Border Security
Following the delivery of the first batch in 2023, solution specialist HENSOLDT is equipping the German Armed Forces with 90 additional Spotter 42. The enhanced Spotter complements HENSOLDT's Spotter 60, which is already in use in the troops, and replaces a predecessor model. Spotter 42 Compared to the Spotter 60, the magnification range of the Spotter 42 starts at six times instead of twenty times. The Spotter 42 is therefore optimised for use with night vision and thermal imaging attachment...
Secretary of Homeland Security Alejandro N. Mayorkas issued the following statement on the Biden-Harris Administration’s actions to keep American families together and to streamline a pathway for Dreamers to access waivers relating to high-skilled labour visas for which they are qualified: “Today, the Department of Homeland Security is taking action to keep American families together and end the fear and uncertainty these families face when one spouse is a United States citizen and...
Being the catalysts of growth, smart cities are founded on a technology-powered infrastructure. Digitisation in global economies has led the way to a transformative shift to smart security, universal convenience, and accelerated advancements. By 2026, smart cities will be expected to generate an economic benefit of USD 20 trillion globally. Reliable technological solutions Unfortunately, crimes and offences are also becoming high-tech, challenging the balance in the socio-economic ecosystem....
Global security manufacturer, Gallagher Security has added another manufacturing accolade to its list, taking home the award for Security Manufacturer of the Year at the 2024 Fire & Security Matters Awards held in Coventry. Manufacturer of the Year The Manufacturer of the Year award recognises a manufacturer of security systems that have gone above and beyond in its commitment to innovation and/or its systems meet the highest standards. This recent award win follows a string o...
Current UK Managing Director Andy Madge will retire, effective 1 July 2024, handing over responsibility for the UK and Ireland subsidiary to Mike Garrod. Mike Garrod, with extensive experience in the aerospace and defence sectors, joined Frequentis UK on 13 May to begin a phased handover to close Andy’s seven successful years as Managing Director of the UK and Ireland subsidiary. Frequentis UK Frequentis UK operates across all five Frequentis business segments, including civil and...
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint m...
News
ISC West 2024, held in Las Vegas, marked a significant milestone for PureTech Systems as it announced reseller agreements with two major companies in the security industry, i-PRO and Magos. This strategic move not only expands PureTech Systems’ portfolio but also reinforces its commitment to provide the most comprehensive, easy-to-integrate, and reliable AI-boosted, geospatial video analytics and sensor fusion software solution for perimeter protection. With these initiatives, PureTech Systems aims to deliver a comprehensive turn-key solution equipping organisations with the tools they need for effective perimeter security and threat detection. Expanding horizons with i-PRO The addition of i-PRO cameras in PureTech’s arsenal brings together PureTech's geospatial AI-boosted video analytics and i-PRO's cutting-edge cameras. This collaboration is poised to offer unparalleled situational awareness, enhancing overall security measures and operational efficiency. During the event, PureTech illustrated the power of this combined technology, offering attendees a direct glimpse into the enhancements it promises for surveillance and perimeter security. Forging ahead with Magos Reseller agreement with Magos introduces an exciting addition to PureTech’s product lineup Similarly, the reseller agreement with Magos introduces an exciting addition to PureTech’s product lineup. Magos is known for its cost-effective, low-power, high-performance radars, which, when coupled with PureTech’s patented video analytics, promises to enhance security posture and operational performance. The synergy between Magos’s radar systems and PureTech’s AI-boosted geospatial video analytics was demonstrated through various recorded demonstrations at PureTech’s booth drawing attention from industry professionals and potential clients alike. A successful showcase The atmosphere at ISC West was charged with a growing number of innovative and forward-thinking professionals united by a shared goal of securing the future. The success of ISC West 2024 for PureTech Systems was not just in expanding industry affiliations, but also in the optimistic reception from the market and the potential for future growth opportunities these collaborations could unfold. Industry experts and attendees praised the strategic direction PureTech is taking, highlighting the company’s initiative to continue to deliver technological advancements to the security sector. Announcement of the reseller agreements with i-PRO and Magos not only enhances PureTech's market ISC West also provided an excellent platform for networking, with PureTech Systems capitalising on the opportunity to connect with other industry pioneers, current and potential clients. The event facilitated rich discussions on emerging trends, current challenges, and innovations in security technology, further positioning PureTech at the forefront of the industry. ISC West 2024 proved to be a success for PureTech Systems. The announcement of the reseller agreements with i-PRO and Magos not only enhances PureTech's market offering but also sets the stage for a new era of delivering turn-key, integrated security solutions. As PureTech Systems continues to navigate the evolving landscape of security technology, its participation in ISC West has undoubtedly bolstered its position as a pioneer committed to excellence and innovation in the industry. Looking Ahead As they look forward to the next big events, PureTech Systems will be exhibiting at the Border Security Expo at booth #1001 in El Paso, TX in May, and later at the GSX in booth #1954 in Orlando, FL in September. These events will provide additional opportunities for PureTech to showcase its geospatial AI-boosted video analytics and integrated security solutions.
PureTech Systems Inc., known for its advanced geospatial AI-boosted video analytics for critical infrastructure and border security, announces its new status as a reseller of Magos Radars. Detect, classify, track, alert The initiative marks a significant step in PureTech Systems offering a turnkey solution for effective perimeter protection. The award-winning combination of technologies has been recognised for its superior capability to autonomously detect, classify, track, alert, and deter security threats, particularly in challenging environments where precision is critical. PureActiv software The joint solution ensures an unmatched level of security and monitoring efficiency PureTech's PureActiv software utilises its field-proven AI-boosted video analytics to analyse video feeds in real-time, providing users with auto-verified actionable intelligence and unparalleled situational awareness with near-zero nuisance alarms. When paired with Magos' radar technology, renowned for its cost-effective, low-power, high-performance radars, the joint solution ensures an unmatched level of security and monitoring efficiency. AI-boosted video analytics PureActiv responds to detections from the Magos radar by dispatching one or more PTZ cameras to point at the detection location and then executes its AI-boosted video analytics to determine if the moving object (person or vehicle) is a threat. If a threat, PureActiv issues an alarm into the client’s VMS/PSIM and commands the PTZ to track the moving object even if it moves outside the field of view of the radar. Operational efficiency Larry Bowe, President & CEO of PureTech Systems, expressed enthusiasm for this new reselling agreement, "Becoming a reseller for Magos Radars is a natural progression in our mission to deliver top-tier security solutions." "Our integration with Magos has already set high standards in the industry, and now, as a reseller, we can offer a turnkey solution with superior accuracy that enhances security posture and operational efficiency.” Perimeter security PureTech Systems aims to empower organisations with the tools they need for comprehensive security This comprehensive integrated solution, featuring PureTech's geospatial AI-boosted video analytics and Magos' radar technology, is designed to serve a wide array of industries requiring robust perimeter security, including critical infrastructure, airports, seaports, and country borders. With this initiative, PureTech Systems aims to empower more organisations with the tools they need for comprehensive security and threat detection. Geospatial AI-boosted video analytics To learn more about PureTech Systems and Magos Systems, and experience their innovative security solutions firsthand, be sure to visit them at ISC West in Las Vegas, April 9-12. Visitors can find PureTech at booth #7055, where they will be showcasing the latest advancements in their geospatial AI-boosted video analytics and integrated security technologies. Magos Systems is at booth #28053. Don't miss this opportunity to engage with the experts and discover how their award-winning solutions can enhance security operations.
The International Organisation for Migration reports that the migrant flow has been steadily rising, with the numbers swelling from 153 million in 1995 to 281 million in 2022. Concurrently, the quality of counterfeit documents keeps advancing. Under these circumstances, the need for more sophisticated border control tools has never been greater. Regula steps up to this challenge by upgrading its Regula 4205D, a one-of-a-kind device designed to significantly enhance the efficiency and effectiveness of document verification processes. Equipped with 13 light sources and capable of 30x magnification, Regula 4205D streamlines the workflow of border officers, helping them make well-informed decisions. Key capabilities of the Regula 4205D The key capabilities of the Regula 4205D High-precision magnification. A state-of-the-art camera offers clear 30x magnification, uncovering details, such as microprinting applied with UV and IR fluorescent inks, that were previously only visible in professional laboratories. Comprehensive inspection under light sources. With its 13 light sources for multi-level inspection, the Regula 4205D examines every security feature, from the document substrate (watermarks, security fibres and threads) to printing techniques and UV and IR fluorescent security inks, ensuring no detail is overlooked. Enhanced operational efficiency. The device's capability of automated data retrieval from MRZs, RFID chips, and barcodes, coupled with visualising invisible personal information (IPI) and data cross-check verification, expedites the identification process and improves accuracy. Rapid, in-depth checks. Powered by an 11th-generation Intel N5105 processor and 8 GB of RAM, the device enables thorough manual checks of document authenticity without compromising on processing speed. Ease of use. An intuitive 11.6-inch touchscreen interface simplifies the inspection process, while HDMI connectivity facilitates training sessions for border control officers. Plus, its compact size and plug-in working mode allow for fast and secure installation. Integration with Regula Information Reference Systems (IRS). An optional feature that provides access to a comprehensive database of document images and their security features from around the globe, aiding in precise verification. Unparalleled document verification technology “Border control authorities are at the forefront of fighting identity document fraud, because it’s usually where the most sophisticated document forgeries appear. We know how crucial it is to stop fraud at the entry point before it does any significant damage. That’s why we upgraded our Regula 4205D to offer unparalleled document verification technology that elevates border control operations to new heights." "Not only does its unique blend of speed, accuracy, and ease of use facilitate document processing, but also contributes significantly to fighting document fraud and illegal migration. Our commitment to in-house production, LED technology, and minimal mechanical parts, alongside our proprietary software development, guarantees the reliability and sustained performance of the 4205D, making it an indispensable asset for border control agencies worldwide,” says Alex Lewanowicz, Director of Hardware Engineering at Regula.
Integrated Access Control and Security manufacturer TDSi announced it will be appearing at the Official UK Government Global Security Event, Security & Policing 2024, which takes place at the Farnborough International Exhibition and Conference Centre between 12th and 14th March 2024. Appearing on Stand P104, TDSi will be showcasing the TIL Technologies Tillys Cube Access Control Units and Microsesame Cube Software, which are ANSSI certified making them ideal for deployment across critical national infrastructure and law enforcement spaces. ANSSI-certified TIL Technologies John Davies, Managing Director of TDSi commented, “We are excited to be showing fellow VitaProtech Group sister company TIL Technologies’ powerful range at this year’s Security & Policing event, which brings together the key people and technology in the national security sphere." "Fully ANSSI-certified TIL Technologies’ solutions are specifically designed and tested to protect the most critical of security requirements and we are delighted to be introducing them to visitors at the event for the first time.” Advances in national security and resilience TDSi announced its supply and support of the Microsesame Cube Supervision Software Hosted by the Home Office’s Joint Security & Resilience Centre (JSaRC), Security & Policing offers a world-class opportunity to meet and discuss the latest advances in delivering national security and resilience with UK and overseas Government officials and senior decision-makers across the law enforcement and security sectors. TDSi recently announced its supply and support of the Microsesame Cube Supervision Software and Tillys Cube Access Control Hardware, from its fellow VitaProtech Group member TIL Technologies to customers in the UK and Ireland. Portfolio of projects It also announced the appointment of Paul Taylor as its Sales Specialist for TIL Technologies’ market-pioneering security systems in the UK. TIL Technologies has an extensive portfolio of projects, with over 6,000 sites equipped with its products. These include large and well-known national French customers such as French Ministries, SNCF, the French Post Office ‘LA POSTE’, EDF, AXA, and the French military shipbuilder NAVAL GROUP. Its systems also protect several prestigious buildings, such as the ‘Tour First’ in la Défense, Marseille’s Vélodrome stadium, and Le Château de Versailles.
Over recent months, global rivals have made rapid progress in the proliferation of VTOL & Fixed Wing platforms and breakthrough technologies being used and integrated into their military strategies and warfare activities. Such escalation in recognition, advancement, and use, has posed a significant threat to U.S. programmes and security, impacting civil and commercial targets alike. With these threats on the doorstep, it is essential to efficiently build out powerful countermeasures against malicious drone activities and to rapidly roll out these defence strategies and applications. Challenges with drone activity With these pressing needs in mind, ACI (the American Conference Institute), will gather top government pioneers, counter-unmanned technology experts, and global allies to share insights and build a collaborative plan to counteract the evolving challenges posed by drone activity. The 3rd Annual National Congress on Counter UAS Technology will take place on May 23-24, 2024, at the Cooperative Plaza Conference Center in Arlington, VA. Real-time usage of drone technology The 2024 event will shed light on the most complex technologies and legislation evolving in drone technology For those looking for an interactive review of global drone activities and national defence applications, this is the event for those visitors. Delving into the real-time usage of drone technology in war, emerging federal policies, and more, the 2024 event will shed light on the most complex technologies and legislation evolving in this space, while also providing a platform for collaborative efforts between government pioneers and technology innovators. Speakers at the summit Government, DoD & Industry Speakers at the summit will include Chairman, Major Gen (USAF-ret) James Poss (CEO, ISR Ideas, Former Assistant Deputy Chief of Staff for ISR, HQ, U.S. Air Force, Washington, D.C), Jeremy Kofsky (Senior Fellow, Information Warfare Institute for AI Research, Former AI Implementation DoD Fellow, USMC), Micah Campbell (Executive Director, UAS & Emerging Entrants Security AXU, Security & Hazardous Materials Safety), Travis Moran (Senior Reliability & Security Advisor, Federal Energy and Regulatory Commission (FERC)), Colonel Mike Parent, USA, (Chief, Joint Counter sUAS Office Acquisition and Resource Division) Brandon Youngblood, Group Manager, UAS Security and C-UAS Integration, FAA) and many more!
On February 8th, PureTech Systems, under the auspices of the Security Industry Association (SIA) and the National Capital Region Security Forum, hosted the 4th government-industry engagement with CBP. This time, the guest speaker was Mr. Henry Laxdal, who currently serves as Deputy Directorate Chief of the U.S. Border Patrol (USBP) Program Management Office Directorate (PMOD). Vision and strategy Chief Laxdal provided valuable insights into the evolving vision and strategy of how PMOD supports the overarching USBP Strategy to keep America safe. He discussed how the Border Patrol strives to remain innovative in its pursuit of border security, shedding light on how important industry stakeholders are to its complex mission. Chief Laxdal's experience Chief Laxdal worked in Law Enforcement Operations, Strategic Planning, and Analysis, at the Office of Acquisition His public service progressed from being a Border Patrol agent in Arizona to working at USBP Headquarters in Washington, DC, to working as a Patrol Agent in Charge on both the Northern and Southern borders and then back to USBP Headquarters. While assigned to Headquarters, Chief Laxdal worked in Law Enforcement Operations, Strategic Planning, and Analysis, at the Office of Acquisition, and is currently the Deputy of PMOD. Identify, target, and mitigate threats Close to 50 participants from industry stakeholders gathered to hear how PMOD strategises and prioritises innovative technology to identify, target, and mitigate emerging threats. Chief Laxdal discussed the decision-making process for large-scale programs of record and newly identified potential solutions that might solve a particular capability gap. Chief Laxdal answered each question from the attendees in detail providing additional clarity to many of the interrelated topics discussed during the previous week's Industry Day and beyond. Key insights From Chief Laxdal’s keynote and subsequent Q&A that lasted almost two hours, PureTech gathered the following important points: There is a continued need for enhanced coordination between Border Patrol and the local sheriff departments, which often operate in overlapping jurisdictions. By establishing partnerships, it allows more effective and coordinated efforts along the border and in the local communities they protect. The shared intelligence from community policing efforts, surveillance systems, and other similar systems enhances agents’ ability to manage operations along the border, increasing the safety and well-being of neighboring communities. AI plays an important role in integrated systems with automated detection, continuous monitoring, and predictive analytics, and is considered a critical component in increasing the efficiency of border operations by streamlining processes and functions that can be completed with advanced computing. Chief Laxdal articulated how staffing and attrition rates have become an increasing challenge, requiring creative methods to complete the mission with fewer people. As technology evolves, the agency must continue to consider how best to utilise autonomous sensors in all environmental domains of land, air, and sea. The USBP must continue to grow its capability to rapidly adapt and deploy mobile solutions like unmanned aerial vehicles, land-based sensor nodes, subterranean detections, and future acquisition plans such as the Modular Mobile Surveillance Systems (M2S2) that provide remotely operated capabilities that reduce the need for additional manpower. Transnational Criminal Networks (TCN) are adopting the use of drones to infiltrate the borders of the United States, presenting a significant threat to the security of the nation. TCNs seek to illegally smuggle any commodity into the U.S. that provides a profit, ranging from narcotics trafficking like fentanyl to human trafficking. Additionally, TCNS are persistently monitoring border operations with the use of drones, seeking to disrupt the effectiveness of a Border Patrol response to illicit activity. To mitigate these security risks, CBP must have the flexibility and authorisation to implement counter-drone operations that can identify, classify, track, and intercept drones that terrorists and TCNs could nefariously use. Another source of effort is the Common Operational Picture (COP), designed as a software solution that ties in edge computing, artificial intelligence, and machine learning to further enhance the interdiction effectiveness of the USBP. The COP synthesises large amounts of data through border detections into a unified user interface that can be used to prioritise threats and deploy border agents to prevent those threats. Discussions and networking opportunities The National Capitol Region Security Forum, in partnership with its many stakeholders, is immensely grateful for Chief Laxdal’s participation and candidness and looks forward to future opportunities to learn from his leadership. The preparation for this event spanned several months, and in the end, it provided a successful opportunity for engagement and set the stage for meaningful discussions and networking opportunities. Border security “PureTech sponsorship demonstrates their commitment to advancing the field of border security and their dedication to supporting initiatives that promote collaboration, innovation, and best practices." "This sponsorship, alongside SIA and NCRSF, provides all of us with a platform to bring government pioneers' expertise and vision to an audience of industry professionals,” says Wayne Esser of NCRSF.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilising the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualisation and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organisers globally have cancelled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was cancelled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theatre offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local/national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
Case studies
In a landmark achievement for air travel technology, Zayed International Airport has successfully processed over one million passengers through Abu Dhabi’s new terminal since its inauguration on 15 November 2023. This marks a significant milestone in the journey towards enhanced travel efficiency and security, showcasing the power of cutting-edge biometric technology. Building on a long-term commitment to advancing airport capabilities, IDEMIA has been at the forefront of innovation in the UAE since 2011. The deployment of a comprehensive border management solution at Abu Dhabi Airport, featuring the world’s first multi-biometric entry/exit system, has significantly bolstered border security while simultaneously enhancing the passenger experience and throughput. The success of this groundbreaking project has led to its extension to the country’s four other international airports. Rollout of cutting-edge biometrics STJ solution uses advanced facial recognition technology to simplify the passenger venture The Single Token Journey (STJ) solution, a highlight of this collaboration, employs advanced facial recognition technology to streamline the passenger experience. By assigning a unique digital identifier to every traveller, the STJ solution eliminates the need for multiple documents, enabling passengers to move from curb to gate, including the border clearance step, in a record time of just 12 minutes. "The initial rollout of cutting-edge biometrics at Zayed International Airport underscores our dedication to enhancing airport experiences through innovation and technology, ensuring efficiency, convenience, and superior service. Once fully implemented, Abu Dhabi will pioneer as the world’s first airport with biometrics integrated at every stage, ensuring travellers enjoy a seamless, safe, and secure journey," Elena Sorlini, MD and CEO, Zayed International Airport. Efficiency of the STJ solution "We are thrilled to witness the transformative impact of our biometric solutions at Zayed International Airport’s new terminal. This milestone is not just a testament to our successful collaboration with Zayed International Airport but also a clear indicator of our commitment to enhancing the travel experience through innovation." "The processing of over one million passengers since November is a significant achievement for us, and it underscores the scalability, security, and efficiency of the STJ solution. Together, we are setting a new global standard for passenger facilitation," Osama Al Makhamreh, Vice President, Sales – Middle East & Africa, IDEMIA Public Security. Zayed International Airport’s commitment This innovative approach not only enhances security but significantly improves the overall passenger experience. The success of the STJ solution at Zayed International Airport marks a pioneering step towards transforming air travel across the Middle East and potentially the world. The initiative aligns with Zayed International Airport’s commitment to adopting cutting-edge technologies that streamline the travel process, reinforcing the UAE’s position as a pioneering hub for technological advancement and superior passenger facilitation.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Athena Security’s Concealed Weapons Detection System was selected by Champions Club Texas to protect patrons, members and staff at a first-of-its-kind hospitality destination in Houston that features a full-service hotel, lounge and bar with Southern-inspired cuisine and private-membership poker. Located in Houston’s expanding Westchase community, Champions Club Texas is celebrating its grand opening as a destination offering something for everyone, from business travellers seeking comfortable accommodations with well-appointed amenities to locals looking for a unique night out. Weapons detection system Athena's Concealed Weapons Detection System (WDS)/Walk Through Metal Detector is engineered to detect a wide range of mass casualty threats like handguns, shotguns, and rifles without requiring individuals to stop as they pass through the detector. There is no need to have individuals remove phones, wallets, or other extraneous items from their pockets due to the proprietary multiple-sensor detection method. The system adheres to Federal Standards while allowing both auditory and visual alert options, as seen in the best practices of Homeland Security for WDS. The concealed weapons detection system is designed to scan walking at an average speed of one person per second. Unintimidating approach Athena Security is a solution that detects weapons upon entry and is one of the many layers of security “At Champions we are raising the bar in hospitality and gaming, and that includes ensuring the most comfortable and safe atmosphere for our valued customers,” said Trent Touchstone, Director of Security, Champions Club Texas. “Athena Security is a solution that detects weapons upon entry and is one of the many layers of security protocols in place at Champions that improves operational efficiency of our security team as a workforce multiplier.” Athena Security’s low profile, unintimidating approach is a welcome differentiator from historic metal detector tech by eliminating the need to check cell phones and keys, allowing for a better flow into the venue. Modest-full time security team Advanced analytics and management protocols allow for deep visibility and flexibility to maintain staffing levels providing the highest level of safety. Touchstone, a 28-year veteran of the United States Marshals Service Chief with a long history of threat analysis, notes that given the hotel and membership club will require 24/7 attention with a modest-full time security team, he appreciates Athena Security’s ability to provide a feature-rich entryway security experience with the ability to automate and accomplish so much remotely.
Ipsotek, an Eviden Business at Atos Group, has announced that it was appointed to provide its AI video analytics technology at the soon-to-be-opened new Midfield Terminal Building at Abu Dhabi International Airport, in Abu Dhabi, UAE. Delivered in partnership with Atlas Security, deployment of Ipsotek’s AI video analytics solutions is anticipated to improve operations, security, and safety across various areas of the Midfield Terminal Building, which is renowned for its iconic architecture and recently gained international attention as a filming location for Mission: Impossible - Dead Reckoning Part One. Advanced surveillance capabilities Ipsotek's AI video analytics technology is well-equipped to address these circumstances Safety and security are clearly paramount in any airport environment, and Ipsotek's AI video analytics technology is well-equipped to address these concerns. The advanced surveillance capabilities of the solution enable operators to detect and identify potential threats across various zones of the airport. By leveraging intelligent algorithms and machine learning, the system can recognise suspicious behaviours, unauthorised access attempts, or other pre-defined security risks in real time, allowing for swift response and mitigation. Ipsotek's AI video analytics By leveraging Ipsotek's cutting-edge video analytics solutions, the airport aims to enhance its security measures by effectively detecting abandoned baggage scenarios. Security teams at the airport will be able to quickly identify and respond to any unattended baggage, reducing potential security risks and ensuring a safe environment for passengers and staff. "The deployment of Ipsotek's AI video analytics solutions at the Midfield Terminal Building signifies a significant leap forward for the aviation industry," said Sophiene Marzouk, Ipsotek’s UAE Country Manager. Sophiene Marzouk adds, "We are proud to collaborate with Atlas Security to deliver state-of-the-art technology that enhances operations, security, and safety in one of the world's most iconic airport buildings." Ipsotek's solutions Ipsotek's solutions also play a crucial role in optimising queue management and crowd control “Atlas Security aspires to implement the best technology for security systems in airports and we therefore look to partner with companies bringing innovation in security applications with Artificial Analytics. One company that brings this cutting-edge technology is Ipsotek and Atlas Security is proud to work in the Midfield Terminal Building with Ipsotek,” said Khizer Rehman, Project and Technical Manager at Atlas Security. Ipsotek's solutions will also play a crucial role in optimising queue management and crowd control throughout the airport. By analysing video feeds, the software can determine queue lengths and alert airport staff to potential bottlenecks. New standards for excellence The intelligent system will empower operators to proactively manage queues, allocate resources effectively, and ensure a smooth flow of passengers. As travellers eagerly anticipate the unveiling of the Midfield Terminal Building, the deployment of Ipsotek's AI video analytics solutions is set to improve the airport experience, from safety to security and operations setting new standards for excellence in the aviation industry and turning an impossible mission into a successful deployment.
Quanergy Solutions, Inc., a pioneering provider of 3D LiDAR (Light Detection and Ranging) security solutions, was chosen by a large municipality in California, USA, in order to bolster pedestrian safety in the city's underground railways where fatality risks and costly liability issues were of growing concern. Traditional video surveillance The California city’s management had been grappling with a substantial number of missed alarms within its underground railroad system due to the intricate terrain and challenging lighting conditions. The absence of alarms when individuals trespassed onto train tracks posed a significant liability issue, endangering lives and increasing operating expenses. Traditional video surveillance systems had further proven ineffective in these environments due to inconsistent lighting and various obstructions that made it difficult to maintain a consistent field of view. Quanergy’s comprehensive solution Quanergy hyper-accurate detection and tracking of individuals in the city’s railroad system By deploying Q-track, a seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software, Quanergy enables hyper-accurate detection and tracking of individuals in the city’s underground railroad system, most importantly those individuals who find their way onto dangerous railroad tracks. Quanergy’s comprehensive solution also effectively eliminates alarm fatigue by significantly reducing false alarms. This enables operators to focus on real threats and receive actionable insights with hyper-accuracy, ensuring that no urgent alarms are missed, averting possible injuries or even fatalities. Quanergy LiDAR security solutions Thanks to Quanergy's solution, the city now reports that they have 100% accurate detection when pedestrians are on train tracks. Quanergy LiDAR security solutions are currently deployed at hundreds of critical infrastructure sites around the world, addressing a wide spectrum of mission-critical applications including perimeter intrusion detection, server rack and cabinet security, mobile security towers, mantrap/vestibule access controls, rooftop security, and more.
The Public Security Department is the law enforcement agency responsible for maintaining public safety, preventing crime, and upholding the law in the region. Established in 1873, the force has been instrumental in maintaining peace and stability in the area, particularly in counter-insurgency operations. In addition to its core operations, the department conducts community service activities to bridge the gap between the department and the public. The force works closely with other law enforcement agencies to ensure effective coordination and cooperation. Dedicated to upholding the rule of law and protecting the rights of every citizen, it is committed to building a safe and secure environment in the region. Business scenario The lack of centralised monitoring capabilities at the head of the department's office The department is divided into multiple zones, ranges, and districts, with each district housing several branch offices. However, monitoring these dispersed stations posed a challenge. The lack of centralised monitoring capabilities at the head of the department's office and inadequate infrastructure at the department branches could have helped with real-time updates and efficient communication. To address this, the department aimed to enhance surveillance infrastructure, enable streaming access to all stations, and establish a centralised monitoring system. These efforts would improve coordination, data management, and security services for the people of the state. Challenges Monitoring challenge: The stations are dispersed across multiple locations Lack of centralised monitoring capabilities at the head of department’s office Inadequate infrastructure at the stations for local data recording Hindered real-time updates and efficient communication across the network Solution A total of 70 cameras were installed with varying focal lengths and capabilities to cover 20 branches in the jurisdiction. Based on their requirement the experts suggested high-resolution 5MP bullet cameras with audio support to capture clearer images and for playback and investigation. The motorised varifocal lens and PTZ cameras can be manoeuvered remotely for better control over the cameras. Motorised varifocal lens and PTZ cameras can be handled remotely for better control To enable the streaming and recording of footage for a longer duration, eight-channel network video recorders (NVRs) with 1 SATA port (each SATA port supports 10TB storage support) were installed across 20 locations. These NVRs were connected to television screens using HDMI cables, enabling the streaming of live footage at local offices. Matrix SATATYA SAMAS For centralised surveillance, all NVRs related to Matrix SATATYA SAMAS use static public IP. The video management system was connected to the desktop for monitoring purposes and provided Matrix SATATYA VISION 24×7 surveillance on the go. The Matrix team also provided training to the officials on how to use the video surveillance infrastructure effectively. They were taught to leverage the system's full potential, including best practices for monitoring, managing, and analysing data captured by the system. Products offered SATATYA CIBR50FL40CWP: 15 Nos. 5 MP Project Series IR Bullet Camera with 4 mm Fixed Lens and Audio Support SATATYACIBR50MVL12CWP: 40 Nos. 5 MP Project Series IR Bullet Camera with Motorised Varifocal Lens and Audio Support SATATYA PZCR20ML25CWP: 10 Nos. 2 MP Pan-Tilt-Zoom Camera with 25× Optical Zoom and Audio Support Matrix SATATYA NVR0801X: 20 Nos. Eight-channel NVR with 1SATA Port Support Matrix SATATYA SAMAS Video Management System with 70IP Camera Licences and three Concurrent User Licences Benefits Matrix's video surveillance solution has empowered the department with real-time updates. The robust infrastructure enables centralised monitoring, enhancing public safety and quick response to incidents. Matrix's expertise and technical capabilities have significantly contributed to maintaining law and order in the region.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?