Biometric Security
Addressing the growing challenges of counterfeit identity documents, data tampering, and identity theft, IDEMIA Smart Identity has unveiled IDQR, a new security feature that combines the reliability of physical security features with the versatility of digital technology. First presented at High Security Printing Asia, a pioneer industry event in Bangkok, IDQR ensures data authenticity and tamper-proof protection. IDQR is a laser-engraved QR code permanently embedded during the personalisation...
IDEMIA Public Security North America, a pioneer in identity security and authentication services, and CertiPath, an innovator and pioneer in high-assurance identity, credential, and access management services for highly regulated environments, have announced their collaboration to integrate IDEMIA’s digital identity solutions with CertiPath’s TrustVisitor solution to improve identify verification and prevent identity fraud. With the ever-present threat of cyberattacks aimed at gover...
Userful Corporation, a global pioneer in IT solutions and data visualisation, has achieved SOC 2 certification for its Infinity Platform and Global Cluster Manager solutions. This certification underscores its commitment to secure data management and compliance in critical operations environments. This achievement demonstrates Userful’s dedication to maintaining a high level of security, integrity, and availability for its customers and partners. Userful’s secure infras...
Gunnebo Group will present its commitment to innovation in advanced security solutions and sustainability across its flagship brands at Intersec 2025, held in Dubai, UAE, from January 14 -16, 2025. As a global pioneer in security solutions, Gunnebo will be on stand S2, A22, presenting a range of advanced, innovative technologies in safe storage, entrance control, and high-security electronic locks, with a focus on sustainability in design, materials, and energy efficiency. Safe storage solutio...
Integrated Access Control and Security manufacturer - TDSi announces that its Managing Director, John Davies, will retire from his role at the end of 2024. TDSi's existing senior team will continue to operate the business as usual under the leadership of Thibaut Galland, Chief Operating Officer (COO) for the United Kingdom at TDSi's parent organisation, Vitaprotech. John Davies joined TDSi in 2003, pioneering a management buyout of the business in February 2005. In 2019 John oversaw the ne...
Hanwha Vision, the global vision solution provider, has unveiled the Dual-Lens Barcode Reader Camera, with models TNS-9040IBC, TNS-9050IBC, and TNS-9060IBC, to combine barcode recognition and video capture in one device. In combination with the Vision Logistics Tracking Software, barcodes, and video are provided in real-time to enhance inventory management, traceability, and incident investigation, reducing shipping errors, and returns, and ultimately boosting customer satisfaction. ...
News
Robotic Assistance Devices (RAD), proudly announces the launch of SARA™ (Speaking Autonomous Responsive Agent). This innovative software solution is poised to redefine security monitoring, offering unparalleled efficiency and cost-effectiveness, while reshaping how Global Security Operations Centres (GSOCs) operate. Security operations Centre A typical security operations centre relies on human workers to review video footage escalated by analytics, assess the situation, and decide on appropriate actions, which may include verbal engagement or escalation to facility management or law enforcement. SARA automates these tasks with significant improvements, delivering enhanced efficiency, reduced costs, and superior performance across a wide range of scenarios. AIR™ (Autonomous Intelligent Response) technology This innovative application of AIR technology represents a significant milestone for AITX SARA marks the debut of AITX’s AIR™ (Autonomous Intelligent Response) technology in a fully realised product. As the foundational AI driving SARA, AIR enables the software to autonomously assess situations, engage intelligently, and execute actions traditionally performed by human operators. This innovative application of AIR technology represents a significant milestone for AITX, showcasing its potential to revolutionise security operations through adaptive, responsive, and cost-effective solutions. SARA’s unique benefits Efficiency: Traditional GSOCs must anticipate staffing needs to handle incoming alerts, often leading to under or over-staffing. SARA eliminates this guesswork by scaling instantly and infinitely to manage any volume of escalations. Cost: Staffing a GSOC requires ongoing recruitment, human resource management, and the burden of rising labour costs. SARA offers a software-driven alternative that reduces these expenses by over 90%, providing a cost-effective solution without sacrificing performance. Performance: SARA can escalate incidents with precision, simultaneously contacting up to three parties, such as facility management, law enforcement, and security guards. Each message is tailored to the recipient, ensuring clear and actionable communication. Transparency: SARA delivers comprehensive incident reports that include video footage, call logs, and transcripts, ensuring full accountability and visibility for every escalation. Ease of Deployment: Starting in January 2025, SARA will be an available upgrade on all RAD devices, including previously deployed units. Even as an upgrade, SARA provides a compelling alternative, reducing monitoring expenses by over 90%, while maintaining exceptional performance. The setup is simple, leveraging RAD’s device ecosystem and enabling seamless integration with existing LAN-based cameras through RAD’s Operations System Software (ROSS). Reduced costs and improved performance "There are over 225 Global Security Operations Centres, and the monitoring industry generates over $3 billion annually," said Steve Reinharz, CEO/CTO of AITX and RAD, adding "SARA represents a seismic shift for this market, enabling organisations to enhance their security offerings at a fraction of the cost while improving performance." He continues, "We see accelerated growth in the number of cameras connected to GSOCS as SARA makes these services incredibly accessible. However, this decrease in overall costs will challenge this market niche to maintain industry growth. We see rapid adoption of these solutions given SARA’s compelling value proposition." Market projection Its seamless integration with RAD’s proprietary ROSS allows for a smooth upgrade of existing infrastructure The Global Security Operations Centre market is projected to reach $16.18 billion by 2032, growing at a compound annual growth rate of 10.2% from 2024. SARA is set to disrupt this growth trajectory by automating labour-intensive processes, empowering security firms and end-users to achieve more with fewer resources. Its seamless integration with RAD’s proprietary Operations System Software (ROSS) allows for a smooth upgrade of existing infrastructure without the need for significant hardware investment. Efficiency, responsiveness SARA’s introduction signals a pivotal moment in the evolution of security operations. By automating traditionally labour-intensive processes, it empowers GSOCs and security firms to reimagine their capabilities, delivering improved efficiency, responsiveness, and cost management. This revolutionary approach aligns with the demands of an industry poised for significant growth, enabling organisations to enhance their services, while maintaining a competitive edge. RAD invites security professionals and stakeholders to explore SARA’s transformative capabilities.
Gcore, the global edge AI, cloud, network, and security solutions provider, and Ezditek, an innovator in data centre and digital infrastructure services in the Kingdom of Saudi Arabia (KSA), have launched a joint venture focused on providing high-performance AI infrastructure in the KSA. The joint venture will develop an ‘AI factory’, which can be used for building, training, and deploying generative AI solutions locally and across the globe. Ezditek’s innovative approach The joint venture brings together Gcore’s expertise in cloud-based AI infrastructure and Ezditek’s innovative approach to sustainable and AI-centric data centre design and build. The joint venture is the result of an agreement signed by Gcore and Ezditek in May 2024 and will support the KSA’s position as a pioneering global AI hub. The incorporation process of the joint venture is currently underway and is subject to regulatory approvals, including from the General Authority for Competition in the KSA. Generative AI models AI factory will be deployed in an Ezditek data centre and be home to tens of thousands of GPUs “We are excited to join forces with Ezditek in building this groundbreaking AI factory. By combining our cloud services and AI infrastructure capabilities with Ezditek’s expertise in data centre development, we are setting a new standard for AI infrastructure in the region,” said Andre Reitenbach, CEO at Gcore. The AI factory will be deployed in an Ezditek data centre and be home to tens of thousands of GPUs that will empower organisations to train and deploy sophisticated generative AI models. This will enable the rapid training and development of predictive analytics models, deep data analysis, and process optimisation, as well as a growing number of AI use cases. AI innovation and adoption “Over the last six months, we have worked in collaboration with Gcore to identify areas where we can deliver the most value for customers, and support the KSA’s vision for AI leadership. Together, we are developing an AI factory purpose-built for enabling and accelerating AI innovation and adoption,” said Ibrahim Almulhim, CEO at Ezditek. Ibrahim Almulhim adds, “We’re extremely proud to be working with a global leader in AI enablement and bringing a visionary approach to AI innovation to market in the KSA.” Digital capabilities “This partnership will accelerate the adoption of AI and cloud computing solutions, benefiting businesses and citizens alike,” said Eng. Bassam Al-Bassam, Deputy Minister of Telecommunications and Digital Infrastructure at MCIT. Al-Bassam also pointed out that this partnership will boost digital investment and national digital capacity in Saudi Arabia, underpinned by its digital capabilities and reliable infrastructure.
Hopae, makers of the world’s most advanced digital identity solution, announced $6.5 million in funding as the company introduces its proprietary, patented Digital Credential eXpress (DCX) architecture to the U.S., simplifying the complex world of decentralised ID (DID) implementation. Hopae helps governments and institutions issue reusable, privacy-preserving, and unforgeable digital IDs and credentials. Its expansion and funding news comes as companies seek to comply with new international digital identity regulations. Identity verification Hopae’s funding, totalling $6.5 million, includes $4.3 million in seed round from investors Hopae’s funding, totalling $6.5 million, includes $4.3 million in seed round from investors led by SV Investment, with participation from Z Venture Capital, Bon Angels Venture Partners, along with $2.2 million in debt financing from Korea Credit Guarantee Fund (KODIT). These funds will be used to establish Hopae’s U.S. headquarters, expand across Europe, and solidify strategic partnerships for age and identity verification. eIDAS 2.0 Regulation Hopae also plans to aggressively hire across its Seoul and Paris offices and establish its new U.S. base in San Francisco to secure the talent needed to rapidly scale, as it prepares to provide an ideal solution for the European Union’s (EU) new comprehensive framework for digital identity. Known as the eIDAS 2.0 Regulation, the EU’s measure aims to create a secure, user-friendly, and interoperable digital identity system across all member states. The goal is for at least 80% of EU citizens to use the European Digital Identity (EUDI) Wallet by 2030. Digital transactions Hopae fits into this vision by making the open-source building blocks for such digital wallets Widespread adoption is expected to bolster trust in digital transactions and facilitate smoother cross-border activities, enabling citizens and businesses to engage more confidently in the digital market. Hopae fits into this vision by making the open-source building blocks for such digital wallets. It is expected to play a prominent role in their acceptance and success. Adoption of Hopae’s technology “Traditional methods of identification no longer make sense. Aside from being cumbersome, they simply do not meet modern privacy and security needs,” said Ace Shim, Co-Founder and CEO of Hopae. Ace Shim adds, “Although eIDAS 2.0 represents a driving force for the adoption of Hopae’s technology, it is clear that this is a necessity for everyone from enterprises that seek to conduct international business to shops that want to sell goods like alcohol online. Hopae is at the forefront of a paradigm shift, and we are excited to bring DCX to the U.S.” Advanced Digital Identity Solution Hopae’s DCX architecture utilises blockchain technology, ensuring the highest levels of security At its core, Hopae’s DCX architecture utilises blockchain technology, ensuring the highest levels of security and integrity for digital credentials. The design philosophy behind DCX prioritises user control over personal data, making it the perfect solution for a variety of applications, from government services to private sector identity verification needs. Its flexibility and adherence to global standards underscores the versatility of this forward-thinking solution. The DCX system is lightweight, scalable, and capable of handling high traffic volumes, while ensuring interoperability and data privacy. Key benchmarks DCX components create a simple, seamless, and scalable wallet infrastructure. Key benchmarks include: 0.1 seconds for issue and verify notification: ~30x faster than other methods 7 milliseconds for resolving: ~550x faster than other methods 300 milliseconds for revocation: ~33x faster than other methods One instance for 10K active agents: 10,000x fewer instances and 100x cheaper server costs compared to cloud solutions Additionally, because DCX divides blockchain nodes by role, it is 2x faster than other options with 10x faster blockchain operation. Team they can trust While Hopae’s architecture contributes to improving wallets, the key for widespread adoption lies in stable operation for millions of users and billions of daily verifications without any friction that could slow down transaction speeds or impede the overall experience. Hopae stands alone in terms of scalability, reliability, and user experience. The company’s founders were core developers of the first and largest national-scale DID verification system, exemplified by COOV during COVID-19. Korean super-apps and telco services COOV was provided to major Korean super-apps and telco services as an API and was compatible The COOV system recorded 43 million monthly active users and 200 million daily transactions (including 10,000+ requests per second) in just three months. COOV was provided to major Korean super-apps and telco services as an API and was compatible with systems in Singapore and Europe. This extensive experience puts the Hopae team years ahead of competitors in the rapidly evolving digital wallet paradigm. Revolutionise digital identity “DID will soon be used for everything from international travel to healthcare and certifications to online safety for minors. But a trustworthy, high-performance solution is absolutely essential to protect businesses, governments, and users themselves,” said Ilyong Choi of SV Investment. Ilyong Choi adds, “Hopae has the roots to revolutionise digital identity on a global scale. We are excited to help the company take its next steps forward.”
Altronix, the recognised pioneer in power and data transmission for the professional security industry, is showcasing its expanded lineup of industry-proven technologies at ISC East 2024 in booth 713. The expanded product portfolio further addresses the evolving needs of security professionals, offering robust solutions for access control, video surveillance, fire, and network management, designed to streamline deployment and better protect critical infrastructure. Data transmission solutions “Our latest new power and data transmission solutions further improve system performance and efficiency, while simplifying installation, helping security professionals stay ahead of the technology curve in our rapidly evolving industry,” said Alan Forman, President of Altronix. Alan Forman adds, “From extending Ethernet reach to providing reliable power in critical situations, our Altronix solutions help sustain continuous system operation with greater efficiency.” Highlighted solutions Reliable Power Management: Circ1ATS: With two independent 115VAC or 230VAC inputs, this Automatic AC transfer switch is designed to ensure seamless power transitions for critical security infrastructure, minimising downtime during power shifts. CommBatt: UL2524 BDA Power and Backup system designed for emergency response radio systems ensures ongoing communication to first responders, during outages or system disruptions. Enhanced Connectivity and Remote Monitoring: LINQ™ Network Power Management: Offers remote monitoring, control, and reporting of power diagnostics, helping optimise performance and quickly address issues, enhancing overall system reliability. TempoA4: 4-zone activity monitoring/occupancy alert system provides situational awareness by reducing risk. Extended Ethernet Solutions: Pace: Extending Ethernet beyond traditional limits, Pace enables connectivity over existing two-wire up to 1000m or structured cabling up top 500m without repeaters, supporting IP and T1L industrial devices over longer distances. NetWay Spectrum with EBC48: Hardened Outdoor PoE Switch with Integrated rapid battery charger (EBC48) supports extended backup times to deploy IP devices in remote locations utilising fibre optic cabling. Integrated Access Control Systems: Trove™ Series: Featuring new integrations with LiftMaster, Axis, and other pioneering brands, these pre-wired, pre-configured solutions simplify installation, offering versatile mounting options to suit varied project requirements in new extended rack mount and scalable wall mount configurations. Altronix’s latest power solutions Explore Altronix’s latest power and data transmission solutions firsthand at ISC East 2024 in booth 713, with demonstrations showcasing how they enhance efficiency, scalability, and operational control. The team of power and data transmission experts will be on hand to discuss how to leverage Altronix solutions to meet specific project needs.
Bugcrowd, the pioneer in crowdsourced security announced an alliance with Least Authority, a Berlin-based pioneer in secure use of advanced cryptographic techniques. Least Authority provides customised services to support FinTech and Web3 products through design and development, including code audits, specification reviews, and system architecture assessments. Research and development The company specialises in the research and development of distributed systems, blockchain protocols, AI/ML algorithms, and cryptographic protocols design and implementations, including zero-knowledge proofs and multi-party computation. To date, Least Authority has completed more than 225 audits collaborating with industry pioneers such as Ethereum, MetaMask, Filecoin, Stacks, Polygon, Zcash, and more. Comprehensive continuous testing services Through its alliance with Bugcrowd, Least Authority can tap the vast skills of the Bugcrowd research community Through its alliance with Bugcrowd, Least Authority can tap the vast skills of the Bugcrowd research community to deliver comprehensive continuous testing services as these innovative systems evolve. Liz Steininger, CEO and Managing Director at Least Authority, said, "In today’s rapidly evolving threat landscape, relying on traditional security methods is no longer enough. We’re excited to offer this forward-thinking combination with Bugcrowd to clients who understand that security requires constant innovation and collaboration." AI-powered platform Jacques Lopez, VP of Global Channel Sales & Strategic Alliances, Bugcrowd, said, "Least Authority does amazing work to secure complex distributed environments from design to production." Jacques Lopez adds, "The collaboration with Bugcrowd enables the company to add value with continuous testing services using Bugcrowd’s AI-powered platform."
IDScan.net, the pioneer in AI-powered identity verification technology, proudly announces a year of significant growth in 2024. This success has been driven by product innovation, increased efficacy in the detection of fake IDs, strategic hires, and the establishment of new partnerships, further solidifying IDScan.net’s position as a pioneer in ID scanning and identity verification. Flagging fake and synthetic IDs The organisation has capitalised on growing ID fraud across a variety of industries, as fraudsters look to swindle businesses such as dispensaries, car dealerships, big box retailers, manufacturers, and others by using fraudulent credentials. Across IDScan.net’s products, they flagged more than 600,000 fake IDs and synthetic identities in 2024. Growth revenue and verification volume The rising threat of ID fraud has led to more than just growth in revenue and verification volume. In 2024, IDScan.net has also: Grown total customers by 19%. Earned 17 badges from G2, including Best ROI, Highest Customer Satisfaction, and Most Effective. Launched mobile ID acceptance in both VeriScan for iOS and VeriScan for Windows. Spoken at conferences such as HITEC and GSX on trends in mobile ID adoption. Best SaaS Provider The awards are a testament to IDScan.net's cutting-edge advancements in AI-powered identity verification Additionally, IDScan.net was named the Best SaaS Provider at the 2024 Global Tech Awards, and Senior Product Manager, Hannah Ligon was awarded Bronze for Most Innovative Woman of the Year in the Stevie Awards. These awards are a testament to IDScan.net's cutting-edge advancements in AI-powered identity verification technology, the strength of the team, and its significant impact on enhancing security and compliance across various industries. New strategic hires This expansion is supported by ten new strategic hires aimed at enhancing customer support and business development. Notable additions to the team include Dan Kelleher as the new Vice President of Operations, who previously spent 30 years in the finance department of Hertz, and Ayna Verella Lawson, who joins the team after working on identity-related projects at Capital One. Product enhancements Also notable was the launch of ParseLink, a successor to the popular legacy product “WizzForms” Product enhancements have been at the forefront of IDScan.net's 2024 strategy. This innovation has centered around improving the efficacy of fake ID detection, especially tampered and photoshopped IDs, as well as improved BI and analytics for multi-location customers who need a birdseye view into fraud risks across large, distributed organisations. Also notable was the launch of ParseLink, a successor to the popular legacy product “WizzForms” which allows ID data to be automatically ingested into any form or software. Reduce the risk of scams “2024 has been an outstanding year of growth for our business,” said CEO, Terry Slattery. “We have focused on our core mission - to help businesses reduce the risk of scams using fake IDs - with incredible results. We expect to carry the momentum from this banner year forward into 2025 and beyond.” Shifts in ID fraud and identity verification Synthetic identity fraud is projected to become the major type of fraud, mirroring economic pressures Looking ahead to 2025, IDScan.net anticipates significant shifts in ID fraud and identity verification. As mobile IDs continue to roll out, with eight states expected to launch in 2025, the challenge remains for businesses to adapt to these technological advancements. Synthetic identity fraud is projected to become the major type of fraud, mirroring economic pressures that historically correlate with rises in ID fraud. Decentralised identity systems Additionally, societal concerns about AI may prompt anti-deepfake legislation, while discussions around age-restricted access to digital content are likely to intensify, posing implementation challenges. The move towards decentralised identity systems will also gain traction, offering users enhanced control over their data.
Expert commentary
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Security beat
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and school uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate and school security environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Case studies
High-quality skin care products, developed using the latest technologies and manufactured sustainably: the international Babor Beauty Group is represented in more than 70 countries with its sought-after beauty brands. Research and development as well as production take place at the company's headquarters in Aachen, Germany, while filling and logistics are located just a few miles away in Eschweiler. Use of digital process In 2023, the family enterprise inaugurated a cutting-edge production facility here, known as the “Babor Beauty Cluster”. Around half a million jars, tubes, and ampoules are filled there every day, and logistics and shipping are also handled on-site. A special feature of the 60,000 sq.m plant is its extensive use of digital processes for working and operating as efficiently as possible. The fully networked complete solution from Bosch Building Technologies for safety, security, and building management makes a valuable contribution to this. Greater safety, security, comfort, and efficiency The smart solution integrates, among other things, fire protection, intrusion alarm, and access control systems The smart solution from Bosch Building Technologies was precisely tailored to meet the Babor Beauty Group’s requirements. It integrates, among other things, fire protection, intrusion alarm, and access control systems, as well as a video security solution for safeguarding the perimeter and premises. AI-based video security for fast, frictionless reception The AI-based video security solution analyses every captured image while using predefined rules and only triggers an alarm if at least one of them is met. This avoids false alarms, thus enabling even more effective security management. The solution from Bosch Building Technologies also includes a digital visitor management system that saves time with a self-registration function. It ensures fast, frictionless reception of guests and tradespeople and includes audit-proof archiving, which significantly eases the workload of Babor’s operating team. Smart truck and parking space management The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording Another highlight is the smart truck and parking space management with license plate detection for user-friendly access control. Properly secured loads are also automatically documented. The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording to provide comprehensive documentation of the process. Management system for control across sites The Babor Beauty Group’s technical operations and facility management team is responsible for both the company’s headquarters in Aachen and the production and logistics cluster in Eschweiler. The safety and security systems of both sites have therefore been integrated into the “Building Integration System 360” from Bosch Building Technologies. Centralised management platform This centralised management platform provides control of all building systems, enabling Babor Beauty Group's operations and management team to respond efficiently to security-related events. The solution is also flexibly scalable to facilitate the integration of future site extensions. Bosch Building Technologies will operate this complete solution for the next ten years within the scope of a build-operate-transfer model.
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."
HID, a worldwide pioneer in trusted identity and access control solutions, announced that Deskbee, a global provider of corporate space management solutions, has integrated HID Mobile Access and Identity Positioning technologies into its platform. With an already robust workplace management application, Deskbee wanted to enhance security and optimise operational efficiencies by integrating digital credentials and real-time positioning into its platform. HID Mobile Access With HID Mobile Access, Deskbee app users can employ their smartphones and tablets to securely access facilities, eliminating the need for physical cards and reducing the risks associated with lost or misused credentials. This implementation not only enhances convenience and security but also seamlessly integrates with existing systems, simplifying the issuance and revocation of credentials from a single platform. Identity Positioning technology By analysing occupancy data, managers can optimise space planning, improve resource allocation Furthermore, Identity Positioning technology enables building managers to track employee and visitor locations in real-time, providing valuable insights for optimising space planning and resource allocation. By analysing occupancy data, managers can optimise space planning, improve resource allocation (such as energy, water, and HVAC), and enhance overall operational efficiency. Secure, efficient, and personalised experience “The integration of HID’s Mobile Identities solutions demonstrates the enormous potential that application development companies have to transform access control systems and workplace management,” said Rogerio Coradini, HID’s Commercial Director of Physical Access Control in Latin America. “Through collaboration with HID, developers of mobile platforms and applications can adapt to the changing needs of the market and provide a more secure, efficient, and personalised experience for their clients.” Detailed monitoring and improved access management Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage Due to HID mobile identity technologies, Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage, providing accurate data on occupancy, location, and duration of stay. “The ability to automate the registration process and improve access management has been a significant change. HID's reliability and support have been fundamental to these advancements, and we are seeing how these results are positively impacting our clients. The trust in the brand and its support has been essential to our success,” said Gorguet. Employee badge integration Headquartered in Brazil, Deskbee has experienced rapid growth, consolidating its position in the Brazilian market and expanding its operations to more than 25 countries, including Mexico, Chile, Argentina, the United States, Portugal, Spain, Germany, and the United Kingdom. Still this year, the company will offer employee badge integration with Google Wallet, also powered by HID technology.
Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expanding the reach of learning for the community. Colleges' challenge Alamo’s challenges included leveraging technology to support its high standards of safety and security as a priority for its campuses. They were tackling a technology gap among users across the diverse landscape of the larger San Antonio area and also wanted to support an effective work-life balance by transitioning faculty and staff from desktop to mobile devices. Action taken To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms A long-time customer of Alcatel-Lucent Enterprise, Alamo Colleges has stayed focused on providing a secure, reliable, and accessible network for learning. To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms and Alcatel-Lucent OmniAccess® Stellar wireless networking across its campuses. They expanded the reach of the OmniAccess Stellar Access Points to develop Park and Learn, enabling students to connect and complete their studies from the parking lots without the need to physically be on campus. Alcatel-Lucent solution Security and safety are of the utmost concern, and Alamo has leveraged its Alcatel-Lucent OmniPCX® phone system to make emergency calls to Alamo Colleges dispatch, 911, and local Bear County authorities. They recently added the Alcatel-Lucent Visual Notification Assistant (VNA) solution, which can pick up a call from a user on a mobile device and provide their location, expediting response time. To manage all these systems, Alamo uses Alcatel-Lucent OmniVista® Network Management. With one view of all the networks, Alamo’s IT staff can monitor the network during the ongoing construction of centres and provide maintenance remotely across its far-reaching network. Products and solutions Alcatel-Lucent OmniPCX® Enterprise Alcatel-Lucent 8128 MIPT handsets Alcatel-Lucent OmniSwitch® 6900-X72-F Alcatel-Lucent OmniSwitch® 6960E-U28 Alcatel-Lucent OmniSwitch® 6860E-P48 Alcatel-Lucent OmniSwitch® 6450E-P48 Alcatel-Lucent OmniAccess® Stellar AP1101 Alcatel-Lucent OmniVista® 2500 Network Management System Alcatel-Lucent Visual Notification Assistant (VNA) Results obtained Technical benefits Delivers redundant, reliable networks and high data transfer rates with OmniSwitch layer 3 and chassis solutions. Provides consistent and complete Wi-Fi across campuses and parking lots with OmniAccess Stellar wireless network. Advanced phone system supports 911 calls and notifies college security and county authorities with Alcatel-Lucent VNA solution. Simplifies monitoring with a unified view of the network and visual maps showing the status of switches in all college facilities. Financial benefits Saves on recurring service costs with the ALE solutions. Network Management single view shows how many switches and how many ports are in use, which helps in decision-making. User experience benefits Provides messaging notification services, conferencing capabilities, and broadcast alerts during a crisis on campus with VNA connected with Rainbow™ by Alcatel-Lucent Enterprise. eSports' popularity with students is growing thanks to high-performance networks. “The Alcatel-Lucent Enterprise products are reliable and just work. What I like best about the partnership with Alcatel-Lucent Enterprise is they’re always there for us,” said Christopher Delgado, Senior Manager of Network Operations, at Alamo Colleges.
The office of the Additional Director General of Police (ADG) and Inspector General (IG) of Prisons oversees the management and security of all prisons in the Indian state. This includes ensuring the safety of prison facilities, implementing rehabilitation programs for inmates, and managing prison staff. Creating a fair environment The ADG and IG focus on improving prison conditions and ensuring legal standards are met. Their goal is to create a secure and fair environment, balancing safety with efforts to reform and rehabilitate prisoners for their eventual return to society. Scenario The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements The absence of a security video surveillance system created critical security blind spots, making it difficult to monitor key areas effectively. The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements posed significant risks to prison security. New security video surveillance system To comply with government regulations, the new security video surveillance system had to adhere to stringent standards established by the Bureau of Indian Standards (BIS). This included specific sections detailing the specifications for camera performance and image quality and covering safety guidelines for IT equipment. The system required STQC certification to meet high security and data privacy standards, crucial for government installations. OWASP ASVS 4.0 L2 standards Additionally, it needed to comply with OWASP ASVS 4.0 L2 standards to ensure robust cybersecurity, safeguarding against common vulnerabilities. High-resolution cameras were essential for clear image capture, and tamper-proof storage was required to securely retain footage for 30 to 90 days. The system also had to align with the National Cyber Security Policy to protect sensitive data from cyber threats. Compliance with these standards was vital for maintaining security and operational integrity within the prison. Challenges Due to the absence of a security video surveillance system, the Prison Department faced numerous challenges such as: Struggled to monitor blind spots in the prison yard where fights and disputes frequently occurred. Detecting the smuggling of drugs and mobile phones during visitations was nearly impossible with manual checks alone. Staff couldn’t always be present to monitor isolated areas like back rooms, corridors, and staircases, leading to security gaps. Identifying the individuals involved in riots or brawls was difficult due to the lack of visual evidence. Inmate escape attempts often went unnoticed until too late, especially during night shifts. Ensuring round-the-clock monitoring of high-risk zones like solitary confinement was a constant challenge. Coordinating emergency responses, such as medical help during violent outbreaks, was delayed without instant visual updates. Matrix solution Matrix security video surveillance systems comprising Matrix Network Cameras and NVRs were installed across four prisons statewide, providing robust security for over 10,000 inmates. Matrix PTZ Cameras were deployed in larger spaces like the prison yard, where they could pan, tilt, and zoom to follow suspicious activities or fights, providing dynamic coverage and ensuring swift responses to incidents. Mini Dome Cameras were placed inside cells and common areas to provide constant, wide-angle surveillance, keeping tabs on inmate behaviour and reducing the chances of fights or smuggling illegal items. These cameras were also installed in cafeterias and recreation areas to monitor inmate interactions. Mini Bullet Cameras were installed in corridors and cellblock hallways to keep a close eye on inmate movement, ensuring no blind spots in these high-traffic zones. They were also installed in less-visited areas like storage rooms and staff offices to prevent unauthorised access and maintain control. Project Bullet Cameras were mounted along the prison yard and perimeter walls, providing long-range surveillance to prevent escape attempts and monitor outdoor activity. They were also installed at entry and exit points to keep tabs on everyone going in and out, securing access to the facility. 24x7 real-time monitoring All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs. This setup enabled 24x7 real-time monitoring, recording, and playback of video from different areas of the prison, ensuring complete coverage and prompt incident response. Similarly, the prison departments in three other cities of the state were also secured with Matrix Network Cameras and NVRs. Products offered Matrix MIDR20FL36CWS P2 (800+): 2MP IR Mini Dome Camera with 3.6 mm Fixed Lens Matrix MIBR20FL36CWS P2 (600+): 2MP IR Mini Bullet Camera with 3.6 mm Fixed Lens Matrix CIBR20FL36CWS P2 (800+): 2MP IR Project Bullet Camera with 3.6 mm Fixed Lens Matrix PZCR20ML25CWP P2 (70+): 2MP IR PTZ Camera with 25x Optical Zoom Matrix NVR6408X P2 (40+): 64 Channel NVR with 8 SATA Ports Solution diagram Benefits They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks The installation of the Matrix security video surveillance system effectively eliminated critical security blind spots in the prison yard, reducing the risk of fights and disturbances. They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks, preventing inmate escapes and unauthorised movements. Centralised monitoring Matrix security video surveillance systems enabled accurate monitoring during visitations, significantly enhancing the detection of smuggling attempts for drugs and mobile phones. Centralised monitoring via the 64-Channel NVR allowed for quick identification and response to disturbances, ensuring timely intervention during riots or medical emergencies. Regulation safety and data privacy High-resolution camera footage provided reliable documentation of inmate interactions and incidents, supporting investigations and enhancing overall prison security management. Matrix security video surveillance system meets BIS and STQC standards, ensuring compliance with government regulations for safety and data privacy. It also complies with OWASP ASVS 4.0 L2 standards, enhancing data security and protecting against cyber threats.
Products
Round table discussion
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
White papers
Palm vein recognition
DownloadPhysical access control
DownloadThe 2024 state of physical access trend report
DownloadThe security challenges of data centers
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadHoneywell GARD USB threat report 2024
DownloadAccess control system planning phase 1
DownloadHow to lower labour costs when installing video surveillance
DownloadTotal cost of ownership for video surveillance
DownloadThe truth behind 9 mobile access myths
Download5 surprising findings from OT vulnerability assessments
DownloadGuide for HAAS: New choice of SMB security system
DownloadPrecision and intelligence: LiDAR's role in modern security ecosystems
DownloadIntegrating IT & physical security teams
DownloadPalm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download