Covert Surveillance
There are many ways to get to VISION – but when it comes to industrial cameras, there is no way around IDS 20 years ago, at VISION 2004, the company introduced the first industrial camera with a USB interface before anyone else. 3D camera Since then, IDS has firmly established itself as the market pioneer in this field. With innovations in the 2D, 3D, and AI sectors, the industrial camera manufacturer is also making waves in the image processing market at VISION 2024. Moreover, ID...
Axis Communications, a pioneer in network video, has announced the launch of a powerful bullet camera that delivers superior image quality and excellent forensic value. This all-in-one, outdoor-ready camera features a custom-made, tele lens ideal for long-distance surveillance to deliver extremely high pixel density even in low-light conditions. With many possible applications from smart cities and airport perimeters to stadiums and transport hubs, this powerful camera is ready out-of-the-box....
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimeters, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology offers benefits such as scalability, cost-efficiency, and centralised managem...
IDIS Americas, a new IDIS business unit formed from the recent merger of IDIS America and Costar Technologies, announces the launch of its new I-Mobile System, ushering in a new era of advanced transit video surveillance. The new solution delivers high-performance 4K video resolution, ease of scalability and a highly intuitive user interface, providing high-performance mobile security to businesses that operate transit and fleet companies. Innovative I-Mobile System "Our innovative I-Mo...
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimetres, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology Cloud technology offers benefits such as scalability, cost-efficien...
Radiofrequency (RF) technology specialists SPX Communication Technologies launches the BLACKTALON Ecosystem, a new Counter-Unmanned Aerial System (C-UAS) capability based on the operationally proven BLACKTALON solution. BLACKTALON Ecosystem The BLACKTALON Ecosystem integrates SPX Communication Technologies’ BLACKTALON C-UAS technology and decades of expertise in the space with a vendor-agnostic framework. This approach ensures solutions can meet every customer’s unique requirements...
News
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its systems and services are deployed and maintained to the highest available level of cybersecurity protections and protocols. As major news stories continue to proliferate about hacks, breaches and vulnerabilities — including the high-profile cyberattacks this past week that crippled CDK Global, which provides management software for thousands of auto dealers — Elite stands apart as an industry pioneer not only in its crime prevention solution but also its network security. Remote guarding solution Elite remote guarding solution is unaffected and continuing to prevent crime on their properties Among the more than a dozen commercial vertical markets served by Elite, auto dealerships are one of the largest. This gave the company a direct window into how the recent cyberattacks profoundly impacted those customers’ operations. Especially during such trying times, those businesses take solace and gain some peace of mind knowing that, regardless of whatever disruption such a breach may cause them, their Elite remote guarding solution is unaffected and continuing to prevent crime on their properties. That is among the reasons Elite boasts an industry-pioneering 99% customer retention rate. Highest standard of cybersecurity “Whereas the physical security industry has been slow to adopt cybersecurity hardening and best hygiene practices as their devices transitioned to IP connectivity and moved onto networks, Elite has factored it into its solution since the very beginning,” says CTO Jonathan Kozak. Elite keeps loops closed to would-be hackers by providing end-to-end solutions that include thoroughly analysing sites, forensically designing video-based detection systems, running them through 30-day calibration periods, implementing the highest standard of cybersecurity, and continuous monitoring of camera and network health. Those elements are foundational to real-time crime prevention that incorporates other key ingredients like advanced AI-enabled noise reduction to never miss an event, swift response and voice-downs from former military and law enforcement command centre agents, and priority police response when necessary. Elite’s surveillance networks Elite’s surveillance networks are fully freed and pre-isolated from those of its clients Elite’s surveillance networks are completely independent and pre-isolated from those of its customers, some of whom have experienced firsthand how their remote guarding service has been uninterrupted during enterprise network outages. In addition to using the utmost cybersecurity industry standards, Elite delivers a highly secure, remote access platform, and follows best practices in all implementations. More specifically, Elite’s Beyond Trust (formerly Bomgar) platform protects identities, fortifies any breach points, and delivers dynamic access to empower and secure a work-from-anywhere world. Elite solution “We understand that any device or system riding on or accessible through a network is a potential vulnerability, so we take every possible step to make it as difficult as possible — even against a nation-state-sponsored advanced persistent threat,” adds Kozak. “We want our customers to rest easy knowing their Elite solution will never be used as a backdoor to their network or otherwise compromised, so long as they’ve opted for our patent-pending, recommended solution.”
Hanwha Vision, the global vision solution provider, has unveiled its new high-performance bi-spectrum radiometric thermal AI cameras, which are ideal for use in perimeter protection, traffic monitoring, manufacturing, industrial facilities, data centres, solar farms, and more. TNM-C3620TDR/C3622TDR cameras The TNM-C3620TDR/C3622TDR cameras serve as compact indoor models and feature QVGA resolution on the thermal lens and 2MP on the visible sensor, while the TNM-C4940TDR/C4942TDR outdoor models combine advanced VGA thermal and 4K video. The range is designed to deliver clear images in all lighting scenarios, with AI-powered analytics for accurate object detection, and temperature monitoring between -20°C and 130°C. AI for greater accuracy With the outdoor models supporting AI on thermal and visible sensors, they can detect objects in difficult lighting With the outdoor models supporting AI on thermal and visible sensors, they can not only detect objects in difficult lighting conditions, such as complete darkness, fog, or rain, but also alert operators to potential intrusion, loitering, or other suspicious behaviours. Meanwhile, the compact indoor models feature AI on the visible channel. Operational efficiency By ensuring a high degree of accuracy across the range, false alarms triggered by irrelevant motion, for example, wildlife or shadows, are significantly reduced, improving operational efficiency and meaning operators focus only on genuine events. Intelligent video analytics also include enter/exit monitoring and virtual line-crossing detection. Precise temperature monitoring The bi-spectrum radiometric thermal AI cameras offer precise temperature measurements between -20°C and 130°C, making them ideal for industrial applications. By providing critical data on temperature changes, the cameras can alert operators to potential issues such as overheating parts or equipment failure, minimising downtime, enabling proactive maintenance, and enhancing operational efficiency and safety. Operators can toggle between eight colour palettes on the thermal channel, to easily review any temperature changes and enhance the visibility of a scene. Perimeter protection and traffic management The cameras can also be used for traffic monitoring, alerting to stopped traffic that may signal a road accident In particular, the outdoor models are well suited to perimeter protection and can alert operators to potential boundary breaches. The thermal lens can identify potential perimeter breaches across sites by detecting body heat signatures, while the visual lens identifies and classifies objects. The cameras can also be used for traffic monitoring, alerting to stopped traffic that may signal a road accident or congestion. The cameras enable a high degree of accuracy and fewer false alarms. Flexible options The TNM-C3622TDR (indoor model) and TNM-C4942TDR (outdoor model) operate at 8fps on the thermal sensor and therefore are excluded from the Wassenaar Arrangement, an export control regime that governs sensitive goods including cameras with frame rates over 9fps. This makes exporting and importing them simpler and, as such, results in shorter lead times.
Matrix, a trailblazer in advanced security and telecom solutions, successfully participated in the Police Expo 2024, held on July 4th and 5th at Pragati Maidan, New Delhi. This esteemed event provided a platform for Matrix to unveil its latest innovations in IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions to a diverse audience of industry professionals and stakeholders. Advanced security solutions During the Police Expo 2024, Matrix showcased a comprehensive range of security solutions tailored to meet the evolving demands of modern enterprises. Attendees had the opportunity to explore Matrix's newest addition, the Ruggedised IP Camera. Conforming to EN50155 standards, this camera is designed for challenging environments such as roadways and railways, offering exceptional video quality, superior low-light performance, and the ability to capture images of fast-moving vehicles. Bullet and dome cameras Complementing the cameras were Matrix's Network Video Recorders and Enterprise-grade NVRs Additionally, Matrix presented its Project Series and Professional Series Bullet and Dome Cameras. These cameras, renowned for their robust cybersecurity features, adhere to OWASP ASVS 4.0 L2 standards and are verified by STQC, Delhi. Complementing the cameras were Matrix's Network Video Recorders and Enterprise-grade NVRs, integrated with a Video Management System (VMS) for comprehensive video surveillance management. Integrated access control and time-attendance solutions Matrix’s participation also highlighted its innovative Access Control and Time-Attendance solutions. Designed to offer a unified approach to physical access management and accurate workforce monitoring, these solutions include GDPR-compliant systems with the latest feature of WhatsApp integration for real-time alerts and notifications. COSEC ARGO FACE200T A standout product at the expo was the COSEC ARGO FACE200T, a state-of-the-art facial recognition time-attendance terminal. Known for its high accuracy, rapid identification, and extensive user capacity, this terminal supports seamless connectivity options, including Power over Ethernet (PoE) and Ethernet, making it an ideal choice for efficient workforce management. Telecom solutions The exhibit featured IP-PBX systems, Unified Communication servers, and VoIP gateway Matrix, with its extensive expertise in the telecom sector, presented its advanced Telecom Solutions aimed at enhancing business communications and operational efficiency. The exhibit featured IP-PBX systems, Unified Communication servers, and VoIP gateways, all designed to support scalability and deliver reliable communication infrastructure critical for modern enterprises. Strengthening market presence in New Delhi Matrix continues to strengthen its market presence in New Delhi and surrounding regions. The Police Expo 2024 was a strategic opportunity for Matrix to engage with key stakeholders, showcase its comprehensive suite of solutions, and reinforce its commitment to deliver high-quality, dependable, and scalable products. This engagement aligns with Matrix's goal to expand its customer base in this dynamic region. Efficiency and effectiveness Kaushal Kadakia, Head of Marketing at Matrix, expressed his enthusiasm, saying, “We were thrilled to demonstrate the capabilities and applications of our latest products to key personnel in the police forces." "We aimed to highlight how our solutions can significantly enhance the efficiency and effectiveness of law enforcement agencies.”
Sensor specialist HENSOLDT is providing massive support for the German ‘European Sky Shield Initiative’ ESSI: As part of an order from Diehl Defence worth more than 100 million euros, HENSOLDT is supplying its high-performance TRML-4D radars, including a maintenance and training package, to Latvia and Slovenia. The radars will be deployed in the two ESSI countries as part of the IRIS-T SLM air defence system. This means that HENSOLDT currently has more than 80 air defence radars of various ranges under contract as part of the ESSI initiative alone. Latest AESA radar technology HENSOLDT CEO Oliver Dörre said: "The pent-up demand in European air defence is enormous. We have already made so much progress with the expansion of our production capacity that we can already supply all customers in record time." TRML-4D has delivered excellent detection skit in Ukraine and prevailed against strong competition The TRML-4D has delivered exceptionally good detection performance in Ukraine and prevailed against strong competition during live tests in Latvia. It is based on the latest AESA (Active Electronically Scanned Array) radar technology and ensures the rapid detection and tracking of around 1,500 targets within a radius of up to 250 kilometres. It is capable of quickly and reliably detecting and tracking all types of air targets - cruise missiles, rockets, drones and aircraft - and classifying them for engagement. Development of key technologies HENSOLDT has decades of experience with radar systems for air defence and is actively driving the further development of key technologies in this field. In addition to the TRML-4D high-performance radar, the company's portfolio includes the SPEXER short-range radar, the Twinvis passive radar and radars for securing ship and air traffic. Both the TRML-4D and the SPEXER are part of the German Armed Forces' NNbS air defence system for close and short-range protection, which was commissioned in January. HENSOLDT also supplies radars for the German Navy's new frigates and corvettes, for airspace surveillance and for approach control at military airfields.
Innodisk, a pioneering global AI solution provider, has officially inaugurated Phase II of its R&D and production centre in Yilan, Taiwan. In response to the massive market demand driven by the edge AI wave, Innodisk has transformed the manufacturing plant into the group's AI core base. With the increased production capacity, Innodisk is ready to collaborate with global clients to deploy edge AI solutions. At the same time, Innodisk is also inviting global tech talent to join its teams around the world. Innodisk's innovative development Gearing Up Production to Drive AI Business Growth The year 2024 marks a period of innovative energy for Innodisk, with the simultaneous launch of new products and technologies. The latest manufacturing plant will begin production on various edge AI products, focusing on three core technologies: "AI Acceleration,” “Vision-Driven,” and “Custom Integration.” For "AI Acceleration," Innodisk's subsidiary Aetina recently launched the NVIDIA MGX Server, the group's first edge AI server. Innodisk also introduced industrial-grade CXL 2.0 memory and E1.S/E3.S edge server SSDs for AI and high-speed edge computing. "Custom Integration" displays group's core spirit of small-volume, diverse, and highly customised keys "Vision-Driven" showcases Innodisk's innovative development in edge AI machine vision, including the pioneering MIPI over Type-C extension patent technology for embedded cameras. "Custom Integration" embodies the group's core spirit of small-volume, diverse, and highly customised solutions. With the accelerated development of global edge AI and the increased production capacity of the manufacturing plant, Innodisk expects to speed up the realisation of innovative technologies and enable the effective deployment of products and AI solutions in practical scenarios. Demonstrating edge AI solutions in practice Innodisk set an AOI AI secondary inspection key for smart manufacturing to enhance production While promoting smart transformation for clients, Innodisk is also implementing these practices by transforming its production centre into a model for smart manufacturing and management. Collaborating with Aetina, NVIDIA, and through the Metropolis for Factories framework, Innodisk developed an AOI AI secondary inspection solution for smart manufacturing to enhance production line efficiency. Additionally, Innodisk's subsidiary Millitronic, in collaboration with Schneider Electric and ASPEED Technology, developed a panoramic smart visualisation remote management solution for the plant's data centre. This solution transforms traditional on-site inspections into real-time remote management, displaying data and enabling remote monitoring. Furthermore, the iCAP Air solution, announced this year, will connect multiple sensors to measure temperature, CO2, and other air indicators, providing real-time alerts for abnormal values and facilitating prompt facility management. This comprehensive application will ensure employee health and product quality. Creating a base for training AI talent With the inauguration of the Phase II manufacturing plant, Innodisk is focusing on recruiting AI-related talent. The company, which has locations in the USA, Europe, Japan, China, and more, invites global tech professionals to join its team. This expansion supports Innodisk's goal of promoting innovation and advancing edge AI solutions worldwide.
Aqua Security, the pioneer in cloud-native security revealed new research that shows how credentials, API tokens, and passkeys – collectively referred to as secrets – from organisations around the globe were exposed for years. By scanning the most popular 100 organisations on Github, which collectively includes more than 50,000 publicly accessible repositories, Aqua researchers found active secrets from open-source organisations and enterprises such as Cisco and Mozilla providing access to sensitive data and software. The exposed secrets could lead to significant financial losses, reputational damage, and legal consequences. Secrets in GitHub repositories Aqua Security’s research team, Aqua Nautilus, revealed that “phantom secrets” can persist in Git-based infrastructure used by most Source Code Management systems (SCMs), including GitHub, Gitlab, Bitbucket, and others. This is due to how even deleted or updated code commits are saved in those systems, such that even a one-time developer mistake can expose secrets to savvy threat actors over extended periods. Impact of a data leak "Our findings are truly alarming, and everyone involved in software development must grasp the seriousness of this issue," says Yakir Kadkoda, Aqua Nautilus Lead Security Researcher. “For years, we’ve been educating developers not to hard-code secrets into their code. Now it turns out that even doing this just once permanently exposes that secret – even when they thought it was deleted or overwritten. The impact of a sensitive data leak can lead to unauthorised access, compromised security controls, and significant financial or reputational damage. This would be devastating.” API tokens Among the exposed secrets were API tokens of Cisco Meraki and the Mozilla project Among the exposed secrets found by scanning open Github repositories were API tokens of Cisco Meraki and the Mozilla project. The Cisco security team confirmed the findings, “We discovered privileged Meraki API tokens used by some Fortune 500 companies." "These tokens could allow attackers to access network devices, Simple Network Management Protocol secrets, camera footage, and more, serving as an initial foothold for the exposed parties.” Mozilla project The Mozilla project acknowledged that “An API token for the Mozilla FuzzManager with read-write privileges” and that “an employee’s API token for sql.telemetry.mozilla.org was leaked”; both were assigned a “Critical” score. Not only does the FuzzManager allow access to many potential security vulnerabilities in Firefox and Tor, but the telemetry gives access to confidential information related to Mozilla products and business. Azure service principal token Additionally, Nautilus found an Azure service principal token belonging to a large healthcare company exposed in a Git commit. This token had the high privilege and high access to obtain credentials to the internal Azure Container Registry, which could have led an attacker to perform a supply chain attack impacting the organisation, and customers. In all cases, the exposed secrets were immediately revoked. Commit once, expose forever Most secrets scanners only look at repos accessible via the Git clone command, which overlooks almost 18% of secrets While secure coding best practices already require that secrets should not be hard coded, many developers continue this practice. They rely on secret scanning tools to ensure that such secrets are not pushed into production and often re-commit the updated code without those secrets. Phantom secrets exist because of underlying processes within Git-based SCMs, which cause code that was overwritten or deleted in repositories to remain accessible within the underlying system. Most secrets scanners only look at repos accessible via the Git clone command, which overlooks almost 18% of secrets. Software Supply Chain Security module “The findings once again reinforce the best practice that secrets should never be put into code, not even for testing purposes, and security teams must be able to monitor this,” says Amir Jerbi, CTO and co-founder of Aqua Security. “The software supply chain is optimised for speed and convenience, but this cannot come at the expense of secure engineering practices.” Available in August, Aqua customers using the Software Supply Chain Security module will be able to prevent developers from committing code with embedded secrets and scan for phantom secrets hidden within their SCM file system.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2024, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
RODE, the acronym for RObotic DEpalletiser, is a pioneering product from AWL in the intralogistics market. The robotic solution can efficiently process packages randomly arranged on a pallet, setting it apart from conventional systems. Need for increased automation According to the German Parcel and Express Logistics Association (Bundesverband Paket und Expresslogistik e. V.), 4.15 billion courier, express, and parcel shipments were sent in Germany alone in 2022. Annual shipment growth to around 4.9 billion is realistic by 2027. Against this backdrop and the generally prevailing shortage of personnel, there is only one solution for shipping and logistics companies to cope with this immense volume of orders: increased automation. RODE The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution. One of the locations where RODE adds value is for DHL eCommerce in Rotterdam. In this machine, two Ensenso 3D cameras from IDS Imaging Development Systems GmbH are implemented to provide the required image data. Application The intelligent robot-supported depalletiser, therefore, automatically destacks any packaged goods such as cartons, bags, or containers from pallets and thus ensures their continuous processing - without delays or downtime. Even "extra shifts" at peak times can be implemented at any time, e.g., to cope with the increased workload during Christmas. This frees up staff for more qualified tasks, such as the subsequent processing of consignments or handling customer inquiries. At the same time, it relieves employees of physically and ergonomically demanding tasks and reduces the risk of injury. Up to 800 packages in continuous operation The particular difficulty here lies in the robot's picking of parcels of different sizes and weights At DHL eCommerce in Rotterdam, RODE processes up to 800 parcels per hour with a maximum weight of 31.5 kg each and places them on the corresponding sorting belt. The particular difficulty here lies in the robot's picking of parcels of different sizes and weights. It must independently recognise the position of the objects in three-dimensional space and decide which package to pick next. It then has to determine the best gripping position and avoid collision with other parcels or the machine. Ensenso X36 3D cameras "This intelligent robotic solution integrates AI image processing and high-tech gripper technology," explains Sander Lensen, R&D Manager at AWL. "The system recognises products and can flip the items to ensure that the required long side is leading." Two Ensenso X36 3D cameras provide the necessary image data. Integrated image processing system They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm and a maximum height of 2400 mm. The integrated image processing system processes this further and enables the depalletiser to identify each package and determine the corresponding gripping position for robust robot-assisted picking. 3D cameras for future-oriented robotics Each Ensenso X36 3D camera system consists of a projector unit and two GigE cameras with either 1.6 MP or 5 MP CMOS sensors. AWL has opted for the 5 MP variant for its solution. Mounting and adjustment brackets, three lenses as well as sync and patch cables for connecting the cameras to the projector unit are also included in the scope of delivery. The integrated FlexView2 technology ensures an even better spatial resolution as well as a very high robustness of the system with dark or reflective surfaces. Easy to set up It is also easy to integrate into its working environment and aims to give its users a competitive edge The 3D systems are delivered assembled and pre-calibrated. However, focussing and calibration are also easy to set up using the setup wizard integrated into the software. The latter they have in common with the RODE depalletiser - it is also easy to integrate into its working environment and aims to give its users a competitive edge in the world of logistics automation. Outlook "The intralogistics market is a growth market. The number of robot solutions required will increase rapidly in the coming years." "The type of products that need to be recognised will change constantly. This will be a challenge for all components and the demands on the camera," explains Sander Lensen. Camera technology with artificial intelligence However, image processing is also developing rapidly. Smart solutions that combine camera technology with artificial intelligence are on the rise. They hold great potential for tackling both increasingly demanding tasks and the worsening shortage of skilled workers. Carton by carton, parcel by parcel, pallet by pallet.
A mix of Hubble Panoramic and PTZ cameras from Dahua Technology have been installed at Tripoli Stadium in Libya to help it meet modern international standards. Built in 1970, it is the largest Olympic stadium in the country and has been renovated and refurbished to meet FIFA’s requirements for stadium safety and security. Challenges With a capacity of 50,000 spectators, the stadium becomes crowded on match days and control of spectators and crowds becomes paramount. With only a limited number of police, security and stadium staff to rely on, stadium managers needed to have an overview of crowd flows and potential congestion to help ensure safety at these busy times. In addition, the stadium needed to stream images of match action to large screens strategically located inside and outside the stadium for fan interaction, as well as provide screens for advertising. Solution Cameras contain wise roles such as face recognition, perimeter protection and people-counting A mixture of eight Hubble panoramic and more than 180 WizMind 5 series cameras have been installed at the stadium to improve the situational awareness for stadium managers and the security team. The Hubble cameras are situated high up in the stadium to provide a panoramic overview, while being able to track specific incidents. They consist of an array of fixed cameras providing 180o, 270o or 360o coverage, together with an integrated dome camera to zoom into a particular scene and track specific objects. With Ultra HD resolution of up to 24MP, Hubble also features crowd number and density detection, vehicle-counting and density monitoring and augmented reality mapping. Dahua’s DSS video management software The cameras are available in dust-proof, waterproof and vandal-proof versions Also installed are more than 180 WizMind 5 series cameras. Featuring Starlight and deep learning algorithms, the cameras incorporate intelligent functions such as face recognition, perimeter protection and people-counting, which all greatly improve the accuracy of video analysis. The cameras are available in dust-proof, waterproof and vandal-proof versions. Intelligent recognition plays a big part in the security of the stadium, with cameras being able to identify and subsequently track any blocklisted suspects. This feature is also used at the entrance of the stadium to validate authorised ticket holders. Also installed are giant 15m x 9m LED screens to provide images of play on the pitch, as well as advertising coverage. All equipment is managed by Dahua’s DSS video management software located in the central control room. Results The installation of the Dahua equipment has provided stadium staff and security personnel with a high degree of situational awareness at the venue. They are now able to control access to the stadium through face recognition, anticipate overcrowding and potential congestion points with automatic heat mapping from camera images and track suspicious people or potential incidents. The cameras also provide a high degree of perimeter protection to detect and track abnormal intrusion.
Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced its selection by the Fort Worth Independent School District (FWISD) in bolstering safety measures for graduation ceremonies and extracurricular events. Serving nearly 75,000 students across 140 schools, FWISD conducted a meticulous internal assessment of various technologies, ultimately selecting Metrasens as the preferred solution. FWISD deployed six Metrasens Ultra systems during its 2024 graduation ceremonies. The deployments strengthened safety protocols while synergizing with existing security measures, underscoring the district's unwavering commitment to safety as evidenced by its comprehensive security and safety policies. Fort Worth ISD graduations "We are confident in our choice of Metrasens Ultra to elevate our extracurricular safety efforts," said Daniel Garcia, Safety & Security Executive Director at Fort Worth ISD. "With regards to Fort Worth ISD graduations and other ceremonies, it's paramount that students, faculty, and visiting families feel assured and confident as they come together to commemorate these special occasions." "As we open our facilities to families, it's essential to offer reassurance that Metrasens Ultra systems provide a completely safe solution for all members of our school community." Metrasens Ultra systems The passive nature of Metrasens Ultra systems adds an additional layer of safety for all Metrasens Ultra, renowned for its cutting-edge sensor technology, swiftly and accurately pinpointing potential threats such as concealed weapons, all without emitting any harmful radiation. Its versatility enables effortless transition between indoor and outdoor settings, while its portability ensures convenient setup and relocation between facilities, without necessitating physical contact. The passive nature of Metrasens Ultra systems adds an additional layer of safety for all, including individuals with medical implants or expectant mothers. Moreover, the systems' sleek design and portability seamlessly align with the steadfast commitment to ensuring the safety of all attendees. Advanced detection technology "We are honoured to have been chosen by Fort Worth ISD to implement our advanced detection technology at their extracurricular events," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. "The district's dedication to safety aligns perfectly with our mission to provide innovative solutions that meet the diverse security needs of our customers."
Corsight AI is proud to announce its involvement in a groundbreaking security project at the 14th Battalion in Osasco, a neighboring city within the metropolitan area of São Paulo. The initiative marks a significant step forward in leveraging advanced technology to enhance public safety. Comprehensive security solution Captain David, a key sponsor and advocate for this initiative, has been instrumental in integrating Segdboa's comprehensive security solution at the battalion. The solution features Corsight AI's cutting-edge Facial Intelligence platform, Digifort's Video Management System (VMS) and License Plate Recognition (LPR), IP Extreme's video analytics for gun detection, smoke detection, fall detection, and fight detection, as well as Dahua's cameras, video walls, and touch screen TVs positioned throughout the battalion. Faster response times "This project is a significant milestone in our efforts to enhance public safety in Osasco and beyond," said Captain David, coordinator of activities at the 14th Battalion. "With the advanced technology provided by Segdboa and Corsight AI, we can respond more quickly and effectively to potential threats." Real-time monitoring Segdboa also installs surveillance poles with cameras in front of critical private and public venues This initiative is part of a Public-Private Partnership (PPP) spearheaded by Segdboa, which donates fully-equipped monitoring rooms to each battalion, outfitted with the latest security technology. These rooms enable real-time monitoring and rapid response to potential threats. Segdboa also installs surveillance poles with cameras in front of critical private and public venues such as shopping centres, condominiums, bridges, and parks. These cameras detect suspects and alert the Military Police forces within the battalion’s jurisdiction, ensuring swift action and increased public safety. Accuracy in public safety "We are proud to support this initiative and bring our cutting-edge technology to the forefront of public safety efforts," said Roberto Rocha, CEO of Segdboa. "Our goal is to create a safer environment for everyone by integrating the best technology available with the dedicated efforts of our police forces. We chose Corsight AI's technology for its proven accuracy in real-world conditions and its unbiased performance across gender and ethnicity." Advanced technology Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city To date, Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city. The project aims to eventually deliver monitoring rooms to each of the 380 battalions of the Military Police of São Paulo state, known as Brazil's powerhouse and often sets the standard for the nation. "We are excited to be part of this innovative project that leverages our Facial Intelligence platform to enhance security and public safety," said Geraldo Sanga, Corsight AI's Brazil Regional Sales Director. "This collaboration demonstrates the power of combining advanced technology with dedicated public service." Efficient law enforcement operations Additionally, Segdboa plans to integrate each battalion's facial recognition database with the national Cortex system from the Ministry of Justice. This national database includes photos of all citizens with legal mandates and records of stolen vehicles, facilitating more efficient law enforcement operations across the state. Corsight AI is committed to supporting this vital initiative and enhancing public safety through innovative facial recognition technology. It looks forward to continuing the collaboration with Segdboa and the Military Police of São Paulo.
Omnilert, a pioneer in active shooter solutions, announced that it has integrated Omnilert Gun Detect with the Hanwha Vision Wisenet WAVE video management software (VMS) to provide a complete solution for gun violence and active shooters that can help save lives in the event a gunman comes onto a customers' facilities. Wisenet WAVE VMS is a software platform for IP video surveillance applications that detects, streams, records, and analyses live video from connected IP cameras and networked video sources. By integrating with Omnilert Gun Detect, the Wisenet WAVE platform now has the ability to rapidly respond to detected weapons in a fraction of a second, and once verified, activate a complete and robust response that could include locking doors, notifying police, sending alerts and providing situational intelligence throughout the entire event. Integration of Omnilert Gun Detect The Gun Detect events can trigger operations within WAVE such as sending notifications The Omnilert Gun Detect integration enables selectable bookmarking and/or event triggering in response to a gun detection within Wisenet WAVE VMS. The Gun Detect events can trigger operations within WAVE such as sending notifications and displaying on the Alarm layout. "The integration of Omnilert Gun Detect with Wisenet Wave VMS will bolster the security we can provide our joint customers to protect against the growing threat of active shooters and gun violence, which is at an all-time high in the U.S.," said Nick Gustavsson, CTO and Co-Founder at Omnilert. "This means that video feeds already being managed in the WAVE platform can now be monitored 24/7 for weapons, allowing for a proactive response before shots are fired." Integration into Wisenet WAVE Omnilert Gun Detect's end-to-end workflow of detection and activation allows for automatic initiation "Omnilert's gun detection platform provides especially strong gun detection analytics as well as one of the most flexible and powerful alerting systems on the market," said Mark Heintzman, Technical Partnership Manager at Hanwha. Omnilert Gun Detect's end-to-end workflow of detection, activation, and notification allows for an automated initiation of an organisation's active shooter response, with 24/7 monitoring and local first responder escalation, integrated notification, and integration into Wisenet WAVE. Omnilert's active shooter solution The integration enables selectable bookmarking and/or event triggering in response to gun detection within Wisenet WAVE. The Gun Detect events can trigger multiple operations within WAVE such as sending notifications and displaying on the Alarm layout. Additionally, Omnilert will automatically configure the camera setup, including IP address, camera name and location, which will help speed the deployment of Omnilert's active shooter solution.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
Cloud implementations enable organisations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in the world. But on-premise video management systems (VMSs) still have a role to play, don’t they? We asked this week’s Expert Panel Roundtable: What is the continuing role of video management systems (VMS), given the growth in Video Surveillance as a Service (VSaaS)?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![5 ways to strengthen physical security with an integrated system](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1660648693.jpg)
5 ways to strengthen physical security with an integrated system
Download![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Empowering cameras with AI](https://www.sourcesecurity.com/img/white-papers/612/azeena.gif)
Empowering cameras with AI
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![Choosing the right storage technology for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/security-storage-data-920.jpg)
Choosing the right storage technology for video surveillance
Download![Video surveillance as a service: Why are video management systems migrating to the Cloud?](https://www.sourcesecurity.com/img/white-papers/612/vsaas-920.jpg)
Video surveillance as a service: Why are video management systems migrating to the Cloud?
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![How security systems ensure healthy workplaces during COVID and after](https://www.sourcesecurity.com/img/white-papers/612/healthy-workplace-920.jpg)
How security systems ensure healthy workplaces during COVID and after
Download![Best practices guide: analogue video to cloud](https://www.sourcesecurity.com/img/white-papers/612/eagle-eye-networks-920.jpg)
Best practices guide: analogue video to cloud
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Covert Surveillance: Manufacturers & Suppliers
- Hikvision Covert Surveillance
- Dahua Technology Covert Surveillance
- Hanwha Vision Covert Surveillance
- LILIN Covert Surveillance
- Axis Communications Covert Surveillance
- Avigilon Covert Surveillance
- Illustra Covert Surveillance
- MOBOTIX Covert Surveillance
- Verkada Covert Surveillance
- Speco Technologies Covert Surveillance
- Raytec Covert Surveillance
- Honeywell Security Covert Surveillance
- AV Costar Covert Surveillance
- Videotec Covert Surveillance
- Milestone Covert Surveillance
- DNAKE Covert Surveillance
- exacqVision Covert Surveillance
- Anviz Covert Surveillance
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download