics and AI

    White paper
    How to drive B2B security & operations with smart surveillance

    How to drive B2B security & operations with smart surveillance

    White paper
    3 reasons why you haven’t adopted AI into your surveillance operation and why you can now

    3 reasons why you haven’t adopted AI into your surveillance operation and why you can now

    Expert commentary
    Looking back at 2020: AI transitions from buzzword to a vital tool

    Looking back at 2020: AI transitions from buzzword to a vital tool

    Editor's opinion

    News

    Trustonic joins RISC-V for hardware security solutions
    Trustonic joins RISC-V for hardware security solutions

    Pioneering cybersecurity business, Trustonic, has announced its new membership of RISC-V International to provide increased access to hardware-backed security. Established in 2010, RISC-V International is the non-profit home of the open standard RISC-V Instruction Set Architecture (ISA), related specifications, and stakeholder community.  Advanced technology systems RISC-V enables its growing community to develop custom processors for a variety of applications Now boasting more than 4,500 members across 70 different countries, RISC-V enables its growing community to develop custom processors for a variety of applications, from embedded designs to supercomputers. Established in 2012, Trustonic delivers advanced technology systems to drive innovation, protect revenue, and enhance security for device manufacturers worldwide. RISC-V security standards Through its advanced Trusted Execution Environment (TEE) Kinibi, Trustonic successfully protects 2.5 billion connected devices and counts the world’s leading automotive manufacturers, financial institutions, and mobile operators as its customers. In announcing its new membership of RISC-V, Trustonic can now support the community with hardware-backed security for chip design and manufacture. Aside from providing access to a proven, pre-integrated Secure OS solution underpinned by Kinibi, this new membership will enable the RISC-V community to adhere to the forthcoming RISC-V security standards for A class deployments, set to be announced in the near future. Standards for hardware-backed security Trustonic can now support the ward with hardware-backed security for chip design and manufacturing Andrew Till, General Manager of Secure Platform for Trustonic, confirmed: “I am delighted share that we have joined the RISC-V community. RISC-V has built up tremendous momentum over the last decade and we see many of our customers actively planning to embrace RISC-V solutions." "By becoming a member and working together on the standards for hardware-backed security we will be able to ensure that silicon vendors and device OEMs alike can implement advanced security measures knowing that their investments will be based on open standards for the long-term." RISC-V support Andrew Till added: "By adding RISC-V support to our existing ARM solutions, we are, we can provide our customers with the freedom to select the platform that is right them while being able to leverage and re-use all their existing investments in our Kinibi Secure OS platform." "This is something the team and I are incredibly excited about as Trustonic continues its journey a pioneering, global force in embedded security.” Headquartered in Cambridge, UK, Trustonic was initially created from a joint venture between ARM, Thales, and G&D.

    TrackTik Command Centre: Revolutionising security ops
    TrackTik Command Centre: Revolutionising security ops

    Trackforce, a pioneer in security workforce management software, announced the launch of the TrackTik Command Centre, a next-generation dispatch and incident management solution designed to streamline security operations, accelerate incident response times, and unify team coordination across security environments.  Despite heavy investment in security, where 53% of organisations annually allocate up to $5 million, many rely on manual notification processes that slow down response times during incidents. Security operations and strategic responses TrackTik Command Centre has modernised contact, real-time coordination, and rapid dispatch abilities With 79% of security pioneers agreeing that faster, more automated workflows are essential to reducing delays, the TrackTik Command Centre delivers modernised communication, real-time coordination, and rapid dispatch capabilities security teams need to protect assets, people, and operations more effectively.  “Every second counts when responding to a security incident,” said James Benum, CPO of Trackforce. “As physical threats evolve and teams are stretched thin, security operations need better tools that enable swift and strategic responses. The TrackTik Command Centre is purpose-built to help operators with the visibility and structure they need to manage incidents confidently, no matter how complex the environment.” Network of subcontractors Operators now face fragmented systems, limited patrol visibility, and inconsistent procedures that hinder effective response. The TrackTik Command Centre replaces these disjointed workflows with a centralised, real-time interface that unifies alerts, patrol tracking, response protocols, and integrated vendor management. This enables security operations to easily leverage a network of subcontractors to deliver consistent, high-quality service. Key features One-Window View: Consolidates scattered information into a single workspace for tracking incidents, patrol locations, and dispatching security personnel. Standardised Response Procedures: Provides clear, structured call-to-action protocols, ensuring consistent incident management across all team members. Map and Dispatch Monitoring: Enables instant identification and dispatch of the nearest patrol officers, reducing response times and enhancing situational awareness. Scalable Integration: Offers a robust open API to enable deep integration with intelligent camera systems, AI-driven threat detection solutions, remote guarding technologies, and other security infrastructures. Vendor Management: Facilitates controlled access for contracted security operators, ensuring consistent policy implementation and data access. Physical and remote guarding As the security industry increasingly shifts toward hybrid models that blend physical and remote guarding, the TrackTik Command Centre provides a foundation that supports current operational needs while enabling future innovation. Its scalable design supports automation, integrates with emerging technologies, strengthens compliance, and clarifies mission-critical tasks. Whether responding to building alarms, tracking missed shifts, or dispatching based on AI-detected threats, the TrackTik Command Centre ensures that teams can act decisively, backed by speed, structure, and complete oversight.

    Verkada dual-head camera: Enhanced security features
    Verkada dual-head camera: Enhanced security features

    Verkada, a pioneer in cloud-based physical security, announced its new dual-head camera and enhanced alerting capabilities on its Command platform, along with a wide range of updates that will make it even easier for its customers around the world to keep their people and places safe.  Verkada is expanding its multisensor line with a new dual-head camera, the CY53-E Two-Camera Multisensor. With two viewing angles from a single install point, an advanced onboard processor, and 2.55x optical zoom in each sensor, organisations can minimise potential blindspots, with increased visibility and AI-based analytics and alerts. Integrate Verkada Guest Verkada introduced enhanced alerting abilities that enable clients to integrate Verkada Guest Verkada also introduced enhanced alerting capabilities that enable customers to integrate Verkada Guest, LPR, Alarm events, and Helix events into Verkada's Alert Inbox. This means that security teams at a manufacturing site can now receive an alert anytime a visitor or contractor arrives on-site, or a luxury retailer can get an alert anytime a customer purchases a specific high-value product. This will significantly enhance its customers' ability to monitor, assess, and respond to critical issues. Verkada's new product and feature "Each new product and feature that we introduce is purpose-built to serve our customers' evolving needs," said Brandon Davito, Senior Vice President of Product and Operations at Verkada. "Whether it's our new two-camera multisensor to monitor entry and exit points more effectively or our customisable, cross-product alerting capabilities, every addition to Verkada's platform is designed to support efficient enterprise deployments today and scale with our customers into the future." Range of additional products and platform updates Verkada also announced a range of additional product and platform updates, including: Deeper integration between Alarms and Access Control with the addition of door event triggers – door opened, door held open, and door forced open events – to the Verkada Alarms solution. Like intrusion sensors, any access control alarm trigger can be assigned to alarm partitions, paired with cameras for video verification, and subject to the same arm/disarm methods as schedules or key codes. Features designed for enhanced emergency response with Verkada's Intercom, including the ability to create a unique, local phone number associated with outgoing Intercom calls. This not only gives organisations more visibility and the ability to call and "talk down" to a specific intercom, but also enables them to configure 911 dialling for blue light deployments or emergency scenarios.  Continued improvement to the visitor experience with an expanded set of on-demand credentials that organisations can grant for temporary building access, which now includes PIN and QR code options, as well as a new Cisco Meraki integration that provides guests with automatic access to the WiFi network at check-in.  Enhanced features and functionalities that speed up investigations, including the ability to group persons of interest into lists and the expansion of History Player Search to include vehicles. New deterrence capabilities, with a wireless siren and strobe that can be triggered by Verkada Alarms. Verkada is also enhancing large site support across its Alarms product with the ability to now connect an unlimited number of its BK22 keypads with one ethernet drop and reducing wiring costs with the ability to daisy-chain up to four of its BE32 expanders. Enhanced functionality for customers on-the-go with Verkada Guest, LPR functionality, Floorplans, and "My Account" page now available in the Command mobile app.  Refreshed UI and search experience in Command that will make it even easier for security administrators to navigate their settings on Verkada's platform, with instant filtering and new feature groupings. Verkada customers can now simply type keywords related to any Command admin setting and find what they need.

    Suprema launches BioStar Air-AI access control solution
    Suprema launches BioStar Air-AI access control solution

    Suprema, a pioneer in AI-powered access control and security solutions, officially announced the launch of BioStar Air, the first and only cloud-based access control platform designed to natively support biometric authentication. Featuring true zero-on-premise architecture, BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings. Cloud-based access control First showcased at ISC West 2025, BioStar Air sets a new standard for cloud-based access control First showcased at ISC West 2025, BioStar Air sets a new standard for cloud-based access control. Unlike traditional systems tied to on-premise servers and controllers, BioStar Air is built entirely in the cloud.  Smart readers with built-in controllers connect directly to the network, streamlining installation, reducing infrastructure costs, and making it simple to scale across multiple locations. Key innovation in BioStar Air A key innovation in BioStar Air is its native biometric support. By processing biometric data at the edge, the platform ensures fast, reliable authentication even during network outages. Thanks to its federated architecture, employees can use the same face or finger template company-wide. BioStar Air supports a wide range of credentials, including facial authentication, RFID cards, mobile access, and QR codes. Fingerprint recognition and Apple Wallet support are coming soon. Intuitive web and mobile interfaces Intuitive web and mobile interfaces give administrators the power to manage users and devices Intuitive web and mobile interfaces give administrators the power to manage users and devices in real time from anywhere. Built for modern, distributed workplaces, BioStar Air helps organisations to centralise access control across multiple sites with minimal hardware, rapid onboarding, and uncompromising security. Future of access control “Building access control infrastructure can be overwhelming, with servers, controllers, and endless IT overhead,” said Hanchul Kim, CEO of Suprema Inc. “With BioStar Air, we’ve thrown all that out to deliver on our vision for the future of access control: cloud first, biometric-native, and effortless to scale. Organisations can finally gain the flexibility and confidence they need to secure today’s mobile, distributed workplaces.”

    View all

    Expert commentary

    How AI-powered security systems tackle shrinkage and boost operational efficiency
    How AI-powered security systems tackle shrinkage and boost operational efficiency

    For businesses today, loss prevention is no longer just about safeguarding inventory from theft. While retail theft makes frequent headlines in the United States, and is indeed the leading cause of shrinkage, The National Retail Foundation (NRF) has reported that process failures, operational inefficiencies and employee theft also drive significant losses. Legacy security systems In 2022, the shrink loss is estimated to be $ 120 billion in the United States, and that’s for retail alone. Industries like hospitality, healthcare, manufacturing, and transportation all face similar challenges even though loss and inefficiency take different forms in each of these fields. As shrinks from theft and operational inefficiency have already put margins of companies under pressure, we are increasingly seeing more businesses demand AI-powered security systems with advanced video analytics, capable of addressing both security and operational inefficiencies that their legacy security systems could not.  Understanding the full scope of loss Package theft is a common problem in commercial buildings, with which box detection in mailrooms Starbucks’ recent announcement of reinventing its franchise operation due to faltering sales is a great example of how operational efficiency can take a toll on business revenue. In restaurants or hotels, failing to anticipate customer flow can lead to long wait times or inefficient use of staff, frustrating guests.  Take, for example, in hospitals, inefficient patient flow management can lead to overcrowded waiting areas and delays in care, compromising patient health. Similarly, in manufacturing, poorly optimised assembly lines create production bottlenecks, delaying output and raising overhead.  Package theft is another common problem in commercial buildings, with which package detection in mailrooms can mitigate loss from deliveries. These invisible leaks creepingly drain profits across industries, and require future-proof solutions that not only confirm what’s already known but also provide actionable insights for improvement.  Transforming security into a powerhouse for efficiency Progress continues to advance across these areas, fuelling optimism for what lies ahead. Thanks to the rise of artificial intelligence and data analytics, some security solutions are already integrated with facial recognition and licence plate detection capabilities, as well as Virtual Fences that help ensure that only authorised personnel or vehicles enter sensitive areas. This can be especially useful for manufacturing environments, where controlling access to high-risk zones and protecting valuable assets are critical. Some modern security systems can even offer more than a watchful eye, doubling as a data analytic tool beyond traditional surveillance limits. Heat mapping in security AI technology Heat mapping in security AI technology analyses ways of movement and behaviour in a retail environment Modern security systems are now capable of tracking foot traffic, analysing customer behaviour, and even identifying bottlenecks in real time by incorporating different technologies such as heatmapping, people counting and queue length monitoring for long lineups. Heat mapping in security AI technology analyses patterns of movement and behaviour in a retail environment by visually representing areas with high foot traffic. With tracking over time and identifying potential vulnerable and hot spots for potential theft and fraud, resulting in change of store layout, deploy additional resources in high traffic areas and physical security placement.  Predictive security analytics AI people counting in security utilises sensors and cameras to accurately track the number of individuals entering and exiting a space in real time. This data helps businesses optimise staffing levels, enhance customer experience, and improve overall operational efficiency by aligning resources with foot traffic trends. Predictive security analytics, such as heat mapping and people counting, are not new inventions. But I believe the ability to integrate all these functionality into a single system will allow these technologies to further mature and expand their footprint in near future. Rather than relying on separate tools for each business function, businesses can now use a single, integrated system to gather actionable data while continuing to secure protection through video surveillance. You Can’t Manage What You Can’t Measure AI-powered security systems give businesses access to a wealth of data that they can use AI-powered security systems give businesses access to a wealth of data that they can use to precisely pinpoint where losses are happening. This is key to solving the problem of shrinkage, which often goes beyond simple theft.  Consider the Starbucks case mentioned earlier, while Starbucks hasn't specified how it plans to achieve operational efficiency to “enhance the cafe experience”, an AI-powered security system could provide an all-encompassing solution to minimise bottlenecks during peak hours, optimise store layouts, and allocate staff more efficiently.  The impact of this technology can be tremendous as it not only enhances the customer experience but also reduces inefficiencies that contribute to lost revenue. By analysing patterns,  conducting Forensic Review with Smart Search to quickly locate incidents, and understanding the root causes of loss, companies can implement targeted solutions that reduce shrinkage and streamline operations. Future-proof solutions Walmart is using foot traffic analytics to predict demand and manage inventory Companies like Walmart are already using foot traffic analytics to predict demand and manage inventory. But beyond basic predictive inventory analysis and crowd control, the data gathered will have the potential to be combined with other business functions, smart energy management, pricing and marketing strategy, just to name a few.  Investing in a security system that integrates AI video analytics, such as package detection, queue length monitoring, and Virtual Fences, can provide future-proof solutions that also enhance operational efficiency. Looking ahead With New York State's introduction of new Retail Security measures to encourage businesses to strengthen their security, we've seen increased interest. However, modern security systems with real-time analytics are now offering companies more than just protection—they’re providing valuable insights into operations, transforming security from a cost burden into a powerful tool for growth and efficiency. As businesses continue to adopt AI-powered security systems, it's clear that the role of security is evolving beyond traditional surveillance. These advanced systems are no longer just about protection, but help businesses grapple with increasingly complex challenges. By transforming security from a reactive expense into a proactive, data-driven asset, companies can stay ahead of the curve, managing not only what they can see, but also what they’ve been missing.

    AI in the GSOC: Using practical innovation to create value
    AI in the GSOC: Using practical innovation to create value

    From where I sit in talking to security pioneers every day, the traditional Global Security Operations Centre (GSOC) stands at a critical inflection point. Security teams are up against challenges in staffing, operational efficiency, and more threat complexity, which means “thinking outside the box” is becoming critical. The use of artificial intelligence (AI) is emerging as more than a buzzword in these situations; it’s becoming a game-changing force multiplier in security operations. Reaching a breaking point Today's GSOCs face a perfect storm of operational challenges. Security operators, typically earning between $20-40 per hour, require extensive training periods lasting weeks or months as a result of the numerous applications they’re tasked with using. Yet the industry grapples with insane turnover rates of 100-% to 300% annually, creating a costly cycle of continuous recruitment and training. Meanwhile, operators are drowning in video feeds and alarms, leading to fatigue, missed incidents, and delayed response times. Practical applications for AI The reality of many GSOCs, however, is a disjointed mess of multiple applications The GSOC is the centre of an organization’s security and in a perfect world, all of the data related to safety across multiple facilities flows through there, giving operators a clear picture of what’s going on at any given time. The reality of many GSOCs, however, is a disjointed mess of multiple applications. Think about all the platforms needed to respond to a single incident – access control alarm, video to verify, standard operating procedures (SOPs) stored on a shared drive, radios to get a hold of a guard to dispatch, finding a list of emergency numbers and corresponding it to where the incident is happening, and manually logging the results. Steps into a single platform Not only is there a case for unifying all of these steps into a single platform that pulls in data from various sources, but layering response with AI-enabled technology to achieve the following: Real-time video analysis and threat detection. AI-enabled systems are revolutionising surveillance operations by simultaneously monitoring multiple video feeds, detecting and classifying objects, people, and behaviours in real-time. The technology excels at identifying suspicious activities such as loitering, abandoned objects, or unauthorised access attempts, automatically alerting operators to potential threats – or even identifying false alarms that can take human operators away from the work they’re doing – all while maintaining vigilance across numerous camera feeds. Intelligent alarm management. One of AI's most immediate impacts is in addressing the chronic problem of false alarms. By analysing multiple data points simultaneously, AI technology can intelligently filter and verify alerts, dramatically reducing false positives that traditionally consume valuable operator time. An AI GSOC operator, for example, can assess an incoming alarm and either identify it as a real threat (then escalate to its human supervisors) or use SOPs to determine that the alarm is false, providing feedback and reasoning that’s collected and assessed. This intelligent triage ensures security teams focus on genuine threats rather than chasing false alarms, significantly improving response efficiency. Automated incident response. When security incidents occur, AI systems can instantly gather relevant data from multiple sources – including video feeds, access control logs, and sensor data – to generate preliminary incident reports and initiate appropriate response protocols. This automation ensures consistent application of security procedures while maintaining detailed documentation for compliance and analysis purposes. Predictive analytics and pattern recognition. By analysing historical data, AI systems can identify patterns that might indicate emerging security risks before they materialise. This includes detecting unusual access patterns, anomalies in foot traffic, or behavioural patterns that suggest potential future security threats, enabling proactive rather than reactive security measures. The benefits to the business While AI can be used in so many ways to reduce false alarms, create more efficiencies, and help GSOC operators elevate their roles to be more strategic, there is still a stigma associated with its use. However, a lot of the conversations around this kind of investment can be elevated to reflect positively on the business, which can help achieve more buy-in from leadership. Here are some of the ways: Operational improvements: Dramatic reduction in false alarm rates through intelligent verification systems that analyse multiple data points simultaneously Response times cut significantly through automated triage and threat assessment protocols Standardised and consistent application of security protocols across all shifts and incidents More efficient resource allocation through AI-driven staffing recommendations based on historical patterns Expanded security coverage without proportional staffing increases, enabling monitoring of multiple locations simultaneously Enhanced incident documentation through automated report generation and data collection Improved situational awareness through real-time correlation of multiple data sources Reduced training time for new operators through AI-assisted guidance systems Better compliance management through automated protocol enforcement and documentation Business impact: Significant cost savings through reduced false alarm response and more efficient staffing Decreased liability exposure through comprehensive incident documentation and consistent protocol application Enhanced regulatory compliance through automated record-keeping and standardised procedures Improved risk management through predictive analytics and early warning capabilities Better return on investment for security technology through integrated AI-driven optimization Increased scalability of security operations without proportional cost increases More robust business continuity through improved threat detection and response Enhanced protection of critical assets through constant AI monitoring Personnel impact: Reduced operator burnout through automation of routine and repetitive tasks Enhanced job satisfaction as operators focus on strategic decision-making rather than routine monitoring Improved work-life balance through more efficient resource allocation New career development opportunities in AI-enabled security operations Better retention rates through reduced stress and increased job engagement Enhanced skill development as operators learn to work with advanced technology Improved team collaboration through AI-assisted information sharing More effective decision-making support through AI-driven insights Greater operator confidence through AI-backed verification of security events AI and the road ahead Integration of AI into the GSOC is about more than simply technological advancement While security historically hasn’t changed as quickly as its cyber counterparts, its evolution is imminent. Integration of AI into the GSOC is about more than simply technological advancement; it’s a seismic shift in how organisations approach security operations. The future of this is in the partnership between human expertise and AI capabilities, where technology handles routine monitoring and initial threat assessment, allowing security personnel to focus on complex decision-making and strategic security initiatives. Transformation of security operations For security pioneers looking to implement AI in their GSOCs, success lies in thoughtful integration that considers both technical requirements and human factors. By carefully balancing automation with human oversight, organisations can create more effective, efficient, and responsive security operations that deliver tangible value to the enterprise. The transformation of security operations through AI isn't just about doing more with less – it's about doing better with what we have. As threats become more sophisticated and security demands continue to grow, AI-enabled GSOCs will be better positioned to meet these challenges while delivering enhanced protection for people, assets, and operations.

    How open source intelligence is transforming the fight against gift card fraud
    How open source intelligence is transforming the fight against gift card fraud

    A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Fraud - a growing concern While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards  Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies.  They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are empowered to improve the monitoring and analysis of gift card transaction patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Leveraging Latest AI And LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift cards, customer trust, and brand integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams, as well as customer trust and brand integrity.

    View all

    Security beat

    ISC West update: New SoCs inside cameras drive intelligence at the edge
    ISC West update: New SoCs inside cameras drive intelligence at the edge

    For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability.  Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras.  Axis Communications’ ARTPEC-9   Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.

    Acre is propelling deployment of generative AI for access control
    Acre is propelling deployment of generative AI for access control

    AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope  For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organisations modernise their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximising value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritising interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio.  This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities. {##Poll1743085396 - What is the biggest challenge you face with your current access control system?##}

    Looking ahead to ISC West 2025: Q&A with Mary Beth Shaughnessy
    Looking ahead to ISC West 2025: Q&A with Mary Beth Shaughnessy

    As the pioneering security event in the United States, ISC West is truly the global focal point for bringing together professionals across the physical and cybersecurity landscape. The event seeks to showcase innovation in security technology, nurture professional development, and explore the security implications of today’s connected world. Future of security  With the growth of cybersecurity programming and the established Cybersecurity & Connected Internet of Things (IoT) pavilion, ISC West is addressing the future of security head-on. “As the lines between the digital and physical worlds blur, collaboration and shared learning among defenders have never been more critical,” says Mary Beth Shaughnessy, Event Vice President at RX USA, who oversees all aspects of the ISC brand. Shaughnessy previews what’s new at ISC West 2025 and shares other insights in our interview. Q: For long-time attendees at ISC West, what will be the biggest surprise at the 2025 show? Shaughnessy: Long-time attendees know to expect top-tier educational content through the SIA Education@ISC West program (produced by the Security Industry Association (SIA)) in addition to cutting-edge security innovations showcased by 700+ exhibitors. New this year is our focus on technology, training, and education around cyber-physical threats. In today’s connected world, physical and cybersecurity defenders must take a unified, holistic approach to protecting their people, assets, and data. ISC West serves as a bridge between those two worlds, helping organisations tackle the complex security landscape. Q: Presenting a high-profile music concert as part of ISC West is a fun value-add for attendees. Describe how this feature has been embraced by longtime attendees, and the plans for 2025. Shaughnessy: We’re thrilled to announce that the legendary Gin Blossoms will headline the ISC West Concert, sponsored by Wavelynx. This tradition began last year and became a celebrated highlight, offering professionals a chance to unwind and connect with colleagues and peers after a productive day on the show floor. When choosing a performer, we focus on acts that resonate across generations, making the experience both entertaining and memorable for our diverse audience. We are excited to continue this fun and exciting event and networking opportunity. Q: In the past, the education program at ISC West has been seen as secondary to the Expo event. How have you sought to increase the profile of the education program, and what new features will attract more attendees in 2025?   Shaughnessy: We’ve expanded the SIA Education@ISC programming from three to four days, now beginning two days before the expo hall opens. These dedicated education days ensure professionals can engage in thoughtful discussions and gain actionable insights without overlapping with the Expo. This year, we’re proud to partner with RSA to introduce a new “IT for Security Professionals” track while also offering our core tracks, including AI & Digital Transformation, Critical Infrastructure & Data Protection, Cybersecurity & IT, InfraGard National Members Alliance @ ISC, and Video Surveillance. We will also be welcoming powerful keynote speakers — Rachel Wilson, Director of Cybersecurity, Morgan Stanley Wealth Management; Will Bernhjelm, Vice President of Security, Mall of America; and Kate Maxwell, Chief Technology Officer, Worldwide Defense & Intelligence, Microsoft. Q: What else is “new” at ISC West in 2025? Shaughnessy: Our educational programming has grown significantly — this year’s SIA Education@ISC program is our most extensive yet, offering more than 115 sessions led by over 200 distinguished experts. With broader and deeper topics, the program emphasises the critical convergence of cyber and physical security, providing unparalleled insights for today’s security professionals. We are also significantly ramping up our cybersecurity offerings and expect to have more than 50 exhibitors in our Cybersecurity & Connected IoT pavilion with names such as Entrust and Ontic. Q: Networking is a critical aspect of ISC West. How are show organisers working to increase networking opportunities? Shaughnessy: Networking remains a top priority at ISC West, with countless opportunities to build valuable connections. Professionals can join peers at popular spots like The Bridge, The Cyber Hub, and the Career Zone (sponsored by: TEECOM). These spaces offer the chance to learn from industry experts, explore the challenges and innovations shaping the security workforce, and engage in dynamic discussions with peers. Also, returning by popular demand, the ISC West Concert, proudly sponsored by Wavelynx, delivers a vibrant evening of music and networking in a relaxed atmosphere. Together, these experiences ensure networking at ISC West is both impactful and memorable. Q: What is the biggest challenge for organisers of ISC West (and related events), and how are the organisers seeking to address the challenges? Shaughnessy: As with most events, there is a lot of pressure on organisers to ensure there’s “something for everyone,” add meaningful value, and introduce fresh, exciting features. At ISC West, we work to raise the bar each year by expanding our content with more thought pioneers, showcasing a broader range of innovative technologies, and fostering additional networking opportunities. Achieving top-quality results is no small task — it demands careful planning, collaboration, and a dedication to continuous improvement. This means actively listening to the needs of our attendees and exhibitors, staying ahead of industry trends, and ensuring we provide an experience that informs, inspires, and connects the security community.

    View all

    Case studies

    SharpEagle boosts UK warehouse safety with Radar Tech
    SharpEagle boosts UK warehouse safety with Radar Tech

    Forklift collisions cost UK businesses over £100 million annually in workplace injury claims and equipment damage, according to HSE statistics. SharpEagle Technology, a globally renowned provider of industrial safety solutions, has announced a significant breakthrough in warehouse safety across the UK. Facilities that adopted SharpEagle’s Radar Blind Spot Detection System have reported up to 70% reduction in forklift-related accidents, marking a major milestone in workplace safety. The UK's blind spot crisis With over 1,300 forklift-related incidents reported to HSE each year, many involving serious injuries, UK regulators are pushing for smarter safety solutions. Traditional mirrors and cameras frequently fail in: Rainy loading docks Dusty manufacturing plants Crowded retail distribution centres Visual and audible signals The system, which uses radar sensors to monitor blind spots and detect real-time sign around forklifts The system, which uses radar sensors to monitor blind spots and detect real-time movement around forklifts, has proven to be a game changer in accident prevention.  It immediately alerts operators through visual and audible signals when people or objects enter dangerous proximity zones, reducing the likelihood of collisions, especially in busy loading docks and narrow warehouse aisles. Real-time awareness "In a typical warehouse, poor visibility and human error can lead to severe accidents. Our technology gives operators real-time awareness they didn’t have before," said the UK Business Head of SharpEagle Technology, adding "The impact has been measurable. Clients report fewer incidents, improved productivity, and safer working conditions." Adoption growing across logistics  The system offers cost-effective safety enhancement without the need for vehicle relief The Radar Blind Spot Detection System has quickly gained popularity among UK logistics providers, manufacturing units, and retail distribution centres — sectors where high forklift traffic and pedestrian movement often intersect. By integrating with existing forklift infrastructure, the system offers cost-effective safety enhancement without the need for vehicle replacement. It is also compatible with SharpEagle’s wider range of forklift safety solutions, including AI-based camera systems and anti-collision lights. Regulatory & insurance benefits In addition to preventing injuries, the deployment of radar-based detection systems has helped warehouses comply with UK Health and Safety Executive (HSE) guidelines. Several facilities have seen a reduction in insurance claims and premiums, along with fewer incidents of lost workdays due to injury. "Workplace safety is not just a legal requirement — it’s a business imperative. This technology ensures companies are equipped to meet the demands of a modern, high-speed supply chain without compromising on the well-being of their workforce."

    Omnilert AI enhances security at Amerant Bank
    Omnilert AI enhances security at Amerant Bank

    Omnilert, a pioneer in AI-driven safety solutions and AT&I Systems, announced that Amerant Bank has chosen Omnilert’s AI technology to help bolster the security at all of its locations in Florida. AT&I Systems, a longtime security partner of Amerant Bank, was chosen as the security integrator. Omnilert’s software, which recently received the full SAFETY Act Designation by the U.S. Department of Homeland Security (DHS), will be integrated into more than 160 existing Amerant Bank cameras to provide advanced 24/7 surveillance with automated response capabilities. Key layer of security “Omnilert technology has become a key layer of security that can transform traditional surveillance capabilities and ensure a fast, robust and automatic response in an emergency,” said Dave Fraser, CEO of Omnilert. “With our software running non-stop in the background, Amerant can focus on carrying out their daily business knowing their workers and patrons are being kept safe from harm.” New and innovative ways to enhance the safety “At Amerant Bank, we are always looking for new and innovative ways to enhance the safety of our bank locations, and Omnilert’s AI technology will be an important part of our overall security infrastructure,” said Orlando Gonzalez, Head of Corporate Security at Amerant Bank.  “Integrating the software into our existing cameras made the installation quick and seamless, and once installed, it transformed these cameras into powerful, intelligent surveillance devices that are constantly detecting potential threats.”

    Gunnebo's intelligent airport boarding solution
    Gunnebo's intelligent airport boarding solution

    Gunnebo Entrance Control has successfully installed its BoardSec intelligent airport boarding gate system at Chongqing Jiangbei International Airport’s Terminal 3, as part of a major smart renovation and upgrade program. As the primary international gateway for Chongqing - one of the world's most populous cities - Jiangbei International Airport handled over 40 million passengers in 2024, ranking among the top ten busiest airports in mainland China. Gunnebo’s top visual recognition technology To enhance security and streamline airport operations, Gunnebo Entrance Control has supplied over 150 BoardSec systems, integrating advanced biometric face recognition and cutting-edge visual behaviour identification technology to revolutionise self-boarding. Traditional boarding gates often struggle to detect complex passenger behaviours. Gunnebo’s Top Visual Recognition Technology leverages high-precision camera arrays and deep-learning algorithms to identify over 20 types of risky behaviours, including tailgating, reversing, and unattended luggage. If an item is left unattended beyond a set time, the system automatically alerts staff—reducing manual checks and improving efficiency by 90%. Gunnebo Entrance Control’s intelligent boarding solution Implementation of Gunnebo Entrance Control’s intelligent boarding key has enhanced active efficiency Chongqing Jiangbei International Airport has praised the system’s ability to optimise passenger experience while enabling data-driven operational management. The implementation of Gunnebo Entrance Control’s intelligent boarding solution has significantly enhanced operational efficiency while ensuring a smoother, more secure journey for passengers. This innovation supports the vision of Chongqing International Airport becoming a pioneering intelligent aviation hub in China. Advancements in 5G and edge computing Says Davis Zhang, Vice-President China for Gunnebo Entrance Control: “As a trusted intelligent solution provider for nearly 100 international airports worldwide, Gunnebo Entrance Control is proud to support Chongqing’s digital transformation." "With advancements in 5G and edge computing, we remain committed to driving innovation in China’s civil aviation industry. This project is a testament to our global capability to transform large transport hubs - delivering security, efficiency, and an enhanced passenger experience without compromise.” BoardSec’s next-generation The system uses truly even in hard conditions like strong backlighting or mask-wearing BoardSec’s next-generation multi-spectrum face recognition system enables seamless identity verification - passengers simply walk through the gate as dual-mode imaging (near-infrared and visible light) confirms identity in just 0.3 seconds with 99.98% accuracy. The system operates effectively even in challenging conditions such as strong backlighting or mask-wearing. By eliminating manual code scanning, BoardSec cuts queue times by 70%, increasing single-gate capacity from 180 to 320 passengers per hour. Real-time monitoring of gate operations Gunnebo Entrance Control has also equipped the airport with an intelligent equipment management platform, providing real-time monitoring of gate operations, passenger flow, and system health. Powered by AI, the platform automatically opens additional gates during peak demand, initiates remote diagnostics for maintenance issues, and boosts overall operational efficiency by 60%.

    Sunprime & Dahua: Advanced security for solar plants
    Sunprime & Dahua: Advanced security for solar plants

    Founded in 2020 by a team of energy professionals in Milan, Sunprime is a fast-growing independent renewable energy producer that develops sustainable photovoltaic plants across Italy. Their focus is mainly commercial and industrial (C&I) segment, ground-mounted systems on industrial land and industrial electricity storage systems. Challenges With global initiatives toward green sustainability and carbon neutrality, the demand for photovoltaic power generation construction is growing rapidly.  Sunprime's project pipeline currently consists of several projects, many of which are located in very remote and often unattended areas (e.g., Maleo, Lodi Province), making it vulnerable to thieves that steal valuable cables and panels. Securing the vast area of photovoltaic plants requires a comprehensive surveillance system that can monitor the site at all times.  Solution Dahua and Sunprime enabled the project team to come up with an effective design The technical and commercial partnership between Dahua and Sunprime enabled the project team to come up with an effective design, implement cutting-edge technologies and pay great attention to the positioning of the cameras. In order to safeguard one of the client’s solar power plants covering approximately 70,000 m2, more than 1,500 hybrid cameras (thermal cameras + traditional cameras) equipped with AI algorithms were deployed around the area, actively monitoring for potential intrusion 24/7. These state-of-the-art Dahua products can stably operate even under harsh weather conditions, making them ideal for outdoor applications. They are equipped with advanced AI algorithms capable of generating accurate alarms while filtering out false positives, which makes monitoring more efficient and more convenient for the client. Dahua AirShield wireless alarm system In addition, through fibre optics, the video steam from the cameras are sent to the technical rooms in the solar park via Dahua’s industrial switches. The signals are then managed by another row of switches and finally transmitted to high-resolution recorders. The Dahua AirShield wireless alarm system was also installed in each technical room in the park, providing another level of protection for the central equipment. What’s more, all the systems of Sunprime’s solar parks are now centralised through local routers thanks to the Dahua DSS management software installed in the surveillance operations centre. Results Dahua has assisted Sunprime from pre-sale stage to the implementation of the products Sunprime’s solar power plant has witnessed how Dahua’s thermal perimeter protection solution can be utilised to safeguard its property and assets located in remote and secluded areas. In addition to early business communication, Dahua has assisted Sunprime from pre-sale stage to the implementation of the products, with plans and designs based on the actual needs of the customer. The high-quality service offered by Dahua has gained praised from the client. Dahua secured new projects “The implementation of this type of systems was made possible thanks to the support of the Dahua projects department, which assisted us from the pre-sale stage up to the implementation of the products,” says Mr. Michele Vianello, Asset Manager at Sunprime. “I take this opportunity to once again thank them for their support throughout the entire project,” he added. After the successful completion of this project on the first site, Dahua has secured new projects for another 80 sites with approximately 20 thermal imaging cameras for each site, generating a total supply of 1,600 thermal imaging cameras.

    View all

    Round table discussion

    How is AI transforming physical security?
    How is AI transforming physical security?

    In the physical security marketplace, artificial intelligence (AI) has evolved beyond the novelty phase. The emphasis has now shifted to the more practical aspects of implementing AI technology. That a system implements AI is no longer impressive in and of itself. The question becomes: What can this AI system do for me? How can it improve my physical security stance? We asked our Expert Panel Roundtable: How is artificial intelligence (AI) transforming physical security?

    What will be the big topics of discussion at ISC West 2025?
    What will be the big topics of discussion at ISC West 2025?

    If recent physical security events are a guide, the topic of artificial intelligence (AI) will be everywhere at the upcoming ISC West 2025 exhibition in Las Vegas. Cybersecurity solutions are another core focus at today's physical security events, and ISC West will likely follow the trend. Attendees will also be looking for advancements in access control systems, including biometric technologies and integrated security platforms, among other hot topics. We asked our Expert Panel Roundtable: What will be the big topics of discussion at ISC West 2025?

    What is the outlook for physical security in the year ahead?
    What is the outlook for physical security in the year ahead?

    Technology innovations and an evolving threat landscape will be core factors impacting the physical security market in 2025. Technology elements such as artificial intelligence (AI), multi-factor access control, and mobile devices will continue to drive growth in the greater industry. We asked our Expert Panel Roundtable: What is the outlook for the physical security industry in the year ahead?

    View all

    Products

    New Management Experience with VIVOTEK VAST 2

    New Management Experience with VIVOTEK VAST 2

    Dahua WizSense DVR

    Dahua WizSense DVR

    Dahua wireless dual-lens pan & tilt camera

    Dahua wireless dual-lens pan & tilt camera

    Hikvision EasyIP 4.0 Plus Network Cameras with ColorVu 3.0 Technology

    Hikvision EasyIP 4.0 Plus Network Cameras with ColorVu 3.0 Technology

    Dahua WizSense 2 Series AI-enhanced network camera

    Dahua WizSense 2 Series AI-enhanced network camera

    Dahua 4MP WizColor Fixed-Focal Bullet Network Camera

    Dahua 4MP WizColor Fixed-Focal Bullet Network Camera

    Dahua DH-XVR5104HS-4KL-I3 4CH Penta-brid 4K-N/5MP Compact 1U 1HDD WizSense DVR

    Dahua DH-XVR5104HS-4KL-I3 4CH Penta-brid 4K-N/5MP Compact 1U 1HDD WizSense DVR

    Dahua Starlight Network Panoramic Camera

    Dahua Starlight Network Panoramic Camera

    Dahua 5MP TiOC Network Camera

    Dahua 5MP TiOC Network Camera

    Hikvision DarkFighter Gen-2 DeepinView cameras

    Hikvision DarkFighter Gen-2 DeepinView cameras

    Dahua Technology AI WDR Bullet Network Camera

    Dahua Technology AI WDR Bullet Network Camera

    Illustra IBJB-F-3CWB-0 Junction Box, White

    Illustra IBJB-F-3CWB-0 Junction Box, White

    Illustra ADCi6MPCAPIW Pendant Cap, White

    Illustra ADCi6MPCAPIW Pendant Cap, White

    Dahua's AI-powered Bullet WizMind Network Camera

    Dahua's AI-powered Bullet WizMind Network Camera

    Dahua Dual 4MP Starlight Hunter Camera

    Dahua Dual 4MP Starlight Hunter Camera

    View all

    White papers

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    Download
    2025 Trends in video surveillance

    2025 Trends in video surveillance

    Download
    The role of artificial intelligence to transform video imaging

    The role of artificial intelligence to transform video imaging

    Download
    Total cost of ownership for video surveillance

    Total cost of ownership for video surveillance

    Download
    5 surprising findings from OT vulnerability assessments

    5 surprising findings from OT vulnerability assessments

    Download
    Guide for HAAS: New choice of SMB security system

    Guide for HAAS: New choice of SMB security system

    Download
    Integrating IT & physical security teams

    Integrating IT & physical security teams

    Download
    Top 7 trends to watch in the physical security industry

    Top 7 trends to watch in the physical security industry

    Download
    2024 trends in video surveillance

    2024 trends in video surveillance

    Download
    How intelligent video is transforming banking and financial institutions

    How intelligent video is transforming banking and financial institutions

    Download
    Securing data centres: Varied technologies and exacting demands

    Securing data centres: Varied technologies and exacting demands

    Download
    The real cost of an outdated Video Security System

    The real cost of an outdated Video Security System

    Download
    5 easy steps to an upgraded video surveillance system

    5 easy steps to an upgraded video surveillance system

    Download
    AI in security solution

    AI in security solution

    Download
    VSS - Top 4 questions to get you started

    VSS - Top 4 questions to get you started

    Download
    View all

    Videos

    ROAMEO Gen 4 patrolling St. Louis in support of NCAA Frozen four championship

    ROAMEO Gen 4 patrolling St. Louis in support of NCAA Frozen four championship

    Is the door security and access control compliant?

    Is the door security and access control compliant?

    SARISA firing tests

    SARISA firing tests

    Case study: Gunes Park Evleri̇, Turkey

    Case study: Gunes Park Evleri̇, Turkey

    View more

    Artificial intelligence (AI): Manufacturers & Suppliers

    • Dahua Technology Artificial intelligence (AI)
    • WD Artificial intelligence (AI)
    • Hikvision Artificial intelligence (AI)
    • Anviz Artificial intelligence (AI)
    • Avigilon Artificial intelligence (AI)
    • Hanwha Vision Artificial intelligence (AI)
    • Illustra Artificial intelligence (AI)

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics The Security Event 2025 Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Artificial intelligence (AI)
    About this page

    In-depth coverage of Artificial intelligence (AI), featuring latest news and company announcements, products and solutions and case studies. Read insightful analysis of product, technology and business trends related to Artificial intelligence (AI) from security industry experts and thought leaders.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec