Campus security systems
The Association of University Chief Security Officers (AUCSO), the organisation for security professionals working in Higher and Further Education around the world, has announced its new Chair and Vice Chair who take up their positions in April 2025. Current Vice Chair Geoff Brown, Head of Community Safety and Campus Security at the University of Leeds, will become the Chair of AUCSO replacing Chair, Ollie Curran, who is stepping down after serving in this role for two years. Geoff Brown Afte...
Skills for Security is attending the National Apprenticeship Show – London & South East, a key event connecting young people, school leavers, and college graduates with apprenticeship opportunities across various sectors. Role of apprenticeships The show will take place during National Apprenticeship Week 2025 and provides a unique opportunity to highlight the transformative role apprenticeships play in equipping young adults with the skills needed for successful careers. By partici...
Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control...
Advantech Co., Ltd., a global pioneer in IoT intelligent systems and embedded platforms hosted the "2025 New Year & New Vision Gathering " at the Taipei International Convention Center (TICC). 2025 brand vision The event, featuring afternoon and evening sessions, attracted more than 4,000 enthusiastic participants, including employees, their families, and partners. In addition to captivating performances, the highlight of the event was the unveiling of Advantech's new 2025 brand vision...
Bromsgrove-based security and monitoring company, Ecl-ips, is celebrating its win at the North Worcestershire Business Awards 2024. Best use of Technology Ecl-ips was a winner in the ‘Best use of Technology’ award category at the event at Hogarths Stone Manor near Kidderminster. Ecl-ips beat two other finalists: Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer to win. The security installer was among the 30 local businesses that were...
Secure Logiq is proud to mark the second anniversary of its regional headquarters in Business Bay, Dubai, on November 7, 2024. Impact in Dubai Since opening the office in 2022, Secure Logiq has made significant strides in the Middle East, forging impactful partnerships, winning industry awards, and supporting high-profile projects across the region. Driven by the immense potential and unique demands of the Middle Eastern market, Secure Logiq’s Dubai office has made its presence known ov...
News
Bromsgrove-based security and monitoring company, Ecl-ips, is counting down to the North Worcestershire Business Awards on Thursday 21 November 2024 at Hogarths Stone Manor near Kidderminster. The company is among the 30 local businesses that have been short-listed for an award. Ecl-ips is a finalist in the ‘best use of technology’ award category along with Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer. Vape detector The nomination form Ecl-ips centered on the advanced technology that is provided by its vape detector offering, the HALO Smart Sensor. manufactured by IPVideo in the USA. Ecl-ips was one of the first companies in the UK to identify the potential of the technology that provides real-time alerts of vaping as well as providing indoor air quality monitoring. With all its solutions Ecl-ips aims to find the best partners to help meet the needs of its clients. HALO Smart Sensor The vape detector has proved to be very effective at improving pupil behaviour and reducing vaping This smart sensor has supported schools in the UK to tackle the problem of the rising numbers of young people who are vaping. Schools are finding that students are disrupting lessons by asking to go to the toilet and creating an intimidating atmosphere in the school toilets because more students are gathering in them to vape. When combined with strengthened behaviour policies and the use of CCTV outside the toilets to confirm the identities of students, the vape detector has proved to be very effective at improving pupil behaviour and reducing vaping at school. Customer comments Ecl-ips customer, Matthew Carpenter, Principal at Baxter College in Kidderminster, said, “It has transformed the amount of antisocial behaviour in toilets, children are more confident in going to the toilets." "It has also reduced the number of students asking to go to the toilet during lessons.” North Worcestershire Business Awards The North Worcestershire Business Awards are judged by an independent panel that said the finalists reflect “an impressive range of diverse businesses, all showcasing their commitment to growth, sustainability and adding extra value for customers.” In their sixth year, the awards are organised by North Worcestershire Business Leaders (NWBL) and the local authorities in North Worcestershire in partnership with Hogarths Stone Manor.
Alcatraz AI, a global provider of frictionless, AI-powered biometric access control technology revolutionising security through facial authentication announced a strategic partnership with CBORD, a provider of integrated technology solutions used on higher education and healthcare campuses across the country. Together, Alcatraz AI and CBORD will deliver a safer and more secure campus environment, protecting students, patrons, and staff. Frictionless access This partnership combines and leverages Alcatraz AI's advanced intelligent tailgate detection platform and AI-driven facial authentication with CBORD's trusted systems, empowering higher education institutions and healthcare organisations to provide frictionless access throughout their campuses. This includes secure, easy entry into dining and academic areas, athletic facilities or locker rooms, and enhanced security for sensitive research or IT areas, all while ensuring only authorised individuals access the appropriate spaces across campus and facilities. Indoor and outdoor biometric security Rock X, Alcatraz AI's latest product offering, is designed to revolutionise indoor and outdoor biometric security With this new partnership, Alcatraz AI and CBORD are collaborating to deliver elevated security that is simple to deploy and use across multiple access points on campuses, enhancing both the user experience and building safety. Rock X, Alcatraz AI's latest product offering, is designed to revolutionise indoor and outdoor biometric security and access control through high-performance, frictionless, and secure facial authentication, regardless of the setting. AI-powered technology The AI-powered technology works in all weather and real-world lighting conditions, ensuring that only authorised individuals can enter a secured area at any time of day. In the school campus and healthcare facility settings, Rock X will help enhance physical security, allowing confidence in secure access points both in indoor and outdoor areas. Facial authentication technology "We are thrilled to be partnering with CBORD to extend our facial authentication technology to higher education and healthcare campuses, and to strengthen safety without sacrificing user convenience for authorised individuals," said Tina D'Agostin, CEO of Alcatraz AI. "Together, we're looking forward to further improving how organisations approach access control." Rock X "Expanding our innovative solutions to more institutions and facilities adheres to our mission of making the world a safer and more secure place." "We look forward to working together to demonstrate how Rock X enables frictionless access control that integrates with existing security operations and alleviates challenges for administrators, managers, and users, alike." Operational efficiency "CBORD's mission is to provide the most innovative, convenient technology solutions for higher education and healthcare campuses," said CBORD President and CEO Dan Park. "We're thrilled to collaborate with Alcatraz AI to give customers the best in seamless facial authentication and access control. This partnership enables us to offer enhanced security and improved operational efficiency, resulting in a safer, more engaging environment for students, patients, visitors, and staff."
Camelot Secure, a revolutionary new cybersecurity company, announced that it has been named a finalist in two prestigious categories for the 2024 Cybersecurity Association of Maryland, Inc. (CAMI) Cybersecurity Awards: Cybersecurity Innovation of the Year and Diversity Trailblazer of the Year. These awards celebrate Maryland-based companies and individuals driving innovation and promoting inclusivity in the cybersecurity industry. APT Hunting service Camelot Secure has made significant strides in cybersecurity innovation through its Advanced Persistent Threat (APT) Hunting service. The company’s Secure360 platform, which integrates AI, machine learning, and advanced threat intelligence, proactively detects and neutralises cyber threats before they infiltrate critical systems. This groundbreaking approach has positioned Camelot as a pioneer in safeguarding businesses and government entities from evolving cyber risks. Inclusion in cybersecurity Camelot Secure is recognised for its duty to fostering variety and inclusion in cybersecurity As a Diversity Trailblazer of the Year finalist, Camelot Secure is recognised for its commitment to fostering diversity and inclusion in cybersecurity. The company actively engages with underrepresented groups, including partnerships with Historically Black Colleges and Universities (HBCUs), and creates pathways for minorities and underserved communities to thrive in cybersecurity careers. Camelot Secure’s CEO, Stan Oliver, emphasises the importance of recruiting diverse talent and providing mentorship to cultivate a culture of inclusion and excellence. 2024 CAMI Cybersecurity Awards The 2024 CAMI Cybersecurity Awards winners will be announced on September 19th at the College Park Marriott Hotel & Events Centre. For more information about the awards, please visit CAMI’s website. In addition to being a CAMI Finalist, Camelot is the recipient of many industry and cybersecurity-related honours, including: 2024 Security Innovator Award - Selected from passionately-written peer submissions, Camelot CEO Stan Oliver stood out from other applications as a trusted mentor who demonstrates exceptional leadership, innovation, and commitment to the cybersecurity industry. 2024 CSO Award from Foundry’s CSO - Camelot was honoured for Myrddin, which integrates Natural Language Processing (NLP) technologies and the latest AI Generative Pretrained Transformer (GPT) to assist IT personnel in conducting Cybersecurity Maturity Model Certification (CMMC) gap assessments in a secure environment. 2024 Fortress Cybersecurity Awards - Camelot’s CEO Stan Oliver was named a winner in the Leadership category. 2024 Cybersecurity Excellence Awards - The company won the CEO of the Year, Best Cybersecurity Startup, and Advanced Persistent Threat (APT) Hunting awards. 2023 Top InfoSec Innovators Award - Cyber Defense Magazine recognised Camelot for its Advanced Persistent Threat (APT) Hunting offering. 2023 CSO50 Award from Foundry’s CSO - Camelot earned the honour for its CMMC eDiscovery Tool and its ability to significantly reduce the cost and complexity associated with CMMC compliance by focusing on the targeted identification and organisation of sensitive data.
Acts of violence in schools have taken a heavy toll. The lives of students and staff have been lost. Public faith in the safety of their schools has been shaken and the ability of schools to educate has been adversely impacted. The review and analysis of these incidents indicate that many were preventable. Need for school security Currently, information and guidance for schools on effective prevention, mitigation, and response to potential acts of school violence is scattered and sometimes even contradictory. Although many documents address school security, no single industry standard provides a complete roadmap for establishing a holistic and comprehensive school security program. School Security Standard ASIS International Professional Standards Board tasked a diverse team of 50 global experts from various disciplines ASIS International, an ANSI-accredited standards development organisation and the world’s largest association for security management professionals is currently developing the first comprehensive School Security Standard, due to launch in 2025. The ASIS International Professional Standards Board tasked a diverse team of 50 global experts from various disciplines (such as school administration, security, architectural design, mental health, behavioural threat assessment, facilities management, life safety, emergency management, law enforcement, crisis communications, business continuity, and legal) to create a comprehensive framework that addresses critical areas including physical protection measures, behavioural threat assessment and management, and school emergency operations planning. Press briefing at GSX ASIS will be hosting an hour-long press briefing during its annual Global Security Exchange 2024 at the Orange County Convention Centre in Orlando, Florida. The briefing will take place on Tuesday, 24 September at 10:00 am ET in-person in room S210DE at the OCCC and virtually via livestream. The briefing will consist of a presentation by a panel of five experts who worked on the development of the proposed standard. The panel will consist of the following five experts: C. Joshua Villines, CTM, CPP, PCI, PSP | Executive Director, HUMINT Group Drew Neckar, MBA, CPP, CHPA | Principal Consultant, COSECURE Enterprise Risk Solutions Guy Bliesner | School Security Analyst, Idaho State Board of Education Jeffrey Slotnick, CPP, PSP | President, Setracon Enterprise Security Risk Management Services Michael Rozin, CTM | President, Rozin Security
Comcast Smart Solutions, a division of Comcast Corporation that specialises in smart technology solutions for businesses and communities announced that it is expanding its relationship with the City of College Park (College Park), Georgia with AI-powered video analytics in its downtown area. This technology will provide valuable data and insights, informing plans for more efficient traffic, local business growth, and more. College Park Established in 1890, College Park has been steadfast in its mission to cultivate a community where businesses, families, and individuals can work, play, and live in a better environment. College Park began its collaboration with Comcast Smart Solutions in 2022 to upgrade the city’s public WiFi network and help the city monitor a heavily trafficked area. The city is once again partnering with Comcast Smart Solutions to introduce more advanced video analytics on its Main Street. AI video analytics solutions The city will use vehicle, pedestrian, and bicycle traffic analytics to inform and help improve flow College Park’s bustling Main Street – a hub of shops, restaurants, and green spaces, is equipped with advanced AI video analytics solutions from C2RO. The deployment was made even more cost-effective by easily integrating it into existing camera infrastructure. The city will use vehicle, pedestrian, and bicycle traffic analytics to inform and help improve flow and path patterns. Metrics will be shared with local businesses and inform city growth plans. Smarter and safer cities “College Park's successful initial deployment with our advanced video analytics solutions has led them to expand into its vibrant Main Street,” said Mike Slovin, Vice President and General Manager of Comcast Smart Solutions. “We're excited to continue our close partnership and showcase how Comcast Smart Solutions helps cities operate smarter and safer, benefiting residents and businesses alike.” Real-time insights The smart system seamlessly integrates with a cloud app, making it easy for the city to access With the addition of these smart video solutions, College Park’s existing cameras on Main Street are delivering real-time insights on vehicles, pedestrians, and cyclists, including their speeds. This smart system seamlessly integrates with a cloud app, making it easy for the city to access real-time views of traffic patterns and trends that enhance pedestrian and cyclist safety. Smart technology "Through the partnership with Comcast Smart Solutions, we have transformed our downtown area into a more appealing place for residents and visitors alike,” said Michael Hicks, Chief Information Officer of College Park, Georgia. “The data-driven insights from their smart technology have been crucial in helping us enhance our city services. We've seen promising improvements, which empowers us to allocate resources effectively and better serve our community.” Data analysis College Park’s partnership with Comcast Smart Solutions goes beyond the technology. The city received comprehensive project management, installation oversight, and training. Comcast Smart Solutions is also providing ongoing data analysis and has a dedicated team for support.
Metrasens, a provider of advanced detection systems for security and safety applications announced its ongoing strategic partnerships with K-12 public school districts across the United States. By addressing the critical issue of extracurricular event safety, Metrasens solidifies its position as a pioneer in school safety and the go-to partner for enhancing security at campus events. School safety In the dynamic security landscape within educational settings, ensuring safety during extracurricular events has become a top priority for school administrators and athletic directors nationwide. According to the K-12 School Shooting Database, there has been a concerning increase in shooting incidents at these events. From 2022 to 2023 alone, there was a 50% rise in K-12 school shootings during school events and a staggering 300% increase from 2019 to 2023. Proactive safety measures Ryan Petty, a Florida State Board of Education member emphasises the importance of proactive safety Ryan Petty, Florida State Board of Education member and father of Alaina Petty, a victim of the 2018 Marjory Stoneman Douglas High School shooting, emphasises the importance of proactive safety measures. "Schools can, and should continue to take practical steps towards building a safer environment for students on campuses, not only during school hours but also during extracurricular events," said Petty. "School districts adopting safety and security partners like Metrasens are taking practical steps in prioritising school safety." Prioritising compliance Recognising this critical issue, Metrasens has been chosen by public schools nationwide as a strategic partner in enhancing extracurricular event safety and addressing related challenges, such as the prevalence of vaping on campuses. With 300 systems deployed across more than 30 school districts and 200 individual schools, Metrasens is at the forefront of safeguarding students and staff and prioritising compliance. Metrasens Ultra systems Fort Worth Independent School District (FWISD) selected Metrasens to bolster safety measures for graduation ceremonies and extracurricular events. Daniel Garcia, Safety & Security Executive Director at Fort Worth ISD stated, "With regards to Fort Worth ISD graduations and other ceremonies, it's paramount that students, faculty, and visiting families feel assured and confident as they come together to commemorate these special occasions." "As we open our facilities to families, it's essential to offer reassurance that Metrasens Ultra systems provide a completely safe solution for all members of our school community." Security screening systems Metrasens' state-of-the-art security screening systems bolster safety protocols across 77 learning communities In the Oklahoma, Tulsa Public Schools (TPS) independent school district, Metrasens' state-of-the-art security screening systems bolster safety protocols across 77 learning communities. Dr. Matthias Wicks, former Chief of Police at Tulsa Public Schools, emphasised the district's unwavering commitment to securing all facilities and events, stating, "To accomplish our safety goals, we deployed Metrasens Ultra technologies and steadfast safety protocols to protect the well-being of everyone in attendance at our extracurricular events." Ultra detection systems Similarly, Moore Public Schools (MPS), Oklahoma's fourth-largest public school district, collaborated with Metrasens to bolster safety measures across 35 campus sites and large venues. Embracing a proactive stance towards safety, MPS integrated Metrasens Ultra detection systems to maintain the highest security standards. Dustin Horstkoetter, MPS Safety and Security Director, commended Metrasens for its unmatched reliability and quality, affirming, "the reliability and quality of Metrasens solutions are incomparable." Proactive campus security BHS aimed to stay ahead of potential risks and ensure the safety of its students and staff Further solidifying its position as a pioneer in school security, Barberton High School (BHS), situated within Ohio's Barberton City School District, chose Metrasens as a pivotal partner in its proactive approach to campus security. Recognising the need to enhance security protocols in light of recent incidents targeting schools nationwide, BHS aimed to stay ahead of potential risks and ensure the safety of its students and staff through this partnership. Non-intrusive security "We believe having another layer of security that is non-intrusive and is safe to use is a logical step forward," said Jeff Ramnytz, Superintendent of Barberton City Schools. "We highly recommend Metrasens to other school districts seeking to enhance their security measures." Extracurricular event safety "Extracurricular events such as football games, basketball tournaments, and other school activities often attract individuals from inside and outside the immediate community, presenting unique security challenges," said Todd Hokunson, Chief Commercial Officer at Metrasens. "In response to these concerns, Metrasens is committed to shaping the safety landscape in educational environments through innovative solutions and strategic partnerships." Secure environment These key partnerships underscore Metrasens' dedication to providing innovative solutions prioritising safety and compliance in educational settings. As administrators and safety directors continue to navigate evolving security challenges, whether securing extracurricular school activities or addressing the growing issue of vape usage on campus, Metrasens remains steadfast in its mission to empower educators and protect students, ensuring a secure environment conducive to learning and growth.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Casinos offer several attractive applications for LiDAR, including security and business intelligence. Using laser sensors, the technology can replace the use of surveillance cameras. For casino security, LiDAR can track player movement and provides complete coverage and accuracy that have not been achievable by surveillance cameras. Massive coverage areas can save on costs of sensor deployment versus other technologies. LiDAR and its applications LiDAR is a method for determining ranges by targeting an object with a laser and measuring the time for the reflected light to return to the receiver. LiDAR sensors emit pulsed light waves into a surrounding environment, and the pulses bounce off surrounding objects and return to the sensor. The sensor uses the time it took for each pulse to return to the sensor to calculate the distance it travelled. LiDAR is commonly used in markets such as robotics, terrestrial mapping, autonomous vehicles, and Industrial IoT (Internet of Things). Today, casinos offer a lucrative emerging market for technology. LiDAR tracking enables casino operators to understand the guest path, journey, queue time, count Crowd management LiDAR can contribute to a casino’s guest experience by counting people at doors or in sections of the gaming floor to provide intelligence about crowd size to track occupancy. LiDAR tracking enables casino operators to understand the guest path, journey, queue time, count, and other statistical information by comparing previous time frames to current occupancy levels. This approach allows them to understand digital media advertisement and experience placement. Aid in advertisement “Inside a casino, sensors are deployed like surveillance cameras,” says Gerald Becker, VP of Market Development & Alliances, Quanergy. “But instead of security, they are used to provide anonymous tracking of all people walking through the gaming floor. We can get centimetre-level accuracy of location, direction, and speed of the guests. With this data, we can access the guest journey from the path, dwell count, and several other analytics that provides intelligence to operations and marketing to make better decisions on product placement or advertisement.” Quanergy Quanergy is a U.S.-based company that manufactures its hardware in the USA and develops its 3D perception software in-house. Quanergy has various integrations to third-party technology platforms such as video management systems (VMSs) in security and analytics for operational and business intelligence. Perimeter security Sensors can be mounted to a hotel to monitor for potential objects being thrown off the hotel LiDAR is deployed in both exterior and interior applications. For the exterior of a casino or resort, sensors can be mounted to a hotel to monitor for potential objects being thrown off the hotel, or people in areas where they should not be. For example, they can sense and prevent entrance to rooftops or private areas that are not open to the public. Some clients install sensors throughout the perimeter of private property to safeguard executives and/or a VIP’s place of residence. Flow tracking and queuing capabilities Tracking crowd size can initiate digital signage or other digital experiences throughout the property to route guests to other destinations at the property. It can also help with queue analysis at the reservation/check-in desk or other areas where guests line up to tell operations to open another line to maintain the flow of guests passing. Flow tracking and queuing capabilities help casino operators to understand which games groups of customers frequent and allow for the optimisation of customer routing for increased interaction and playtime on the casino floor, quickly impacting the financial performance and return of the casino. No privacy concerns LiDAR provides a point cloud; its millions of little points in a 3D space create the silhouettes of moving or fixed objects The main hurdle right now is market adoption. LiDAR is an emerging technology that is not so widely known for these new use cases, says Becker. “It will take a little bit of time to educate the market on the vast capabilities that can now be realised in 3D beyond traditional IoT sensors that are available now,” he comments. One benefit of LiDAR is that it poses no risk of personally identifiable information (PII) and therefore no privacy concerns. No PII is captured with the technology. Cameras can capture images and transmit them over the network to other applications. However, LiDAR provides a point cloud; its millions of little points in a 3D space create the silhouettes of moving or fixed objects. IoT security strategy There is a lot of interest from surveillance and security to include marketing and operations, says Becker. “LiDAR will become a part of the IoT security strategy for countless casinos soon. It will be common practice to see LiDAR sensors deployed to augment existing security systems and provide more coverage.” Also, the intelligence gained with the accuracy of tracking guests anonymously provides peace of mind to the visitors that they are not being singled out or uniquely tracked but provides valuable data to the casinos that they have not been able to capture before. “This will help them maximise their operations and strategy for years to come,” says Becker.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Case studies
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programmes and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organisations like Allied Universal allows us to build on shared expertise and advance this important mission.”
Axis Communications, the industry pioneer in video surveillance and network devices, announced the implementation of a custom surveillance solution developed in collaboration with the MetLife Stadium security team. This new, tailored solution will help the venue augment its security capabilities, providing high-quality video at unprecedented distances and allowing the security team to identify details from anywhere in the venue. Advanced video analytics solutions “As one of the world's largest stadiums, the safety of fans is our number one priority,” said Danny DeLorenzi, VP of Security and Safety Services, MetLife Stadium. “Unfortunately, none of the out-of-the-box solutions we tried could provide the desired coverage at the video quality we were looking for." "Axis worked with us to build a custom solution where our needs were taken into consideration from the concept phase all the way through implementation. The result was an innovative new camera capable of providing full visibility throughout the entire bowl of the stadium while also allowing us to take advantage of advanced video analytics solutions.” Forefront of stadium security MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games Located in East Rutherford, NJ and serving the New York City metropolitan area, MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games—and the venue has been at the forefront of stadium security since it was built. The stadium is consistently rated one of the safest in the NFL, and in 2013 it was the first NFL stadium to achieve SAFETY Act certification from the US Department of Homeland Security. Implementing modern security solutions MetLife Stadium has twice been named a Facility of Merit by the prestigious National Centre for Spectator Sports Safety and Security (NCS4) and has established a reputation for implementing modern security solutions. In keeping with this reputation, MetLife Stadium refused to compromise on a surveillance solution, choosing instead to work directly with Axis on a device tailored to the venue’s unique needs. Innovate and design a tailored solution “MetLife Stadium has always been committed to strong security, and it holds its partners to a very high standard,” Fredrik Nilsson, VP, Axis Communications. “When the security team explained to us that they were having a hard time finding an off-the-shelf device that met their needs, we viewed it as an opportunity to innovate and design a more tailored solution." "As a result, the MetLife Stadium security team will be well positioned to detect, investigate, and respond to any security challenges that come its way.” Advanced and complex video analytics The new device has a number of parts specifically tailored to improve version in a stadium setting The new device includes a number of features specifically tailored to improve performance in a stadium setting. It provides optimal performance in a variety of lighting conditions, and electronic image stabilisation (EIS) capabilities that help keep the image steady even amid the raucous crowds and turbulent weather of an open-air stadium. It also features a custom-made lens that enables 8K resolution, and is capable of recording images in a wide dynamic range, capturing a broad spectrum of colour hues in sharp, high-contrast video. Because the camera can more accurately identify and catalogue identifying features it is able to run more advanced and complex video analytics. Existing surveillance devices The device adheres to a form factor consistent with existing surveillance devices, enabling compatibility with the pressed concrete structure’s existing camera mounts. Additionally, MetLife Stadium ensured the device could be easily integrated with the venue’s current security stack, including its Video Management System (VMS), current technology partners, and local public safety agencies. MetLife Stadium’s security capabilities Venue officials are working to identify ways to leverage the devices to enhance security With the new surveillance solution in place, MetLife Stadium’s security capabilities are more advanced than ever—but the security team is already planning for new enhancements. Venue officials are working to identify ways to leverage the devices to enhance security while also exploring different video analytics solutions. The ultimate goal is to not just improve security but streamline entry to the stadium, create easier access to amenities, and improve staffing efficiency. Highest Grossing Stadium of the Year MetLife Stadium, located in East Rutherford, NJ, is the home of the New York Jets and New York Giants and is one of the largest stadiums in the NFL (82,500). The stadium hosts the world’s biggest events on the world’s biggest stage and will host the FIFA World Cup 26™ Final and 7 other matches throughout the tournament. The venue annually ranks as one of the busiest stadiums in the world and has been named “Highest Grossing Stadium of the Year” 9 times by Billboard. Event highlights include Super Bowl XLVIII, NHL Stadium Series, WrestleMania, Copa America Centenario Final, 2021 Army-Navy Game, and many concerts, college football games, and international soccer matches.
Ibstock Place School, a private London co-educational day school nestled in beautiful grounds with a mix of historic and contemporary architecture, faced several challenges. They needed to expand CCTV coverage, ensure guaranteed video retention periods for specific areas at certain times, enhance remote access and event alerting capabilities, and prepare for future analytics integration. The challenge Ibstock Place School identified several challenges with their existing system: Coverage expansion: They needed to expand security coverage across their site. Retention guarantees: Specific areas required guaranteed video retention periods at certain times. Remote access and alerts: The system needed enhanced capabilities for remote monitoring and event alerts. Future-proofing: Requirements included an open platform system with automatic updates and easy integration with third-party technologies. The solution To execute a phased migration to a cloud-based security system, SES Technologies partnered with Eagle Eye Networks to implement a comprehensive cloud solution: Advanced camera integration: New Axis four-megapixel cameras with day/night and IR capabilities were seamlessly integrated into the existing infrastructure. Cloud Video Management System: The cameras were connected to the Eagle Eye Cloud VMS for instant access to live and recorded footage. Phased transition: A carefully planned migration ensured continuity of service during the shift from on-premise to cloud-based systems. The results The implementation delivered a true cloud experience for Ibstock Place School, enabling reliable, secure monitoring of their site while meeting regulatory licencing requirements. Key outcomes included: Significant cost savings: Leveraging existing cameras helped the school achieve a 25% reduction in total cost of ownership. Optimised efficiency: Features like Eagle Eye Smart Video Search, and flexible retention times enhanced operational workflows. Compliance and security: The cloud system provided robust security measures to meet compliance standards. By transitioning to the Eagle Eye Cloud VMS with the expertise of SES Technologies, Ibstock Place School improved its security infrastructure, reduced costs, and enhanced operational efficiency all while positioning itself for future growth and technology integration. Flexible retention time Paul Doran, Facilities Manager at Ibstock Place School, said, "SES Technologies and Eagle Eye Networks have seamlessly integrated our infrastructure with advanced cloud solutions, ensuring effortless regulatory compliance." He adds, "Features like Eagle Eye Smart Video Search, and flexible retention times have enhanced operational efficiency and safety for our school community."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
Melbourne Connect is a new ecosystem led by Melbourne University to provide a visionary precinct to collaborate on first class education, hands on training, and top-edge research. This district is on the edge of the Melbourne CBD with commercial and retail partner tenants, including technology, design, energy, health and major multi-nationals to create an epicentre of brilliant minds. EQUANS were engaged by Lendlease and Melbourne University to integrate all areas of the precinct with shared AV spaces for multiple tenancies and the Student Accommodation Building (SAB). The requirements for this project were to provide seamless, cutting-edge audio-visual collaboration spaces to cater for innovative, world-class research, education, and training. The Solution EQUANS took a tailored approach to installing a range of custom and bespoke AV elements Across the precinct buildings, EQUANS took a tailored approach to installing a range of custom and bespoke AV elements, maximising the ability for users to project and share content. In the School of Engineering, EQUANS installed custom and bespoke elements into the department. Especially in the Human Computer Labs where IDL group users utilise 3D mapping and augmented reality to further research and insight into their innovative future. EQUANS installs audio-visual equipment In the Science Gallery, which includes a multitude of spaces, EQUANS installed audio-visual equipment in the Ground Floor Exhibition, Theatres, Basement Gallery and over 43 lecture theatres and 63 workshop areas. To capture the attention of the younger generation and for a first-rate space to explore issues and ideas of the future, EQUANS integrated cutting-edge audio-visual equipment in all areas to create a world class education area dedicated to STEM. Similar projects were implemented in the Student Accommodation building and the Melbourne Connect Superfloor. The Benefit Through EQUANS, all audio-visual systems and spaces have been curated in a way to encourage a high level of collaboration and learning from the younger generation. Students, researchers, and high-tech companies will further understand, explore and achieve their goals in STEM. This multi-million-dollar AV project has also been designed to ensure it is future proofed and represent evolving and innovative solutions.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Considering the growing role of security technology in the higher education market, we asked this week’s Expert Panel Roundtable: What are the new applications for security technology in the college and university markets?
Physical security is a large market overall, encompassing a range of diverse vertical markets, each with its own set of challenges and opportunities. The success of the security industry overall depends on the ability of companies and technologies to meet the specific needs of each vertical market. Some markets offer more lucrative opportunities than others. We asked this week’s Expert Panel Roundtable: Which vertical markets have the greatest potential for growth for physical security systems?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Access management in higher education](https://www.sourcesecurity.com/img/white-papers/612/access-management-920x533.png)
Access management in higher education
Download![Levelling up with campus safety](https://www.sourcesecurity.com/img/white-papers/612/level-up-with-campus-safety-mock-up-920x533.jpeg)
Levelling up with campus safety
Download![Understanding key control systems and best practices](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713432940.jpg)
Understanding key control systems and best practices
Download![Assessing safety readiness for education campuses](https://www.sourcesecurity.com/img/white-papers/612/education-1-920x533.jpg)
Assessing safety readiness for education campuses
Download![Public-private partnerships on campus: What you need to know](https://www.sourcesecurity.com/img/white-papers/612/img-920x533.jpg)
Public-private partnerships on campus: What you need to know
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![School security moves to the cloud](https://www.sourcesecurity.com/img/white-papers/612/cloudvue-school-security-920.jpg)
School security moves to the cloud
Download![Physical access control in higher education](https://www.sourcesecurity.com/img/white-papers/612/hid-access-control.png)
Physical access control in higher education
Download![6 questions to ask when choosing a security system](https://www.sourcesecurity.com/img/white-papers/612/hanhwa8.jpg)
6 questions to ask when choosing a security system
Download![5 reasons to integrate mobile technology into your security solution](https://www.sourcesecurity.com/img/white-papers/612/gall-4.jpg)
5 reasons to integrate mobile technology into your security solution
Download![RFID and smartphone readers in physical access control](https://www.sourcesecurity.com/img/white-papers/612/elatec-920x533.jpg)
RFID and smartphone readers in physical access control
Download![Modern, flexible access control secures HafenCity University](https://www.sourcesecurity.com/img/white-papers/612/hamburg-university-case-study-920.jpg)
Modern, flexible access control secures HafenCity University
Download![How to keep students safe on campus](https://www.sourcesecurity.com/img/white-papers/612/hid-education-620.jpg)
How to keep students safe on campus
Download![Video Surveillance: Lessons from the education market](https://www.sourcesecurity.com/img/white-papers/612/hikvision-education-620x360.jpg)
Video Surveillance: Lessons from the education market
Download![Best practices for integrating mobile into the access control architecture](https://www.sourcesecurity.com/img/white-papers/612/mobile-access-control-credentials-920.jpg)
Best practices for integrating mobile into the access control architecture
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download