Corporate Security
Hopae, makers of the world’s most advanced digital identity solution, announced $6.5 million in funding as the company introduces its proprietary, patented Digital Credential eXpress (DCX) architecture to the U.S., simplifying the complex world of decentralised ID (DID) implementation. Hopae helps governments and institutions issue reusable, privacy-preserving, and unforgeable digital IDs and credentials. Its expansion and funding news comes as companies seek to comply with new inter...
HiveWatch, a physical security software company reimagining how organisations keep their people and assets safe, announced a breakthrough in enterprise security operations using Anthropic’s Claude AI technology to transform traditional security monitoring from reactive alert processing into strategic intelligence operations. The new HiveWatch® AI Operator uses Claude’s advanced language understanding and reasoning capabilities to intelligently filter and contextualise security a...
Absolute Security, a pioneer in enterprise resilience, announced that Absolute Secure Endpoint (SE) is now available in the AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS). Absolute SE delivers resilient visibility, control, security, and fast recovery across globally distributed PC fleets. As part of the Absolute Resilience Platform,...
Colt Technology Services (Colt), the digital infrastructure company, announced the latest in a series of enhancements to its award-winning Network as a Service (NaaS) platform, Colt On Demand, with an additional 130,000 locations served by dedicated fibre (FTTX) in the UK, France, Luxembourg, the Netherlands and Poland, accessible through the platform. This bolsters the 32,000 Colt-connected buildings, 1,100 data centres and 275 Cloud points of presence already accessible to customers through C...
Beyond Encryption, a pioneer in secure digital communications, has announced a powerful new technology partnership with Mimecast, a global heavyweight in cybersecurity. The technology partnership aims to transform how businesses manage security and compliance, combining Beyond Encryption’s cutting-edge expertise in authenticated outbound comms with Mimecast’s proven track record in human risk management and robust email services. Data protection standards Businesses are now...
Hornetsecurity, a global pioneer in cybersecurity solutions, is excited to announce the launch of its DMARC Manager. The advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and impersonation attacks continue to rise, the need for robust email authentication practices has never been more critical. DMARC Manager is designed to empower administrators...
News
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, and RapidDeploy, the pioneering cloud-native solution provider for public safety, announced a strategic industry partnership. The companies will collaborate to provide Emergency Communication Centres (ECCs) and field responders with enriched, real-time critical information to enable faster, more effective emergency responses during gun-related incidents at K-12 schools. NG911 solutions RapidDeploy provides a platform for agencies to integrate their indoor floor plans, panic buttons RapidDeploy's market-pioneering Radius Mapping technology and award-winning Lightning mobile solution serve as the foundation of a connected ecosystem that enables seamless communication and data exchange between 911 agencies and first responders. With Next Generation 911 (NG911) solutions deployed statewide in 11 states and across 1,500 ECCs, RapidDeploy provides a platform for agencies to integrate their indoor floor plans, panic buttons, and emergency event data to create a unified operating picture for safety. Digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto an organisation's existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and school staff as quickly as three to five seconds from detection. RapidDeploy’s solutions ZeroEyes with RapidDeploy will enable key features, including real-time suspect site tracking The seamless integration of ZeroEyes with RapidDeploy’s solutions will enable key features, including real-time suspect location tracking on the Radius map, direct access to human-validated images of the suspect and weapon, and panic proximity alerts for field responders via the Lightning app. Proximity alerts can be configured to inform responders nearby before the 911 call even reaches the dispatch centre, ensuring they are equipped with essential information ahead of time. Public safety Thus, when the 911 call is received, telecommunicators are already aware that it’s a panic button event, giving them the context they need for swift, accurate triage. This early insight accelerates decision-making, optimises response efficiency, and strengthens public safety by enabling faster, more informed emergency actions. Integration of technologies “Our partnership with ZeroEyes marks an important leap forward in response capabilities,” said Steve Raucher, CEO and co-founder of RapidDeploy. “When lives are at stake and every second counts, first responders face critical blind spots that hinder threat assessment. The integration of our technologies improves situational awareness, allowing responders to act swiftly and accurately.” ZeroEyes' AI gun detection technology "Integrating ZeroEyes' AI gun detection technology with RapidDeploy’s solutions marks a major advancement in safety for both our K-12 customers and first responders,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “This partnership will help deliver critical, life-saving intelligence directly to those on the front lines of community protection.”
Cyware, the pioneering provider of threat intelligence management, low-code/no-code automation, and cyber fusion solutions, announced the appointment of Jawahar Sivasankaran as President, marking a pivotal step in Cyware’s mission to empower organisations with advanced threat intelligence and security solutions. Jawahar brings 25+ years of experience fostering security product innovation, growth leadership, and customer success at Cisco, Splunk, and Appgate. Prior roles of Jawahar Most recently, as President and COO of Appgate, Jawahar led all go-to-market functions, including sales, marketing, and customer success, and served as a Section 16 public company officer. Previously at Splunk, Jawahar played a key leadership role in transforming specialisation sales for Splunk’s advanced security offerings, driving growth and customer intimacy. Before that, he held various leadership positions in go-to-market and product functions at Cisco. Cyware’s AI efforts Jawahar is active in the startup ecosystem as an investor and advisor focused on scale-up activities Over the past year, he has served as an advisor to pioneering consulting and private equity firms, including with Advent International as an Industry Operating Advisor. Jawahar is active in the startup ecosystem as an investor and advisor focused on scale-up activities. “Jawahar’s leadership and extensive experience in scaling security platform companies will be instrumental in driving our growth and strengthening our brand,” said Anuj Goel, CEO of Cyware. “Cyware is setting the standard for threat-driven, collaborative cybersecurity, and we look forward to the impact he will have in aligning our teams and delivering unmatched value to our customers. Jawahar’s latest focus on AI for improving security operations outcomes will be instrumental in evolving Cyware’s AI efforts.” Innovative cybersecurity “Joining Cyware, a true pioneer in cybersecurity, is an exciting opportunity to contribute to a visionary pioneer in threat intelligence, collective defence, and automated response," said Jawahar Sivasankaran, Cyware's President. “With a powerful vision and a strong team in place, Cyware is uniquely positioned to deliver meaningful solutions that truly prioritise customer outcomes. Together with our go-to-market teams, we will accelerate growth, deepen customer relationships, and help modernise cybersecurity through innovation and collaboration.” With this appointment, Cyware reaffirms its commitment to innovative cybersecurity and customer-centered solutions, positioning itself for accelerated growth and industry leadership.
Sielox, a pioneer in layered access control solutions celebrating 45 years of success, is highlighting its latest advancements in security technology at ISC East 2024, booth 519. Alongside its robust portfolio of access control and emergency communications solutions, Sielox will introduce its new partnership with Wavelynx Technologies, expanding its capabilities with advanced readers and credentials. Proactive security “At Sielox, we are committed to delivering solutions that bring proactive security and ease of use to our customers,” said Karen Evans, President and CEO of Sielox. “Our partnership with Wavelynx is a powerful addition to our portfolio, enhancing our systems with advanced mobile-enabled credentials that provide seamless security for end-users. Our Certified Integrators are eager to bring this added functionality to organisations looking for adaptable, forward-thinking security solutions.” Access control systems Integration provides users with enhanced flexibility, enabling them to adopt advanced technology Through its collaboration with Wavelynx, Sielox now offers free and secure, Bluetooth-based mobile credential options within its comprehensive access control systems. This integration provides users with enhanced flexibility, enabling them to adopt advanced credentialing technology tailored to their specific operational needs and transition away from 125 KHz “proximity” credentials. Featured solutions at ISC East 2024 include: Pinnacle™ 11.0 Access Control and Event-Management Software: Delivering real-time, data-driven insights, Pinnacle supports advanced security and business intelligence needs, transforming conventional systems into proactive, pre-emptive solutions Demonstrations include the Wavelynx Ethos Reader using a free MyPass mobile credential and Schlage wireless locks from Allegion featuring true Lockdown capabilities at the touch of a button. CLASS™ (Crisis Lockdown Alert Status System): Enhanced with a new responder dashboard and two-way communication capabilities, CLASS allows real-time alerts and instructions across designated areas, adapting responses to changing conditions. 2700 Intelligent Access Controller: A versatile controller supporting up to 34 doors, the 2700 reduces wiring and installation costs, while ensuring fast, secure data transfer for a streamlined access control solution. Next-Generation AnyWare™ Browser-Based Access Control Solution: Now managing up to 64 doors, the AnyWare platform minimises IP network requirements, and recent updates added LDAP, user permissions, and enhanced reporting features to simplify compliance and operations. Access control capabilities With 45 years of expertise, Sielox remains committed to enhancing its product offerings and building strategic partnerships with integrators to address evolving security challenges. To see these innovative solutions in action and learn more about how Sielox can enhance the access control capabilities, visit ISC East booth 519.
The Security Industry Association (SIA) has named 24 recipients for this year’s SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the education and career development goals of young industry talent and emerging pioneers. Through this scholarship program – open to SIA student members and RISE members who are employees at SIA member companies – each awardee will receive a USD 3,000 scholarship to use toward continuing education and professional development courses, SIA program offerings and/or other academic or education programs. Array of security professionals Scholarship funds can be used to expand knowledge in the areas of business, human resources Scholarship funds can be used to expand knowledge in the areas of business, human resources, information technology, marketing, sales, project management, security engineering, and/or risk management. “SIA congratulates this year’s class of RISE Scholarship awardees – an impressive, diverse array of security professionals and rising stars who are making their mark on our industry,” said SIA CEO Don Erickson. “We are proud to present scholarships to more recipients this year than ever before and honoured to support these inspiring young pioneers as they pursue their educational and career development goals.” RISE Scholarship The winners for this year’s RISE Scholarship are: Zachary Allen, account executive, Convergint Technologies Brianna Bonfondeo, account manager, Traka, ASSA ABLOY Global Solutions Joi Brown, control centre specialist, Rapid Response Monitoring Services Brenda Constantin, account executive, 3Sixty Integrated, a Division of the Cook & Boardman Group Jonathan Crabtree, channel sales specialist, Genetec Taylor Davenport, HR business partner, i-PRO Americas Mason Fanning, end user specialist, ASSA ABLOY Natalie Fetsko, customer success manager, dormakaba Aishwarya Gandhe, senior channel marketing coordinator, North America, Genetec Anish Chandra Jalla, software developer II, Genetec Kajaanei Kajenthiran, security guard, City of Toronto, Canada Will Knehr, senior manager of information assurance and data privacy, i-PRO Americas Ryan Knoll, account executive, Pro-Tec Design Chandni Lalwani, DevOps engineer, HID Global Vincent Malenfer-Henard, security analyst, Genetec Josh Martin, mechanical engineer II, dormakaba Bryn Menzel, director of strategic accounts and marketing, 3millID Corporation Gabriella Moraniec, contracts manager, GSA Schedules Taylor Nevells, digital marketing and content specialist, Wavelynx Juan Pelayo, technical support supervisor, i-PRO Americas Itzel Portillo, marketing specialist, Allegion Joel Searle, program manager, ZBeta Maria Sturges, project coordinator and administrator, Northland Controls Julie Trinh, SDK specialist, Genetec New opportunities in the security industry SIA would also like to thank the following individuals and companies which contributed to the 2024 RISE Scholarship fund. Tax-deductible donations were made through the Foundation for Advancing Security Talent (FAST), a nonprofit organisation co-founded by SIA and the Electronic Security Association and dedicated to connecting passionate, innovative professionals with new opportunities in the security industry. ADI Allegion Axis Communications Convergint Genetec HID i-PRO Secure Access & Digital Systems Securitas Technology TIME program SIA RISE is a community that fosters the careers of emerging pioneers in the security industry. In addition to the SIA RISE Scholarship, SIA RISE offers fun in-person and virtual networking events for young professionals, the Talent Inclusion Mentorship Education (TIME) program for early and mid-career professionals, the 25 on the RISE Awards, career growth webinars and trade show education tracks and the annual AcceleRISE conference – a unique event designed to ignite new thinking, strengthen leadership and sharpen business acumen in young security talent. The SIA RISE community is open to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years; learn more and sign up to join.
The International Security Conference and Expo East (ISC East), the Northeast’s major security and public safety event built by RX Global, hosted in collaboration with premier sponsor - Security Industry Association (SIA) and in partnership with ASIS NYC, kicks off November 19, 2024, at the Javits Center, in New York City, USA. The conference will feature speakers, educational programming, and professional development opportunities from major names like OpenAI, Google, JPMorganChase, and more. WHAT: ISC East is the most comprehensive security trade show on the East Coast, featuring 200+ exhibitors and numerous educational and professional sessions with top industry experts covering cutting-edge trends and solutions in safety and security. WHO: Brian Murphy, COO of Navy Pier in Chicago Anjené Abston, Executive Director, Security Division Director, JPMorganChase Mike Fein, Senior Director of Global Security Programs, Google Patrick Geonetta, Vice President of Corporate Security, OpenAI Plus, executives from the region’s pioneering technology manufacturers, dynamic speakers, and exhibitors on the Show Floor will be available for interviews. WHEN: Tuesday, November 19 – Thursday, November 21 Exhibit Hall Hours: Wednesday, November 20 | 10:00 AM - 5:00 PM Thursday, November 21 | 10:00 AM - 4:00 PM The press can access the Show Floor early on Thursday at 9:00 am WHERE: Javits Centre, 429 11th Ave, New York, NY 10001 RSVP: Media interested in covering ISC East can RSVP to ISC@TeamLSG.com.
AMAG Technology is pleased to announce the appointment of Chris Meiter as AMAG Technology's Vice President of Global Business Development for Video Solutions. This new role underscores the organisation’s continued expansion support to its entire technology suite. Chris Meiter comes from Salient Systems, which is a decade-long strategic video partner of AMAG Technology. The appointment of Chris to this new position is a strategic win for both AMAG Technology and Salient Systems, offering enhanced opportunities for collaboration and product evolution that will directly benefit integrator and end-user customers. Growth strategy "We are thrilled to welcome Chris to our commercial leadership team," said AMAG Technology Executive Vice President of Sales, Marketing and Commercial Excellence, Kyle Gordon. "His extensive experience and deep understanding of customer needs in the video market will be instrumental in our growth strategy. Chris’ expertise will allow us to better serve our customers by delivering superior support.” AMAG’s capabilities AMAG Technology’s President, David Sullivan, added, “This new role highlights our commitment to growth and to securing top-tier leadership. With Chris on board, we are not only expanding our leadership team but also investing in a program that prioritises customer needs and emphasises the value we bring with Symmetry CompleteView." "This focus will ensure that our customers feel supported, heard, and confident in AMAG’s capabilities as a video and security solution provider.” AMAG Technology and Salient partnership “Chris Meiter’s new role within Kyle Gordon’s commercial leadership team highlights the strength of the AMAG Technology and Salient partnership." "Chris’ deep knowledge and experience, developed during his time at Salient, will now help AMAG’s global sales team to effectively showcase the Symmetry CompleteView Video Management System,” said Salient Systems CEO, Bob Wilbur. AMAG Technology’s video-selling strategy Meiter established and implemented AMAG Technology’s video-selling strategy and ensure support Chris Meiter will establish and implement AMAG Technology’s video-selling strategy and ensure seamless support for all video-related initiatives. Meiter will work closely with commercial pioneers to develop training programs, empowering the global sales team to demonstrate AMAG Technology’s Symmetry CompleteView Video Management System. He will work with cross-functional teams such as product management, engineering, and marketing to help develop and refine the company’s market approach. Integrated security solutions As the security landscape continues to evolve, both companies are committed to staying ahead of customer needs by leveraging their combined strengths. Together, AMAG Technology and Salient Systems are confident this transition will reinforce their partnership, allowing both companies to deliver innovative, fully integrated security solutions globally.
Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Case studies
As a real estate development firm’s facility was nearing completion, the firm identified potential concerns with limitations in the facility’s control infrastructure. Before the building reached full occupancy, the firm engaged with Wesco Anixter’s entroCIM team for a comprehensive cybersecurity and use-case audit. As a result, the facility pivoted to a cloud-hosted instance of the entroCIM platform to deliver on the organisation’s lofty vision for a truly connected space. Solution Constant commissioning with site-specific scripting means operators know the moment The entroCIM platform helps bring their vision to life among operational technology as well; disparate technologies with unique communication protocols come together in a single interface, providing stakeholders with mission-critical actionable insight. As all commercial real estate of this type has changed in the past several years, entroCIM has changed with it, offering direct, API-based connection to detailed predictive utility data to leverage the site’s flexibility in maximising efficiency. Constant commissioning with site-specific scripting means operators know the moment a system begins to show signs of decline. Since initial deployment, the depth of actionable insight through analytics has more than doubled, with more than 130 analytical rules running continuously to give operators the upper hand in the management of occupant comfort, energy efficiency and proactive maintenance Scope Cloud-based entroCIM licence access Dashboarding and graphics Analytics and reporting Preventative maintenance Investigation API-based utility integration Commissioning Global remote access Use-case gap analysis Cybersecurity audit New construction consulting Subject matter expert support Project stakeholders C-suite IT Organisation-level engineering Site-level mechanical Site-level engineering Tenant program management Communication protocols BACnet Modbus Integrated services Automated Logic Semco Lutron Siemens Honeywell York
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
Yanmar Holdings Co., Ltd. is one of Japan's largest manufacturing companies, founded in 1912, and now has more than 25,000 employees worldwide. Yanmar has positioned itself in the international market as a pioneer in diesel engine technology and has developed a wide range of industrial equipment, including engines, agricultural machinery, installations, construction equipment, power systems, marine and other components. With over a century of manufacturing experience, Yanmar is actively promoting digital transformation across the company. As part of this initiative, VIVOTEK implemented advanced surveillance solutions to enhance traffic management and operational efficiency for Yanmar Construction Equipment Co., Ltd. in Fukuoka, Japan. Challenges Before implementing VIVOTEK’s surveillance solutions, Yanmar Construction Equipment Co., Ltd. faced several challenges in ensuring the safety of the factory area. These challenges included: Automated Guided Vehicles (AGVs) were prone to accidents at intersections with truck routes and walking zones. Additionally, AGVs sometimes derailed or stopped due to issues like sunlight reflecting off QR code covers, affecting navigation and requiring better monitoring for diagnosis and resolution. Difficulty in identifying the root causes of quality issues on the assembly line due to high daily production volume and operators' inability to recall specific incidents. Inefficient manual inspections were needed to monitor paint sludge on stored paint containers, along with the need to understand the true causes of productivity issues and detect abnormalities in painting equipment early. These challenges underscored the need for a comprehensive security solution to enhance the efficiency and safety of factory operations. A surveillance system can not only track accidents on traffic routes and improve route planning but also boost overall factory operational efficiency. Solutions After identifying the client’s pain points, VIVOTEK, in collaboration with its partner Takebishi, tailored advanced surveillance solutions to meet their needs by installing various types of cameras and a video receiver in the construction equipment assembly facility of Yanmar Construction Equipment Co., Ltd. AGVs Monitoring: Cameras are focused on monitoring AGVs, enabling supervisors to respond immediately to accidents and identify areas for improvement in safety protocols. Assembly Line Monitoring: Camera footage captures images of the assembly line, helping to pinpoint the causes of quality issues and streamline production processes. By utilising this "looking-back" analysis, management can improve both productivity and safety, pinpoint areas needing improvement, and significantly reduce unwanted accidents, resulting in more effective and efficient operations. Sludge Monitoring: Cameras can monitor the accumulated sludge on stored paint containers, which can cause unpleasant odours in the facility. This monitoring helps maintain a cleaner and odor-free environment. Previously, staff had to physically inspect the site every hour, often discovering that no cleaning was necessary. With the cameras providing continuous real-time images, management can now remotely monitor the condition of the equipment, significantly reducing unnecessary site visits. Staff only need to visit the site when cleaning is actually required. Smart Analysis through Integration of VIVOTEK’s Cameras and BI Tool: By integrating VIVOTEK’s cameras with the BI tool MotionBoard, camera footage is now being used for work analysis and status monitoring in the factory, enabling more intelligent analysis. Results and customer feedback Yanmar Construction Equipment Co., Ltd. expressed a high level of satisfaction with VIVOTEK’s advanced surveillance solutions, including performance, price, and reliability. "Not only did they meet our requirements, but VIVOTEK also provided more detailed proposals based on their expertise. They were flexible in handling tight deadlines and challenging installation demands," said Yanmar Construction Equipment Co., Ltd. "While this project was implemented at one of Yanmar Construction Equipment Co., Ltd.'s locations, due to the customer's high satisfaction, we aim to expand the solution across their nationwide facilities and throughout the entire Yanmar Group," commented from partner company Takebishi Co., Ltd.
Client, a prominent regional R&D institution under MeitY, plays a crucial role in advancing India's technological landscape. With a focus on IT, electronics, and related sectors, the organisation leads in cutting-edge research, driving innovation to meet global trends and market needs. As a key player in high-end R&D, they have been pivotal in propelling India’s IT revolution, consistently expanding their expertise in emerging technologies. They utilise their knowledge and creativity to develop IT solutions across various industries, working closely with MeitY, funding agencies, partners, and key stakeholders. Requirements The project involved managing a defined volume of emergency calls per hour by directing those made to 112 to agents handling state-specific emergency services. Matrix's role was to deliver a VoIP PRI gateway solution that provided VoIP capabilities to a third-party server. Crucially, these functionalities needed to be implemented across various locations. The client’s needs can be outlined as follows: Manage a minimum of 50,000 calls: The system must be equipped to handle at least 50,000 emergency calls every hour. Direct calls to state-specific agents: When the global emergency number 112 is dialled, calls should be directed to agents overseeing emergency services for the respective states. Integrate with third-party systems: The agents will work on a third-party server, which must be seamlessly connected to the Matrix GENX system via SIP trunking. Solution In collaboration with Consulttech, Matrix developed a solution that significantly enhanced the organisation's operations by optimising call routeing. The core of the solution involved offering a VoIP PRI gateway, enabling seamless PRI to VoIP conversion. The essential features of this solution are as follows: Multi-location setup: The system covers various locations, each outfitted with a Matrix GENX system that connects to the ISP's PRI lines. PRI to VoIP conversion: At every site, Matrix GENX converts incoming calls from PRI lines into VoIP (Voice over Internet Protocol). Emergency call routeing: When a user dials 112, the call is routed through the ISP’s PRI lines to the Matrix Gateways, where the media is converted from PRI to VoIP and passed to the Automatic Call Distributor (ACD) server. Centralised ACD server: All VoIP calls are funneled into a central ACD server for efficient distribution. Agent call distribution: The ACD server directs the incoming calls to available agents who are ready to respond. Scalable solution: Up to 28 locations can be connected to the central ACD server, allowing the system to handle a high volume of calls simultaneously. Results The solution enabled the organisation to connect various locations into one unified communication system through the use of a VoIP PRI gateway. This improved the system's ability to manage thousands of calls per hour while significantly reducing call drops. The specifics of the solution are as follows: Multi-site implementation: The project was deployed across multiple locations in cities throughout Kerala, establishing a seamless communication network. Increased call handling capacity: Each site is capable of managing between 26,000 to 30,000 calls per hour. Significant decrease in call drops: The system efficiently handled large call volumes, resulting in almost no dropped calls. Matrix’s VoIP PRI gateway allowed the organisation to integrate multiple locations across the state into a unified communication system. With the ability to manage high call volumes, the solution significantly minimised call drops.
In any construction project, meticulous recording and management of door hardware is critical —although often prone to human error. What if there was a way to harness digital technology to fulfil this crucial requirement in a dependable, efficient, agile way? Located in several cities around India, Edifice Consultants Pvt Ltd. specialises in designing climate-responsive architectural structures that harmonise with their surroundings. Complex standards and regulations Each project undertaken reflects Edifice’s collaborative ethos and dedication to enhance the immediate environment, while fostering the well-being of building users, local residents, and the landscape. Edifice’s work across commercial, residential, industrial and public service sectors has received multiple prestigious awards. Designing buildings for so many segments and industries requires broad and deep knowledge of complex standards and regulations. The experience and expertise of ASSA ABLOY have proved invaluable. Specification with Openings Studio™ ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors To streamline door specification, Edifice requires digital software that can cut manual mistakes and maintain the process’s accuracy, which is essential to efficient building design. Their chosen solution — Openings Studio™ — takes a rigorous approach, speeding up specification iterations to condense the revision cycle, improve time management and help hit Edifice’s ambitious project timelines. To date, ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors, via the Openings Studio plugin for Autodesk® Revit®. These include doors and door hardware suited to data centre deployment, among them mechanical mortise locks, exit devices, door closers and master-keying solutions from ASSA ABLOYs portfolio of trusted brands such as Yale and Sargent. Collaborating for transparency and project efficiency An industry-leading specification software tool and BIM plugin, Openings Studio integrates with design software to create and visualise openings for complete door, frame and hardware schedules and specifications. Its flexibility — and availability on multiple types of devices — means all specification changes are incorporated quickly and transparently, helping project delivery dates to remain on target. The Openings Studio environment also simplifies collaboration and data sharing among all project stakeholders. It helps manage openings over the full project lifecycle, from planning and estimation to installation and beyond. Door solution specifications Openings Studio maintains a unified digital thread that connects all project partners to eliminate confusion For these reasons, Openings Studio is deployed all over the world as a specification and ordering tool for building projects. It can deliver detailed door solution specifications directly to popular packages such as Revit® and ARCHICAD®, drawing on a detailed database with colour, size, thickness and certifications for every product; as well as installation and compliance information, Environmental Product Declarations (EPDs) and more. With ongoing use throughout a building’s lifetime, Openings Studio maintains a unified digital thread that connects all project partners to eliminate the confusion that comes with stakeholders having to juggle multiple versions of documents. Management of door hardware “Openings Studio has always been helpful in projects,” explains Gaurav Nirmalkar, Designer at Edifice. “Personally, I have used it in three of the data centres and it never disappoints. The simple and crisp interface is a plus point.” “Recording and management of door hardware is the most important thing in the construction industry. Openings Studio is a good choice for it.”
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Round table discussion
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
Products
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download