Covert cameras
Cowbell, a provider of cyber insurance for small and medium-sized enterprises (SMEs) and middle-market businesses, has launched a new Cowbell Resiliency Services (CRS) unit in response to a rise in the frequency, severity, and diversity of cyber threats as a complement to its existing risk management programme. Cost of data breach Driven by AI advances and an increasingly complex geopolitical landscape, recent reports show the average global cost of a data breach has reached $4.88m, a 10% incr...
System Surveyor introduced Boundaries, a new feature of its system design software for physical security and IoT devices. System Surveyor Boundaries allow users to visually show the precise area of coverage of a device, such as a video surveillance camera or motion detector on a floor plan or map considering obstructions such as walls, poles, or other limitations to the device’s reach. Accurate and easily legible system designs Whether visualising the true view of a device and bli...
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc. continues to expand its presence in the healthcare industry, addressing growing security concerns with its AI-powered security solutions. A top-tier healthcare provider has now ordered 16 RIO 360 security towers for 12 sites, with plans to expand to 55 units across 23 locations in this initial deployment phase. These deployments strengthen RAD’s footprint in heal...
March Networks®, a global pioneer in cloud-based intelligent video surveillance, is proud to celebrate its 25th anniversary. For a quarter of a century, March Networks has been at the forefront of the security and business intelligence industries, driving innovation in video surveillance and delivering solutions that help businesses around the world secure and improve their operations. Advanced video analytics Since its founding in 2000, March Networks has become a trusted partner for tho...
IPConfigure, a trusted pioneer in enterprise video management software (VMS), has joined forces with Blue Eye, an innovator in remote video monitoring (RVM), to deliver an industry-first integration. This partnership empowers IPConfigure's customers to activate Blue Eye's advanced remote video monitoring services directly within the Orchid VMS platform, all in just a few clicks and without additional hardware requirements. Remote monitoring capabilities "This collaboration represents a transf...
The new Dallmeier AI High-Resolution Counting App enables precise counting even with a large number of people and vehicles in the analysis area. AI High-Resolution Counting App The app allows the definition of multiple counting zones, the setting of the counting interval, and the definition of limit values that trigger a message to the client software if they are exceeded or undershot. Typical applications for the Dallmeier AI High-Resolution Counting App are counting people in the airport wa...
News
SharpEagle Technology, a global pioneer in industrial safety solutions, unveiled the top trends to redefine safety protocols across industries in 2025. With advancements in technology shaping the future of workplace safety, SharpEagle continues to take charge of integrating innovation with robust solutions to protect lives and assets. AI-Driven Predictive Analytics Artificial intelligence (AI) is becoming a cornerstone of industrial safety. In 2025, predictive analytics powered by AI will enable organizations to anticipate potential hazards before they occur. To deliver actionable insights, AI algorithms analyze historical data from workplace accidents to machinery breakdowns. This reduces risks and improves preventive measures. Advanced Vision Systems for Enhanced Monitoring With its advanced explosion-proof camera solutions, SharpEagle is at the forefront The demand for high-performance vision systems continues to grow. With its advanced explosion-proof camera solutions, SharpEagle is at the forefront. These systems guarantee round-the-clock surveillance in dangerous areas, offering real-time observation to avert mishaps and aid emergency response activities. Wearable Safety Tech Personal safety in industrial environments is being revolutionized by smart wearables with sensors. Devices like smart helmets, gloves, and vests monitor workers' health metrics and environmental conditions, instantly alerting supervisors to potential risks. This trend reflects the growing emphasis on worker-centric safety solutions. IoT Integration for Real-Time Safety Management The Internet of Things (IoT) is transforming how safety is managed on industrial sites. Connected devices and sensors create an integrated ecosystem, providing real-time data on equipment performance, environmental conditions, and worker safety. Organizations may make well-informed decisions more quickly and effectively with the help of IoT-enabled solutions. Enhanced Safety Training with AR and VR In addition to improving learning, this method lowers the possibility of mistakes in high-risk scenarios Augmented Reality (AR) and Virtual Reality (VR) are redefining safety training. Immersive simulations allow workers to experience and respond to realistic scenarios in a controlled environment. In addition to improving learning, this method lowers the possibility of mistakes in high-risk scenarios. Automation for Hazardous Tasks Robotics and automation are playing a vital role in industrial safety. By delegating hazardous tasks to machines, companies can significantly reduce risks to human workers. Automated systems are valuable in industries like oil and gas, mining, and chemical processing. Sustainability and Green Safety Technologies Eco-friendly safety systems are becoming more popular as industries place a higher priority on sustainability. In 2025, there will be a greater emphasis on striking a balance between environmental responsibility and protection, from energy-efficient safety equipment to sustainable manufacturing practices. Commitment to Innovation SharpEagle Technology's mission is to innovate and deliver solutions that safeguard lives while enabling industries to thrive. SharpEagle Technology intends to introduce some new solutions that are intended to satisfy the evolving needs of industrial safety. These innovations will utilize innovative advancements such as AI-driven analytics, IoT integration, and enhanced monitoring technologies, ensuring industries stay ahead in safety and efficiency. SharpEagle Technology invites stakeholders to explore these emerging trends and collaborate in driving safety excellence across industries.
Regula, a global developer of forensic devices and identity verification solutions, has launched the portable and autonomous ForensicScope Regula 4125. The new device enables ID verification in any place and environment: at border and inland checkpoints, at airports, in transport, etc. Although the Regula 4125 is only smartphone-sized, it is capable of performing a wide range of document checks typical for professional forensic equipment. Integrity of most security features The new Regula 4125 is mainly useful for detecting morphing in photos in identity documents The new Regula 4125 is particularly effective at detecting morphing in photos in identity documents. Face morphing is an insidious threat that often remains undetected due to its nature. Unlike traditional document counterfeiting, which involves tampering with laminate layers or erasing data (often leaving visible signs of manipulation), morphing involves applying a thin layer of altered imagery over the document’s surface. This preserves the integrity of most security features but introduces subtle irregularities, such as micro-relief differences, gloss variations, and luminescence anomalies. Morphed ID portrait To detect morphing, an expert needs specialised equipment. An experiment conducted by a group of scientists in Norway in 2022 proved that humans are rather unable to distinguish a morphed ID portrait with the naked eye. The Regula 4125 is equipped with a special 250х zoom camera installed at 45 degrees. This sharp angle illuminates the gloss left by the morphed photo printed over the original portrait. Features of Regula 4125 Highlighted features of Regula 4125: The device is super compact and can be brought to any checkpoint, inside or outside. Made of high-quality ABS plastic covering the aluminium frame, it is lightweight yet shockproof. Regula 4125 is absolutely autonomous. It doesn't need external monitors, computers, an internet connection, or software updates. Powered by a built-in lithium-polymer battery, it supports up to 4 hours of continuous operation. The device is equipped with three cameras: the main one, an infrared (IR) one for full-page visualisation, and a special camera for detecting face morphing. Thanks to the 40х zoom in the main camera and 250х zoom in the camera for morphing detection, the device ensures very detailed examinations. The Regula 4125 has 15 light sources, which allow experts to visualise phosphorescent inks, and check document security features and printing techniques at a deep level. As a result, all major types of counterfeits can be detected directly on the spot. Advanced forensic equipment “There are no rivalled analogs for our ForensicScope Regula 4125 on the market today. It’s a fundamentally new device, which effectively combines the usability of portable tools and the wide functionality of advanced forensic equipment." "This makes the Regula 4125 a critical asset for law enforcement and border control authorities in their fight against increasingly sophisticated fraud techniques,” says Alex Lewanowicz, Director of Hardware Engineering at Regula.
Artificial Intelligence Technology Solutions, Inc., along with its subsidiary Robotic Assistance Devices Residential, Inc. (RAD-R), is preparing to introduce the next wave of advancements for RADCam™, the world’s first talking security camera, and a revolutionary AI-driven home security solution. Customise security preferences These new features are designed to enhance functionality, improve user interaction, and solidify RADCam as the premier choice for intelligent residential security. The latest capabilities will allow users to monitor their homes, engage with visitors, and customise security preferences with greater ease and control than existing, legacy home security cameras. Intelligent, interactive security The latest features enhance monitoring precision, streamline user control, and expand smart home compatibility These enhancements further position RADCam as the choice for homeowners seeking intelligent, interactive security. By integrating advanced AI and automation, RADCam delivers a security experience that is more intuitive, responsive, and adaptable to users’ needs. The latest features enhance monitoring precision, streamline user control, and expand smart home compatibility, ensuring a safer and more convenient security solution. Key features and benefits Alexa® and Google Home® Integration – Hands-free voice control for updates, event summaries, and settings adjustments. SARA™ AI Agent Call Logging – Events triggering AI agent calls appear in the event log with summaries and audio recordings. RADCam Smartwatch App – Instant alerts and notifications accessible via Android and iOS smartwatches using appropriate software versions. Google Single Sign-On (SSO) – Simplified login with secure access through Google accounts. Personalised Phrases and Alerts – Users can upload custom greetings or responses to enhance interactivity and engagement. Verbal Passphrase Duration Control – Users can verbally specify detection disable periods for greater flexibility. Smart home connectivity “These advancements in RADCam mark a significant leap forward in home security technology,” said Steve Danelon, President of RAD-R. “We are delivering features that make security more interactive, intuitive, and tailored to each user’s needs. By integrating deeper AI capabilities and expanding smart home connectivity, RADCam is redefining how homeowners protect and manage their properties. These innovations represent our continued commitment to making security smarter and more responsive than ever before.” Software-based upgrades No additional hardware is required, and all existing RADCam units will support these new features The Company noted that these enhancements are software-based upgrades that will be rolled out over the next few months and comprise ‘Phase 3’ of RADCam’s roadmap. No additional hardware is required, and all existing RADCam units will support these new features, ensuring that users can take advantage of the latest innovations without the need for any new equipment. Responsive security solution “RAD-R continues to set new standards in residential security, and these upgrades reinforce our commitment to pushing innovation forward,” said Steve Reinharz, CEO/CTO of AITX and RAD-R. “We are incredibly enthusiastic about the trajectory of RAD-R and the impact these new RADCam features will have on homeowners seeking a smarter, more responsive security solution.”
Bosch Building Technologies introduces the FLEXIDOME 8100i camera, combining powerful edge-based AI, exceptional image quality, and convenient remote commissioning to address critical use cases. FLEXIDOME 8100i motorised PTRZ Bosch Building Technologies continues its commitment to delivering innovative security solutions with the launch of the FLEXIDOME 8100i motorised pan-tilt-roll-zoom (PTRZ) camera. Building upon the proven FLEXIDOME starlight 8000i series, this next-generation of fixed dome cameras provides system integrators with a powerful tool to address the evolving security needs of airports, government facilities, schools, and other organisations with critical security needs. Improving security and operational efficiency FLEXIDOME 8100i delivers reliable, high-quality video data for informed decision-making The FLEXIDOME 8100i delivers reliable, high-quality video data for informed decision-making, due to edge-based AI video analytics, significantly improving security and operational efficiency across various applications. The uses include detecting personal protective equipment, safeguarding privacy, gathering details about an individual’s physical characteristics for forensic searches, and even recognising potential threats like firearms, among other critical applications. Exceptional image quality The camera excels in daylight and challenging nighttime conditions, providing exceptional image quality. In addition to the camera’s AI and imaging capabilities, features such as smart installation, compliance with government regulations, and data security distinguish it as the ultimate fixed dome camera for mission-critical surveillance needs. Enhance security and efficiency with IVA Pro The camera’s edge-based AI, Intelligent Video Analytics Pro (IVA Pro), provides over 95% accuracy for object detection, classification, and counting, enabling real-time safety and security enhancements with increased efficiency. Pre-installed IVA Pro software licenses for Buildings, Perimeter, and Privacy offer tailored solutions for diverse environments. Building security: Monitor access points, reliably count objects, distinguish people and vehicles, and protect assets. Perimeter security: Detect and deter intrusions with high sensitivity, long-range monitoring. Government buildings, schools, and campuses: Automatically blur faces with a semi-transparent privacy mask without revealing personally identifiable information. Versatility of IVA Pro The camera’s performance can be enhanced further with one of many IVA Pro software licenses. The versatility of IVA Pro enables users to optimise the camera’s functionality and maximise its potential for their security system. Enhance the effectiveness of forensic searches: Quickly retrieve video evidence based on specific attributes, increasing search capabilities’ efficacy and efficiency. (IVA Pro Appearance) Traffic monitoring: Gain valuable insights into traffic flow and patterns. (IVA Pro Traffic) Personal Protective Equipment Detection: Get automatic alerts for missing safety gear to ensure workplace safety and support compliance. (IVA Pro PPE) Early, fast firearm detection and real-time alerts: Enable a swift response to a person brandishing a gun and high-quality video footage for investigations. (IVA Pro Visual Gun Detection) Efficient installation and calibration AI-powered autocalibration for video analytics further optimises efficiency, saving an additional 20% Streamlined installation and remote commissioning reduce setup time by up to 75% compared to traditional cameras. AI-powered autocalibration for video analytics further optimises efficiency, saving an additional 20% of calibration time. Exceptional imaging no matter what Starlight X captures color details in low light, while HDR X records high-quality video regardless of object movement, ensuring exceptional image quality in challenging scenes. Intelligent split IR with individually controllable LEDs provides clear images in complete darkness. Robust and reliable design The new camera is engineered for maximum reliability in challenging environments. It is rated IP66/IP67 and IP6K9K for protection against water and dust, IK11 for vandal resistance, and has enhanced corrosion protection ensuring continuous operation. Prioritising data and cybersecurity Secure Element with TPM 2.0 functionality supports a 4096-bit key length, setting the industry standard Bosch prioritises sensitive information protection, achieving critical cybersecurity certifications including IEC 62443-4-1 and UL 2900-2-3 Level 3. Secure Element with Trusted Platform Module (TPM 2.0) functionality supports a 4096-bit key length, setting the industry standard for future-proof security. Meet government regulations Government needs are constantly evolving. The FLEXIDOME 8100i cameras comply with the US National Defense Authorisation Act (NDAA) 889 for Fiscal Year 2019 and the Trade Agreements Act (TAA). This compliance ensures consistency with reliability standards and adherence to trade regulations. Global markets can look to NDAA and TAA for guidance on trade and procurement standards. However, they must also evaluate their associated rules and priorities. For predictive-ready, data-driven, secure, robust, and resilient systems, Bosch aims to create a world uninterrupted by safety and security concerns.
Axis Communications, a pioneer in network video, has announced the release of two purpose-tuned cameras ideal for traffic surveillance and smart city initiatives. These powerful cameras can capture sharp licence plate images 24/7 and help law enforcement agencies improve road safety and gather valuable intelligence. AXIS Licence Plate Verifier AXIS Q1800-LE-3 is an all-in-one licence plate kit that includes everything in one device AXIS Q1800-LE Licence Plate Camera is preconfigured for accurate licence plate capture 24/7 at speeds of up to 250 km/h (155 mph). It’s fully compatible with edge or server-based LPR software from any pioneering third-party vendor, giving customers the freedom to choose the licence plate recognition analytics that best suits their needs. AXIS Q1800-LE-3 is an all-in-one licence plate kit that includes everything in one device. With AXIS Licence Plate Verifier preinstalled, it can read plates at speeds of up to 200 km/h (124 mph). An edge-based licence plate recognition approach means the camera manages processing and storage, eliminating the need for expensive servers and reducing bandwidth requirements. Integrate with VMS systems Both cameras can cover distances of up to 100 m (328 ft) during daylight. In pitch darkness, they can cover distances up to 50 m (164 ft), and up to 100 m (328 ft) with the optional accessory AXIS T90D20 IR-LED Illuminator. These purpose-tuned cameras require minimum setup. Image algorithms are preconfigured to focus solely on licence plate capture. Built on the Axis open platform, they integrate seamlessly with VMS systems and support a wide range of third-party applications. Key features Product with AXIS Licence Plate Verifier preinstalled Product ready for 3rd party software Purpose-tuned for licence plate recognition Read licence plates up to 250 km/h (155 mph) Capture/reading range up to 100 m (328 ft) Robust design withstands tough weather Electronic image stabilisation With a robust design, these licence plate cameras ensure reliable performance in extreme weather. They include a built-in weather shield and can withstand hurricane-force winds of up to 60 m/s (134 mph). Electronic image stabilisation ensures stable images when the camera is subject to vibrations. Furthermore, a wide range of installation accessories is available for flexible mounting options. Furthermore, with gray-coloured housing and a black weather shield, they blend into any traffic environment.
Invixium, a global pioneer in biometric access control, workforce, and visitor management along with RTLS-connected worker solutions, announces the launch of its new, effectively priced Enterprise Series – IXM ROSTO (face + card) and IXM TOUCH 3 (finger + card). Engineered with the same design-centric quality and cutting-edge technology as the Industrial Series, yet cost-effective for the mass market. Features for the SMB market “We want Small to Medium Businesses (SMBs) to experience Invixium the same way our Industrial customers have,” said Shiraz Kapadia, CEO & President of Invixium, expressing his excitement about the product launch. “In a nutshell, these products are priced to be extremely competitive and purposely designed with relevant features for the SMB market.” Modern connectivity features ROSTO supports RFID, mobile, and QR code credentials, providing flexible authentication options IXM ROSTO is a sleek and versatile biometric device designed for fast and secure access control, workforce, and visitor management. It features advanced facial recognition technology, dual cameras, and a 5″ IPS LCD touchscreen for a clear and user-friendly interface. ROSTO also supports RFID, mobile, and QR code credentials, providing flexible authentication options. Modern connectivity features ensure smooth data transfer and easy integration with pioneering Access Control Panels through IXM LINK. Its simple and elegant design makes it an ideal choice for applications across businesses of all sizes. Highlight features of IXM ROSTO Multifactor Authentication (Face, RFID or Mobile credential, PIN) Large User Capacity Digital Card and Dynamic QR Code support via IXM Mobile Liveness Detection to prevent spoofing PoE for easy installation Wi-Fi, BLE, and NFC OSDPv2 Support IP65 and IK08 Environmental Rating IXM TOUCH 3 TOUCH Series TOUCH 3 is fully compatible with all major access control panels via IXM LINK IXM TOUCH 3 is the newest member of the highest-selling TOUCH Series, offering advanced fingerprint recognition for secure and efficient access control, workforce, and visitor management. It features a vibrant and responsive 3.5″ IPS LCD touchscreen, providing a clear and user-friendly interface for easy interaction. Its slim design and angled fingerprint sensor ensure easy usability. It also supports multiple authentication options, including PINs, RFID credentials, and QR Codes, catering to diverse user needs. Additionally, its durable design and IP65 rating make it suitable for enterprises. TOUCH 3 is fully compatible with all major access control panels via IXM LINK. Highlight features of IXM TOUCH 3 Multifactor Authentication (Finger, RFID or Mobile credential, PIN) FBI Certified 500dpi Optical Fingerprint Sensor Digital Card and Dynamic QR Code support via IXM Mobile PoE, Wi-Fi and BLE option OSDPv2 Support IP65 and IK08 Environmental Rating Latest Enterprise Series at Intersec Dubai 2025 The Enterprise Series is now available for preorder by contacting the respective Invixium Sales Representative, shipping on March 31. Invixium showcases its complete portfolio of rugged biometric access control, workforce, and visitor management solutions, along with the latest Enterprise Series at booth S1-A16 at Intersec Dubai 2025.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Security beat
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, announces that its solution has been deployed by Michigan’s Williamston Community Schools to protect students, staff and visitors from gun-related violence. Centered in Williamston, the district educates over 2,000 students from Williamstown, Locke, Leroy, Wheatfield, Alaiedon and Meridian townships. It comprises five schools: a preschool, two elementary schools, a middle school and a high school. Layered security measures ZeroEyes will complement the schools' existing layered security measures, which include secure vestibules, a school resource officer (SRO) and a full-time firearm detection dog team, alongside proactive mental health programs such as “Prevent to Protect”, which helps students who are at high risk of committing suicide or violent acts towards others. “ZeroEyes is an important layer of security that complements the efforts that have already been put in place in the district,” said Adam Spina, Superintendent of Williamston Community Schools. “Our security layers combine to create a significantly safer school day for our students and staff.” Intelligent situational awareness If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school staff as quickly as 3 to 5 seconds from detection. Improving student safety As a result of Michigan Public Act 103 (PA 103), Williamston Community Schools received a grant specifically dedicated to procuring AI gun detection software to improve student safety. "The extensive security protocols and systems of Williamston Community Schools reflects the districts’ commitment to keeping students and staff safe from gun-related violence," said Mike Lahiff, CEO and co-founder of ZeroEyes. "The support of Michigan’s legislative grant program enabled us to provide proactive gun detection to a number of districts throughout the state. We encourage policymakers to expand the program in 2025 to help protect more schools.”
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honour all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. Buffalo Park The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Challenge Provide a welcoming and secure environment for visitors and deter criminal activity within the park. Achieve 360° coverage across all interior and exterior areas without using cables, which would have made the project cost-prohibitive. Design a wireless surveillance system to cover the park’s large areas of open ground. Surveillance system installation “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Factors to consider From a risk and public safety perspective, the goal from the start was to maintain an open and welcoming environment “We conducted a site survey, considering the line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Solution Install a Hanwha Vision surveillance system comprising multidirectional and AI cameras. 4K multi-sensor cameras Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Ease of playback Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” Cable cost and distance One challenge the team encountered during the design phase was running a cable for a project of this scale. “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” NDAA compliant solutions The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence. In the past, we could not effectively supply law enforcement with usable information to identify a suspect." Use of AI in cameras The Hanwha cameras’ use of AI plays a key role in delivering those capabilities "We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the colour of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. Sense of security “We absolutely would see an increase in the value and number of cameras that we use,” said Abbott. Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.” Results Ability to effectively monitor all park areas and more effective forensic searches. Reduction in on-premise incidents. Streamlined collaboration with law enforcement agencies.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, announces that the Northeastern School District (NESD) in York County, Pennsylvania has adopted ZeroEyes' AI gun detection and intelligent situational analysis solution. This proactive step will help protect students, staff, and visitors from gun-related threats. The cutting-edge security system identifies firearms in real-time and delivers actionable intelligence to first responders. Extensive security cameras Gun-related violence continues to be a pressing issue in the United States. Data from the ZeroEyes Gun Violence Research Center shows that 35.9% of shootings analysed in Pennsylvania occurred on K-12 school campuses. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts NESD’s existing security measures include two full-time school resource officers and extensive security cameras. Additionally, the district is transitioning to electronic key card access for all doors, replacing traditional hard keys, and is reviewing remote lockdown capabilities and mass internal notification systems. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts. Mass internal notification systems "A colleague introduced us to ZeroEyes, and we were immediately impressed by the potential of their AI gun detection technology," said Dr. Jason Bottiglieri, Superintendent of NESD. "When we learned about the Pennsylvania Commission on Crime and Delinquency (PCCD) grant, which focuses on enhancing school safety in Central Pennsylvania, we saw an opportunity to bring this critical solution to our district.” NESD is a midsized, suburban public school district located in the South Central region of Pennsylvania. NESD comprises eight buildings, including four elementary schools, two intermediate schools, one middle school, and one high school. The district serves over 4,000 students and employs approximately 300 teachers and 500-600 staff members. Law enforcement veterans If these experts determine the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. Cutting-edge technology "It’s inspiring to see schools like NESD take decisive action to enhance campus security,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thrilled to support their mission to protect students, faculty, and staff. Our collaboration reflects a shared commitment to leveraging cutting-edge technology to help mitigate potential tragedies and save lives."
Axis Communications, the industry pioneer in video surveillance and network devices, announced the implementation of a custom surveillance solution developed in collaboration with the MetLife Stadium security team. This new, tailored solution will help the venue augment its security capabilities, providing high-quality video at unprecedented distances and allowing the security team to identify details from anywhere in the venue. Advanced video analytics solutions “As one of the world's largest stadiums, the safety of fans is our number one priority,” said Danny DeLorenzi, VP of Security and Safety Services, MetLife Stadium. “Unfortunately, none of the out-of-the-box solutions we tried could provide the desired coverage at the video quality we were looking for." "Axis worked with us to build a custom solution where our needs were taken into consideration from the concept phase all the way through implementation. The result was an innovative new camera capable of providing full visibility throughout the entire bowl of the stadium while also allowing us to take advantage of advanced video analytics solutions.” Forefront of stadium security MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games Located in East Rutherford, NJ and serving the New York City metropolitan area, MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games—and the venue has been at the forefront of stadium security since it was built. The stadium is consistently rated one of the safest in the NFL, and in 2013 it was the first NFL stadium to achieve SAFETY Act certification from the US Department of Homeland Security. Implementing modern security solutions MetLife Stadium has twice been named a Facility of Merit by the prestigious National Centre for Spectator Sports Safety and Security (NCS4) and has established a reputation for implementing modern security solutions. In keeping with this reputation, MetLife Stadium refused to compromise on a surveillance solution, choosing instead to work directly with Axis on a device tailored to the venue’s unique needs. Innovate and design a tailored solution “MetLife Stadium has always been committed to strong security, and it holds its partners to a very high standard,” Fredrik Nilsson, VP, Axis Communications. “When the security team explained to us that they were having a hard time finding an off-the-shelf device that met their needs, we viewed it as an opportunity to innovate and design a more tailored solution." "As a result, the MetLife Stadium security team will be well positioned to detect, investigate, and respond to any security challenges that come its way.” Advanced and complex video analytics The new device has a number of parts specifically tailored to improve version in a stadium setting The new device includes a number of features specifically tailored to improve performance in a stadium setting. It provides optimal performance in a variety of lighting conditions, and electronic image stabilisation (EIS) capabilities that help keep the image steady even amid the raucous crowds and turbulent weather of an open-air stadium. It also features a custom-made lens that enables 8K resolution, and is capable of recording images in a wide dynamic range, capturing a broad spectrum of colour hues in sharp, high-contrast video. Because the camera can more accurately identify and catalogue identifying features it is able to run more advanced and complex video analytics. Existing surveillance devices The device adheres to a form factor consistent with existing surveillance devices, enabling compatibility with the pressed concrete structure’s existing camera mounts. Additionally, MetLife Stadium ensured the device could be easily integrated with the venue’s current security stack, including its Video Management System (VMS), current technology partners, and local public safety agencies. MetLife Stadium’s security capabilities Venue officials are working to identify ways to leverage the devices to enhance security With the new surveillance solution in place, MetLife Stadium’s security capabilities are more advanced than ever—but the security team is already planning for new enhancements. Venue officials are working to identify ways to leverage the devices to enhance security while also exploring different video analytics solutions. The ultimate goal is to not just improve security but streamline entry to the stadium, create easier access to amenities, and improve staffing efficiency. Highest Grossing Stadium of the Year MetLife Stadium, located in East Rutherford, NJ, is the home of the New York Jets and New York Giants and is one of the largest stadiums in the NFL (82,500). The stadium hosts the world’s biggest events on the world’s biggest stage and will host the FIFA World Cup 26™ Final and 7 other matches throughout the tournament. The venue annually ranks as one of the busiest stadiums in the world and has been named “Highest Grossing Stadium of the Year” 9 times by Billboard. Event highlights include Super Bowl XLVIII, NHL Stadium Series, WrestleMania, Copa America Centenario Final, 2021 Army-Navy Game, and many concerts, college football games, and international soccer matches.
Modernising a town's transport hub requires a careful balance of effective security, useful functionality, and sleek design. Jacksons Fencing successfully completed a fencing solution for the Newbury Bus Station redevelopment - an innovative, secure, and sustainable fencing solution that enhances both safety and aesthetics at this key transportation spot. Modern redesign Jacksons Fencing was specified to deliver a key that not only met rigid security ideals As part of West Berkshire Council's ambitious project to upgrade public transport infrastructure, Jacksons Fencing was specified to deliver a solution that not only met stringent security standards, but also blended seamlessly with the station's modern redesign. The result; a smart, sturdy, and sustainable boundary that helps keep the station running smoothly, without compromising on visual appeal. Modern gateway for the community Newbury Bus Station is a central part of West Berkshire's revitalisation plan. Located in a historically rich area, it replaced an old coach parking lot and was designed to offer an "impressive sense of arrival" for both visitors and locals. As a key part of the town’s efforts to create a modern, vibrant, and accessible gateway, the station plays a crucial role in improving the local transport network. To complete the transformation, the station needed a fencing solution that would secure the perimeter, safeguard passengers, and maintain an appealing appearance. Expertly engineered Jacksons Fencing installed 90 metres of Sentry® vertical bar fencing, modern vertical bar railing system Jacksons Fencing installed 90 metres of Sentry® vertical bar fencing, a robust and modern vertical bar railing system designed for high-traffic public spaces. Constructed from hot-dip galvanised tubular steel, the Sentry fencing system is lightweight, yet incredibly strong, capable of withstanding the daily wear and tear of a busy bus station. The sleek, industrial design fits perfectly with the station’s contemporary look, blending seamlessly into the surroundings without being intrusive or creating a hostile environment. Structure for enhanced security The system features a welded pale-through-rail construction, which provides a tamper-resistant structure for enhanced security. Concealed fixings ensure a clean, vandal-resistant finish, while the flat-top construction and non-protruding pales give the fence a non-threatening appearance—ideal for a public space. Additionally, the fence is built to last, backed by a 25-year Service Life Guarantee that reduces maintenance needs and guarantees long-term durability. Combining sustainability with security In extra to its sustainability benefits, the fencing provides a high level of security One of the biggest wins for this project was its alignment with West Berkshire Council’s sustainability goals. The Sentry fencing system is not just tough and reliable; it’s also designed with environmental impact in mind. The durable materials and extended lifespan promise long-lasting performance with minimal need for replacement or maintenance, cutting down on lifetime costs and reducing its environmental footprint. In addition to its sustainability benefits, the fencing provides a high level of security. Its strong, tamper-resistant construction safeguards passengers while preventing unauthorised access without compromising the station’s modern look. Cohesive and secure infrastructure Peter Jackson, Managing Director of Jacksons Fencing, commented: "Contributing to the Newbury Bus Station redevelopment demonstrates our commitment to delivering tailored solutions for local authorities like West Berkshire Council that combine functionality, sustainability, and design." "The success of this project builds on our earlier work at Newbury Train Station in 2022, where we installed 160 metres of Bow Top fencing. Together, these two projects enhance the town’s transport hubs, delivering cohesive and secure infrastructure that supports a vibrant and accessible community.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden costs of energy consumption and environmental consequences can also impact the measure of TCO. Costs of training, integration, support, and scalability can also be examined. Considering the security industry impact of TCO, we asked this week's Expert Panel Roundtable: How does/should total cost of ownership (TCO) impact the decision-making process when choosing technologies for security?
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![5 ways to strengthen physical security with an integrated system](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1660648693.jpg)
5 ways to strengthen physical security with an integrated system
Download![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Empowering cameras with AI](https://www.sourcesecurity.com/img/white-papers/612/azeena.gif)
Empowering cameras with AI
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![Choosing the right storage technology for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/security-storage-data-920.jpg)
Choosing the right storage technology for video surveillance
Download![Video surveillance as a service: Why are video management systems migrating to the Cloud?](https://www.sourcesecurity.com/img/white-papers/612/vsaas-920.jpg)
Video surveillance as a service: Why are video management systems migrating to the Cloud?
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![How security systems ensure healthy workplaces during COVID and after](https://www.sourcesecurity.com/img/white-papers/612/healthy-workplace-920.jpg)
How security systems ensure healthy workplaces during COVID and after
Download![Best practices guide: analogue video to cloud](https://www.sourcesecurity.com/img/white-papers/612/eagle-eye-networks-920.jpg)
Best practices guide: analogue video to cloud
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Making sense of today’s security camera options](https://www.sourcesecurity.com/img/white-papers/612/vicon-todays-security-camera-option-920.jpg)
Making sense of today’s security camera options
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Covert cameras: Manufacturers & Suppliers
- Hikvision Covert cameras
- Dahua Technology Covert cameras
- Hanwha Vision Covert cameras
- Verkada Covert cameras
- Milesight Covert cameras
- Axis Communications Covert cameras
- LILIN Covert cameras
- Avigilon Covert cameras
- Illustra Covert cameras
- MOBOTIX Covert cameras
- Speco Technologies Covert cameras
- Honeywell Security Covert cameras
- AV Costar Covert cameras
- Milestone Covert cameras
- Videotec Covert cameras
- DNAKE Covert cameras
- Anviz Covert cameras
- exacqVision Covert cameras
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download