Covert cameras
3xLOGIC, the pioneering innovator in security and business intelligence, has launched four new camera and imager solutions providing exceptional high-definition quality and intelligent software to improve business insights. Each camera offers unique features tailored to business needs. Some include fixed lens capabilities, AI analytics, enhanced visual performance for poor lighting conditions, and more. VISIX™ Dual Thermal Imager VISIX™ Dual Thermal/Visible Light Imager comb...
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its systems and services are deployed and maintained to the highest available level of cybersecurity protections and protocols. As major news stories continue to proliferate about hacks, breaches and vulnerabilities — including the high-profile cyberattacks this past week that crippled CDK Global, which provides management software for t...
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, introduces its latest innovation: the 4 MP Panoramic Turret Camera, designed to elevate surveillance with its smart monitoring capabilities and flexible installation. It takes the functionality of two turret cameras and merges them into one effective, high-performance panoramic camera. “Our new 4MP Panoramic Turret...
Traffic monitoring systems are the silent sentinels of the roads, ensuring the safety and efficiency of the transportation networks. However, environmental challenges such as fog, heavy rain, dust storms, and even glare from the sun can hinder their effectiveness. Although standalone radar technology can operate in these environmental challenges, it lacks the ability to provide the detailed visual context which is so important for comprehensive traffic management. In this blog, they explore a...
By combining innovative radar, camera and software technologies, Navtech and Dallmeier Electronic now offer an integrated solution for optimised airside security at airports. By integrating the two systems, airport operators can achieve a very high level of objective security against a wide range of threat scenarios at a low total cost of ownership. Airside violations are a major security problem in air traffic. The scenario of possible threats ranges from disruptions of flight operations by ac...
{##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##} In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or...
News
MOBOTIX ONE is an extremely robust and maintenance-free video system 'Made in Germany' that impresses with both its application-oriented design and its high-quality components: fiberglass-reinforced, saltwater-resistant housing allows use in the harshest environments, strong processors and image sensors ensure excellent image quality. In addition, cyber-secure firmware developed by MOBOTIX with integrated AI video analysis tools for intelligent, video-based perimeter protection and object detection at the highest level. In addition to its unique design, the camera series also impresses with its enormous performance and connectivity. AI- and deep learning-based apps open up process-optimised workflows in industry or production, but also in the care sector or the transport sector, for example. MOBOTIX Image Engine MOBOTIX ONE delivers sharp and clear image quality around the clock, indoors or outdoors Thanks to its high-resolution image sensor and application-optimised MOBOTIX Image Engine, the MOBOTIX ONE delivers sharp and clear image quality around the clock, indoors or outdoors. Intelligent continuous recording switches to maximum resolution and frame rate on an event-driven basis, and the cameras feature a powerful 120 dB Wide Dynamic Range (WDR) and improved low-light performance with outstanding image quality even in very poorly lit environments. "With the secure and robust, yet intelligent and flexible MOBOTIX ONE camera platform, we have created a stable basis that can be expanded with the already installed MOBOTIX ActivitySensor ONE app, but also with other AI-based video analysis apps that are already in development, to create an unsurpassed security and process optimisation system for defined solutions," explains MOBOTIX CTO Christian Cabirol. Digital industrial espionage MOBOTIX is focusing on selective, sensitive and critical infrastructures and verticals, as these niche markets offer significant market potential. Focus industries include healthcare, industry/utilities, the public sector and transportation. "Customers in these sectors are already aware of the dangers that digital industrial espionage or hybrid attacks can cause and are willing to invest in reliable and trustworthy systems to ensure the greatest possible security and optimisation of processes and workflows," emphasises Thomas Lausten, CEO of MOBOTIX AG. Introducing the new MOBOTIX ActivitySensor MOBOTIX ActivitySensor ONE is especially suited for perimeter protection and intrusion detection The new MOBOTIX ActivitySensor ONE, available with the MOBOTIX ONE camera, offers features perfect for security and surveillance. Using AI-based object detection, the sensor can reliably identify and track the movement of people and vehicles, including cars, trucks, buses, motorbikes, and bicycles. But stationary objects are also detected. The MOBOTIX ActivitySensor ONE is especially suited for perimeter protection and intrusion detection, overcoming the limitations of traditional video motion-based image analysis tools. This significantly reduces false alarms and increases detection accuracy of relevant objects and movements strongly. The sensor can be activated in specific areas within the camera's view and works both indoors and outdoors, day and night. It is very easy to use, making it a dependable and user-friendly solution for various security needs as well as for workflow and process optimisation in the industrial, production, healthcare and logistics sectors. With the wholly-owned MOBOTIX subsidiary Vaxtor, the company also has market-pioneering app development expertise that can develop solutions for a wide range of future challenges. One camera, two options: MOBOTIX ONE M1A-S One model is equipped with fixed focal length lenses, the second variant with motorised varifocal lenses The MOBOTIX ONE M1A-S camera model marks the launch of the new platform. One model is equipped with fixed focal length lenses, the second variant with motorised varifocal lenses. With the varifocal lens, the user can easily adjust the optimum image angle for their security camera remotely via the camera software, depending on the planned installation position. The integrated on-board analytics with the MOBOTIX ActivitySensor ONE, which is based on deep learning, ensures reliable detection of relevant objects and movements. Both variations have an internal DVR that supports up to 1 TB of storage, eliminating the need for extra recording software or NVRs. Both variations also will mount on existing M16/M26 brackets, allowing for a more cost-effective upgrade from Mx6. MOBOTIX Management Centre MOBOTIX ONE variations also have high-quality audio capabilities with integrated bidirectional and lip-synchronised audio that requires no additional accessories. MOBOTIX ONE is built to last with a 5-year warranty and a high MTBF (Mean Time Before Failure) value of over 10 years. The cameras also have free lifetime software updates and use the MOBOTIX Management Centre, which is free of charge. These features ensure the camera will be useful and sustainable for a long time.
Allegion US, a pioneering provider of security solutions, technology and services, is excited to announce the launch of the Von Duprin 70 Series Exit Devices. This new product line combines the quality and trust associated with Von Duprin with a medium price point, making it an ideal choice for a wide range of applications including warehouse, industrial, office, multifamily, retail and hospitality spaces. The Von Duprin 70 Series Exit Devices are ANSI/BHMA Grade 1 certified, ensuring the highest standards of quality. The series offers both panic and fire-rated options that are available in both the 78 series wide stile and the 75 series narrow stile form factors. Rim, surface vertical rod and concealed vertical rod configurations are available for both the 78 and 75 series. Additionally, the 70 series offers a wide range of device lever designs and finishes that suite across the Von Duprin portfolio. Feature of the 70 Series Quick shipping is available for time-sensitive projects, allowing customers to meet their deadlines "The Von Duprin 70 Series Exit Devices serve as a testament to our commitment to delivering durable and high-performance solutions for a diverse range of applications," said Marli Williams, general manager of exits for Allegion US. "We are proud to offer customers the quality and trust they expect from Von Duprin at a medium price point." One standout feature of the 70 Series is the Quiet Electric Latch Retraction (QEL) option, which provides electronic control of an exit device with limited operational noise. This option is particularly beneficial in environments where noise reduction is desired. Furthermore, quick shipping is available for time-sensitive projects, allowing customers to meet their deadlines without compromising on quality. Von Duprin family of products In terms of aesthetics, the 70 Series boasts a modern look with harder lines, perfectly complementing the existing Von Duprin family of products. This enables customers to seamlessly incorporate a blend of premium and mid-priced exit devices in their projects, creating a visually captivating and economically sensible space. Von Duprin's commitment to excellence extends beyond the product itself. Supported by a team of experts well-versed in door hardware applications and code compliance, Von Duprin provides unmatched customer support. From expert advice and architectural consulting to specification writing, code and compliance coordination, safety and security consulting, technical support, and training, Von Duprin ensures that customers have the resources they need every step of the way.
i-PRO Co., Ltd., a global pioneer in professional security solutions for surveillance and public safety, announced its new AI-enabled Corner Camera. Built-in Japan for the rigours of high-security facilities, this exceptionally compact and robust stainless steel camera represents the smallest form factor, which is IK11 compliant. Its ability to withstand a 70 Joule (70J) impact far exceeds the common IK10 (20J) impact ratings of similar devices. "The i-PRO Corner Camera represents a new standard for high-security environments, providing unmatched reliability and advanced AI-powered analytics all within the most compact form factor," said Gerard Figols, Chief Product Officer at i-PRO, adding "With its IK11+ 70J rating, it is clearly the most shock-resistant corner mount surveillance camera in the industry today." i-PRO Corner Camera The sensor provides a ±5° yaw adjustment and a ±5° tilt to further conform to installation requirements The camera’s wide-angle view (131° horizontal, 95° vertical) limits blind spots, providing full room coverage. The sensor provides a ±5° yaw adjustment and a ±5° tilt to further conform to installation requirements. An invisible IR-LED illuminates up to 15 metres using a 940nm wavelength. While the stainless steel body exceeds an equivalent IK11+ impact rating, any attempt to tamper with the camera, from impacts to opening the case, instantly sends an alarm to operators. With a dynamic range of 132 dB The i-PRO Corner Camera measures just 197x139x126 mm (7.76x5.47x4.96 inches). With a dynamic range of 132 dB, images remain clear in a variety of lighting conditions. "The engineers at i-PRO have done it again. When you factor in the additional licence-free AI applications, it’s truly an industry-renowned camera," said Gerard Figols. The camera’s all-important anti-ligature design prevents self-harm incidents, while minimising any attempt to remove the camera by force. Powerful AI-assisted edge analytics The corner camera supports up to three free i-PRO AI applications simultaneously, such as AI Video Motion Detection, Privacy Guard, and People Detection. To protect privacy, i-PRO’s AI Privacy Guard feature can automatically blur faces or entire bodies, creating a redacted stream. A built-in microphone facilitates AI-based sound detection of loud noise, screaming, glass breaks, and more. Cybersecurity For enhanced cybersecurity, the vandal-proof camera includes a secure boot feature and complies with the FIPS 140-2 level 3 standard. The new corner camera is expected to be available in September 2024 from i-PRO’s extensive global network of resellers.
HENSOLDT Australia has delivered a key milestone for the AIR5431 Phase 2 program by introducing a new Air Traffic Control (ATC) sensor into operational service at the Army Aviation Centre Oakey, achieving Initial Operational Capability for the Royal Australian Air Force (RAAF). Project AIR5431 Phase 2 is replacing the ageing Australian Defence Air Traffic System and Alenia surveillance sensors located at the Australian Defence Force’s fixed bases across Australia. The sensors provide surveillance coverage for fixed base flying operations and support the National Air Traffic Management Surveillance Infrastructure Plan (NASIP). Sustainment under a Support Contract Additional sites will be delivered this year, with final delivery scheduled for September 2025. The delivery includes the state-of-the-art Operational Maintenance Trainer (OMT) manufactured in Germany by HENSOLDT and operated and maintained in Australia by HENSOLDT Australia Pty Ltd. HENSOLDT will provide ongoing sustainment under a Support Contract. "HENSOLDT Australia is delighted by the achievement of this important milestone in the delivery of this critical air surveillance capability to Defence. This milestone represents the culmination of significant effort on the part of the Commonwealth and HENSOLDT teams to this point and we look forward to delivering the remainder of the capability over the coming months," said Mark Novak, Managing Director of the Australian subsidiary.
Security is more relevant than ever. Whether it’s cybersecurity, intrusion protection or access control - the demand for individual and tailor-made security solutions in industry, companies and private households is constantly increasing. As the pioneering trade fair, Security Essen brings together the security industry and showcases innovations and developments with around 500 exhibitors from September 17 to 20. At the same time, it celebrates its 50th anniversary. What began in 1974 with 105 exhibitors and about 1,000 visitors has long since developed into an international success story. Range of products and services Trade visitors from all over the world can expect a vast range of products and services in the array halls “Today, Security Essen is the comprehensive platform and indispensable meeting place for the security industry. Thanks to our continuous further development, it always remains at the cutting edge. This year, visitors can also look forward to a number of new features," reveals Project Manager Julia Jacob. Trade visitors from all over the world can expect an extensive range of products and services in the exhibition halls. Around 500 exhibitors from over 30 nations will present their solutions in these subject areas: Access/Mechatronics/Mechanics/Systems Perimeter Protection Fire/Intrusion/Systems Digital Networking Security Services Civil Protection Special-Purpose Vehicles Video Market pioneers as well as hidden champions and niche players will be there. At the same time, Security Essen offers newly founded companies the opportunity to make contacts in the global market and to promote and market products made in Germany internationally. At the "Young Innovators" joint stand, start-ups will show, among other things, how AI robots can take over surveillance tasks, which furniture makes prisons look secure and stylish at the same time and how users can protect their passwords. A comprehensive supporting program enhances the trade fair Security Essen offers special theme days and high-caliber professional lectures, providing added value for all trade visitors: The first European Drone Conference, for example, celebrates its premiere on September 19 and 20. It will shed light on innovative applications and safety aspects in the use of drone technology. Aimed at young talents and specialists is the Training and Further Education Day on September 17. The Federal Association of the Security Industry (BDSW) will also honour the best trainees on this day. Pressing digital security issues will address the DNS Digital Networking Security Conference on September 17 and 18. Among others, intelligence and crime analyst Mark T. Hoffmann will provide insights into the psychology of cybercrime in his presentation "Profiling Hackers". Spectacular explosive attacks on financial institutions have made headlines in the past. The Banks and Savings Banks Day on September 19 will show how these institutions can protect themselves. Partners of the theme days include the German Association of the Security Industry (BDSW), the International Physical Security Association (ESSA), the Confederation of European Security Services (CoESS), Datakontext and kes. The lectures will take place directly in the exhibition halls and are already included in the ticket price. Tickets available online Security Essen will be held at Messe Essen from September 17 to 20, 2024. The exhibition halls will be open from 9 a.m. to 6 p.m. from Tuesday to Thursday and from 9 a.m. to 4 p.m. on Friday. Tickets are available online for 48 euros.
MOBOTIX celebrates its 25th anniversary this year. Founded on June 21st by Dr. Ralf Hinkel, Sabine Hinkel and Klaus Borchers in 1999, MOBOTIX revolutionised the video technology market with the world's first decentralised video camera. Influenced by the strict German data protection regulations, MOBOTIX cameras were designed with image data security at their core. MOBOTIX continues to set standards when it comes to data protection, cyber security and longevity in video technology. MOBOTIX ONE platform To mark MOBOTIX’s 25th anniversary, the company launched its new MOBOTIX ONE platform that combines its 'Made in Germany' values with software driven by artificial intelligence and deep learning. MOBOTIX has created a powerful community of technology partners and experts In its 25 years, MOBOTIX has created a powerful community of technology partners and experts which enables the company to be at the forefront of technological innovations and customised solutions. These solutions—ranging from healthcare and energy supply to public sector and manufacturing—are powered by highly intelligent systems that are protected by the toughest cybersecurity. Commitment to innovation and quality "We are celebrating our 25th anniversary internally at our summer party in Langmeil," says Thomas Lausten, CEO of MOBOTIX AG. “Externally, the launch of the MOBOTIX ONE on our 25th anniversary will be a significant milestone that underlines our commitment to innovation and quality. We are proud of our history and look forward to continuing to make the world safer and better with our technology and in line with our vision 'Beyond Human Vision'."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Case studies
Omnilert, a pioneer in active shooter solutions, announced that it has integrated Omnilert Gun Detect with the Hanwha Vision Wisenet WAVE video management software (VMS) to provide a complete solution for gun violence and active shooters that can help save lives in the event a gunman comes onto a customers' facilities. Wisenet WAVE VMS is a software platform for IP video surveillance applications that detects, streams, records, and analyses live video from connected IP cameras and networked video sources. By integrating with Omnilert Gun Detect, the Wisenet WAVE platform now has the ability to rapidly respond to detected weapons in a fraction of a second, and once verified, activate a complete and robust response that could include locking doors, notifying police, sending alerts and providing situational intelligence throughout the entire event. Integration of Omnilert Gun Detect The Gun Detect events can trigger operations within WAVE such as sending notifications The Omnilert Gun Detect integration enables selectable bookmarking and/or event triggering in response to a gun detection within Wisenet WAVE VMS. The Gun Detect events can trigger operations within WAVE such as sending notifications and displaying on the Alarm layout. "The integration of Omnilert Gun Detect with Wisenet Wave VMS will bolster the security we can provide our joint customers to protect against the growing threat of active shooters and gun violence, which is at an all-time high in the U.S.," said Nick Gustavsson, CTO and Co-Founder at Omnilert. "This means that video feeds already being managed in the WAVE platform can now be monitored 24/7 for weapons, allowing for a proactive response before shots are fired." Integration into Wisenet WAVE Omnilert Gun Detect's end-to-end workflow of detection and activation allows for automatic initiation "Omnilert's gun detection platform provides especially strong gun detection analytics as well as one of the most flexible and powerful alerting systems on the market," said Mark Heintzman, Technical Partnership Manager at Hanwha. Omnilert Gun Detect's end-to-end workflow of detection, activation, and notification allows for an automated initiation of an organisation's active shooter response, with 24/7 monitoring and local first responder escalation, integrated notification, and integration into Wisenet WAVE. Omnilert's active shooter solution The integration enables selectable bookmarking and/or event triggering in response to gun detection within Wisenet WAVE. The Gun Detect events can trigger multiple operations within WAVE such as sending notifications and displaying on the Alarm layout. Additionally, Omnilert will automatically configure the camera setup, including IP address, camera name and location, which will help speed the deployment of Omnilert's active shooter solution.
Indexable inserts are interchangeable cutting tools that are indispensable in various industrial applications, especially in metalworking. They are used as cutting material carriers for machining metals, plastics or wood. Their manufacture requires high-precision production processes to ensure an exact geometry and perfect surface finish. Even minimal deviations affect not only the service life but also the performance of the cutting insert. The smallest defects that are invisible to the human eye can cause immense damage, for example when milling or cutting high-quality components - including consequential costs. Careful quality control is essential to ensure that only flawless indexable inserts leave the production process and meet the high requirements in terms of durability and reliability. A flagship project by automation and measurement technology specialist Xactools from Germany demonstrates how artificial intelligence can help visual inspection make quantum leaps. The German medium-sized company has developed a fully automated handling and inspection system for a global manufacturer of indexable inserts based in Scandinavia, in which the DENKnet solution for AI-based image evaluation plays a decisive role and sets new standards in terms of performance, zero-defect production and speed. Application Edges of the indexable inserts are rounded and ground, and their covers are blasted, ground and coated Around 1.2 million indexable inserts leave the Scandinavian company's production halls every week, which have to guarantee the highest possible process reliability and maximum productivity in the metalworking, automotive and aerospace industries, for example. They are manufactured using the sintering process, in which powdered metals, hard metals and other materials are pressed into the desired shape and then sintered, i.e., bonded together under heat and pressure. The strong and robust structure created in this way makes it possible to combine materials with different properties in order to achieve the desired cutting and wear resistance properties. After the sintering process, the edges of the indexable inserts are rounded and ground, and their surfaces are blasted, ground and coated. The Robotvision system from the Swabian engineers is used directly after the second manufacturing step, the sintering process. "The earlier defects are detected in the process, the better and cheaper it is to rectify them," says Marvin Krebs, Director Technical Sales at Xactools, explaining the system's position. A total of eight high-resolution industrial cameras and two spider robots are used to handle and inspect the indexable inserts for defects, which keep an eye on and load three rotary table nests and finally one pin pallet each. DENKnet's AI forms the heart of the complex image processing system between cameras, robots and a multi-GPU computing rack. Requirements The AI-based image evaluation software used had to be trained to correctly recognise As versatile as the areas of application of the small tool parts are, so varied are their properties and geometries. This manufacturer alone has around 2,800 products in its portfolio, which can be divided into almost one hundred geometry families. The aim was to automate handling and defect inspection for all of these. "The first challenge results from the numerous colour variations within the powder per pressing process," explains Marvin Krebs. "If certain parameters such as time, pressure or positioning vary, this leads to colour or gloss level deviations or to a different distribution of speckles on the surface, but this is not a defect." The AI-based image evaluation software used had to be trained to correctly recognise the numerous possible colour deviations of the surfaces and rate them as "OK". On the other hand, the smallest irregularities such as cracks, scratches, inclusions or other anomalies must be recognised as such and classified as "NOK". The inspection of metal surfaces is considered one of the highest skills of surface inspection, as their texture can be matt, shiny or even reflective. "The AI had to be extremely trained to variations and lighting conditions for this application," emphasises Marvin Krebs. AI results for the metal components The customer himself trained the customised image analysis solution with the DENK VISION AI Hub But in addition to the visual appearance, it is also about the insert geometry. Categories such as triangle, rectangle, rhombus or square can be found in countless variations due to the smallest deviations and are therefore divided into manageable subcategories, so-called geometry families. Xactools made the pre-selection for the training of the meshes; almost one hundred geometry families were defined and then taught in by the manufacturer itself. What sounds like a laborious undertaking was done surprisingly quickly. "No more than 20 to 30 images were needed to teach each geometry family," recalls Marvin Krebs. The DENKnet palletising AI used for this purpose uses the DENKnet segmentation and classification network. The customer himself trained the customised image analysis solution with the DENK VISION AI Hub. The AI was integrated into the production line in just a few months and achieved almost perfectly reliable AI results for the metal components to be tested right from the start. "Indexable inserts identified as defective are sorted out and grouped according to the size and position of the defect. The AI image analysis detects more than 99 percent of production errors," adds Daniel Routschka, Sales Manager Artificial Intelligence at IDS Imaging Development Systems GmbH. But how exactly does the system work? A lighting screen measuring 1 x 1 metre provides extremely high illumination at the palletising stations A total of eight cameras with resolutions between 5 and 30 megapixels provide live images of the indexable inserts, which are positioned by magnetic or interchangeable grippers. For example, a camera records the individual indexable inserts from below and from above in order to check them for surface defects. Two other cameras check their cutting edge. A lighting screen measuring 1 x 1 meter provides extremely high illumination at the palletising stations. "The system detects defects in the thousandth of a millimetre range," emphasises Marvin Krebs. This ensures that no damage is caused to the high-end surfaces to be processed later. This is because "uneven and faulty milling processes can potentially impair profitability and competitiveness", as the manufacturer also knows. To prevent this from happening during the production process and to exercise the greatest possible caution, the system also records images of the contour and position of the panels after inspecting the surfaces and edges. New versions of indexable inserts The contour of the insert and the outer edge of the gripper are detected in order to correct the position It can see exactly where and in which rotational position the indexable insert is positioned so that the magnetic gripper can finally place it on pin pallets. To ensure this, the gripper, to which the indexable insert is attached, moves over a camera that detects the exact position of the hole from below. At the same time, the contour of the insert and the outer edge of the gripper are detected in order to correct the position of the indexable insert and hit the pin if necessary. In addition, each individual pin position is detected in order to recognise bent and broken pins so that they are not palletised in the first place. "The system has been running for six months and the self-learning, global AI now recognises parts that it has never seen before. After just three to four months, new versions of indexable inserts no longer had to be trained for inspection. The underlying geometry is no longer relevant for the AI; it knows the contour and can also differentiate between IO and NIO for new parts," explains Marvin Krebs. High-performance AI image analysis with 99% picking efficiency The image analysis of live images from eight cameras via a DLL requires enormous computing power For Marvin Krebs, the added value of the DENKnet system compared to conventional image processing is obvious: "Without AI, the creation of part families and defect detection would be completely unthinkable. With rule-based image processing, the robot would also recognise parts within the standard range as NOK and sort them out." In addition, thanks to the Vision AI Hub, no hard coding is necessary, and the flexibility of the networks was another selection criterion for the intelligent DENKnet software. "We were able to easily embed the DENKnet palletising AI and several object classes for defects into our own Xactools image processing software via an API," says Marvin Krebs. However, the performance of the solution is almost unique. The entire inspection process takes place in a cycle time of four seconds, with almost 100% picking efficiency. The image analysis of live images from eight cameras via a DLL (Dynamic Link Library) requires enormous computing power. "We work with DENKnet for a good reason. The performance is not comparable with that of other providers, it is truly excellent," emphasises Marvin Krebs. "Using artificial intelligence in the most diverse variants on this scale has never been done before." Further variations are currently being tested, for example, to further simplify hole detection. Outlook The extremely varied surfaces and geometries as well as intolerances in the thousandths of a millimetre range make the visual inspection of indexable inserts a supreme discipline that can be transferred to many other demanding applications. The self-explanatory training environment DENKnet serves as an incomparably simple and at the same time high-performance tool, because it can be operated without programming knowledge and enables the automated training of AI with just a few clicks. A wide range of Vision AI technologies are available for this purpose. "This solution can be customised to any use case and there are no limits - no matter how many “classes”, which camera technology, how large or small the images or even how mixed the data sets are in terms of resolution and type, for example," adds Daniel Routschka, Sales Manager Artificial Intelligence from IDS. "Over 95 percent of our measuring and testing systems have at least one AI object class integrated. The potential areas of application are getting bigger and bigger for us, the market is growing," confirms Marvin Krebs. Promising prospects for this exemplary automated AI training for the highest demands.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, and Stonemont Security Solutions, a pioneering provider of security systems and services, congratulated Iowa, Kansas and Missouri state legislatures for passing landmark school safety and security funding bills in recent weeks. The companies have partnered to help schools evaluate and improve their overall security approach, with white-glove services tailored to their specific needs and expert integration of ZeroEyes’ pioneering AI gun detection software. AI gun detection solution The companies will assist schools in utilising their awarded grant funding to conduct security ZeroEyes offers the most comprehensive AI gun detection solution on the market, and Stonemont Security brings extensive expertise in serving Midwest clients, with its office location in Kansas City and close contacts with local police departments and school administration in Iowa, Missouri, and Kansas. Together, the companies will assist schools in utilising their awarded grant funding to conduct security and threat assessments and deploy ZeroEyes’ technology to identify visible, illegally brandished guns on school property. 24/7 recording and access control systems “Our threat assessments help ensure that school funds are allocated toward security solutions that matter,” said Thaddeus Debolt, President of Stonemont Security Solutions. “ZeroEyes’ solution enables customers to pivot from a reactive security approach to proactive. We are proud to include ZeroEyes in our security offerings and use our connections in the region to help schools add this life-saving technology to their multi-layered security plans.” Stonemont Security provides comprehensive security services and solutions. From initial consultation to routine maintenance, Stonemont Security creates a safe and secure environment for schools, hospitals, banks, commercial buildings and more. The company also offers adaptive camera systems with 24/7 recording and access control systems that are fully customisable to fit any entry method and number of doors. Dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational grasp software layers onto living digital security ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school staff as quickly as three to five seconds from detection. "Stonemont Security takes a white-glove approach to everything that they do, and together, we are powerful force multipliers," said Mike Lahiff, CEO and co-founder of ZeroEyes. "With the new state grants, we are excited to help Midwestern schools enhance their security measures and protect their communities from senseless violence." Mobile weapon detection system ZeroEyes and Stonemont Security are currently collaborating on a mobile weapon detection system, TACFIN (Tactical Firearm Identification Network), which will deploy ZeroEyes’ technology on mobile cameras at any event or venue, such as a festival or concert. The companies will pilot the technology at the FBINAA National Annual Training Conference in Kansas on July 20-22, 2024.
In the rich tapestry of Chigwell School's heritage, dating back to its founding year in 1629, 2013 marked a vibrant thread with the unveiling of a gleaming new pre-Prep School. Fast forward to now, and the campus expands further with its largest project to date, a state-of-the-art Sport and Wellness Centre. Alongside these updates, the school recognised the need for increased security around the Drama Centre. Situated in leafy Essex, Chigwell School, renowned for its nurturing environment, commitment to lifelong learning, and extensive 100-acre site, wished to enhance its site security without disrupting the daily school activities. After careful planning and collaboration with a trusted contractor, a phased approach was taken. Initial installations of timber Playtime® fencing and gates were completed in October 2022. A great performance Jacksons Fencing has installed its EuroGuard® Regular fencing and Flatform gates Jacksons Fencing has installed its EuroGuard® Regular fencing and EuroGuard® Flatform gates. Made from high-quality steel and galvanised to prevent rust and wear, these durable barriers provide long-lasting protection. The EuroGuard Regular fencing provides an unparalleled level of security while integrating with the school’s Drama Centre's traditional and modern styles. Guarding creativity The EuroGuard Flatform single and double leaf gates, featuring twin wire construction and a sleek black polyester powder coating, offer secure pedestrian and vehicular access, ensuring the safety and convenience of students, staff, and visitors alike. Installation of new fencing and dedicated entrances not only protects the pupils during school hours The mesh fencing system, with its tamper-proof clips and fixings, forms an impenetrable barrier while providing visibility through to the entrance, ensuring security and surveillance. These gates serve as a testament to Chigwell School’s unwavering commitment to creating a safe and welcoming environment for all. Moreover, the installation of new fencing and dedicated entrances not only protects the pupils during school hours, but also addresses the need for security during use of the Drama Centre outside of school hours and for after-hours events in the Sport and Wellness Centre. Scene change With a steadfast dedication to sustainability and quality, Jacksons Fencing’s EuroGuard fencing and gates come with the assurance of a 25-year guarantee, reflecting the school's focus on sustainability and quality. These security solutions also support the school’s goal of making positive changes by using high-quality, sustainable products. Commenting on the project, Peter Jackson, Managing Director of Jacksons Fencing, said: "The meticulous planning and implementation of these security fencing and gates, in collaboration with our trusted contractor has helped set up security solutions that meet Chigwell School’s current and future needs.” He continues: “This project is about creating a place where everyone feels welcome and secure. By investing in high-quality, sustainable products, the school not only enhances security but also aligns with its values of environmental stewardship and lifelong learning.”
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![5 ways to strengthen physical security with an integrated system](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1660648693.jpg)
5 ways to strengthen physical security with an integrated system
Download![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Empowering cameras with AI](https://www.sourcesecurity.com/img/white-papers/612/azeena.gif)
Empowering cameras with AI
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![Choosing the right storage technology for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/security-storage-data-920.jpg)
Choosing the right storage technology for video surveillance
Download![Video surveillance as a service: Why are video management systems migrating to the Cloud?](https://www.sourcesecurity.com/img/white-papers/612/vsaas-920.jpg)
Video surveillance as a service: Why are video management systems migrating to the Cloud?
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![How security systems ensure healthy workplaces during COVID and after](https://www.sourcesecurity.com/img/white-papers/612/healthy-workplace-920.jpg)
How security systems ensure healthy workplaces during COVID and after
Download![Best practices guide: analogue video to cloud](https://www.sourcesecurity.com/img/white-papers/612/eagle-eye-networks-920.jpg)
Best practices guide: analogue video to cloud
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Making sense of today’s security camera options](https://www.sourcesecurity.com/img/white-papers/612/vicon-todays-security-camera-option-920.jpg)
Making sense of today’s security camera options
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Covert cameras: Manufacturers & Suppliers
- Hikvision Covert cameras
- Dahua Technology Covert cameras
- Hanwha Vision Covert cameras
- LILIN Covert cameras
- Axis Communications Covert cameras
- Avigilon Covert cameras
- Illustra Covert cameras
- MOBOTIX Covert cameras
- Verkada Covert cameras
- Speco Technologies Covert cameras
- Honeywell Security Covert cameras
- AV Costar Covert cameras
- Milestone Covert cameras
- Videotec Covert cameras
- exacqVision Covert cameras
- DNAKE Covert cameras