Crowd Management
Elite Interactive Solutions is well known as a remote video guarding pioneer that uses proprietary intelligence and integration to achieve proven crime prevention, but a recent incident underscores how the company also swiftly intervenes when catastrophic or safety issues arise. Recently, Elite Security Operations Command Center (SOCC) operators took fast action after observing an unconscious individual at a client’s site. Fast action with SOCC Operators executed a voice-down and...
The PSIA had another impressive and compelling demonstration of its PKOC spec at GSX 2024. Some of the major lock and physical access control (PACS) vendors were able to see PKOC in action, with commercially available readers, cards, and apps all relying on the open specification, showing seamless interoperability. PKOC product lines “It was gratifying to see all of the hard work of the PKOC technical committee come together at the demonstration at GSX 2024,” said David Bunz...
As the anticipation builds for the 2024 Paris Olympics, security concerns are heightened. While this long-awaited event will showcase the world’s most accomplished athletes, the safety of all participants and spectators is paramount. Extensive preparations have been underway to achieve this crucial goal. Security challenges The threat landscape in the historical context The security challenges facing the Paris Olympics are underscored by ongoing global conflict, an ever-evolv...
Matrix Comsec, a pioneering manufacturer of Telecom and Security solutions, successfully participated in PACC 2024, held at Grand ITC Royal Bengal from February 22nd to 25th, 2024. During the event, Matrix showcased its comprehensive range of solutions including Access Control, Time-Attendance, IP Video Surveillance, and Telecom at Booth No. 26. The highlight of the event was the unveiling of Matrix's All-Colour Camera, designed to capture coloured images even in low-light or no-light condition...
Herta, a world-pioneering facial analysis company, proudly announces the launch of FUTURE, its groundbreaking project in the realm of security technology, and its emergence from the prestigious recognition of the EU Seal of Excellence. This acknowledgment underscores FUTURE’s commitment to innovation and excellence in revolutionising the landscape of security technology. FUTURE project The FUTURE project, developed within the European Union framework, embodies the pinnacle of technologi...
Arrow Electronics, Inc., a global provider of technology solutions, and its engineering services company, eInfochips, have announced the establishment of a High-Power Centre of Excellence (CoE) in Swindon, United Kingdom. The purpose of this High-Power CoE is to assist customers in the development of high-power solutions, a critical component in advancing electrification and sustainability initiatives. High-power designs play a pivotal role in achieving energy efficiency, making them essential...
News
inter airport Southeast Asia 2023 (IASEA), Asia’s international airport exhibition and conference, concluded on an upbeat note in Singapore. Held from 1-3 March 2023, the event featured a high-level conference and a sold-out exhibition featuring ground support equipment, airport operations & maintenance solutions, airside support services, and many more. A showcase of latest offerings Over the 3-day exhibition, IASEA saw 3,131 trade attendees and 150 exhibitors congregate at the biennial event after a four-year hiatus. Leveraging the gathering of airport decision-makers at IASEA 2023, multiple exhibitors presented their newest products and solutions on the exhibition floor. These included: ITW GSE’s 7400 eGPU, a battery-powered ground power unit that helps reduce carbon footprint. Sanxing’s TowFLEXX TF5 Towbarless remote-control aircraft tug helps reduce damage to aircraft. Cognitec’s FaceVACS-Entry, which provides improved face recognition technology for security, and many more. Strategic partnership To support the growth and development of critical airport infrastructure in the Philippines, including GSE Participating exhibitor, Weihai Guangtai Airport Equipment Co. Ltd., signed a Memorandum of Understanding (MOU) with Macroasia Corporation, a pioneering provider of aviation-related support services in the Philippines. This MoU establishes a long-term strategic partnership between both companies to support the growth and development of critical airport infrastructure in the Philippines, including ground support equipment (GSE). Networking platform Rene van Joost, Cargo & Ground Handling Senior Expert, PMO Aviation Services & Cargo (ASC), Angkasa Pura I – injourney said of the event, “It is a great platform for networking." "For example, while preparing the merger of the subsidiary companies of Angkasa Pura I and Angkasa Pura II, for logistics and catering under one sub-holding, we needed to collaborate with international partners, and through IASEA. I have met a lot of potential partners at IASEA, which I’ll be following up with.” Extensive array of airport-related technology Shows like IASEA are fabulous for meeting old friends in the industry and making new ones" “The experience was good. IASEA 2023 offered an extensive array of airport-related technology that we could explore more in the future and consider how we could use them to enhance our current airport,” said Mohd Hashriq Adzaman Abd Rahman, Senior Engineer - Malaysia Airports. "It’s great to be here. Shows like IASEA are fabulous for meeting old friends in the industry and making new ones,” said Philip Marks, Operations Manager, CU Phosco Lighting. Resounding success "These are vital in providing opportunities for me to meet with customers. They know where we are, and we’ve talked to them before we arrived. We come to IASEA and we meet up. We cannot wait to be back in 2025.” Yeow Hui Leng, Group Project Director, IASEA said, “We are delighted IASEA 2023 was a resounding success." Positive and encouraging feedback IASEA will set the stage to become the marketplace for deals to be made and the dedicated place to draw connections" "It is heartening to witness the event in full swing and receive positive and encouraging feedback from attendees." "As the aviation industry continues its flight path towards recovery and with APAC expected to account for more than 36% of the major construction projects worldwide at existing airports, IASEA will set the stage to become the definitive marketplace for deals to be made and the dedicated place to draw connections between international solution providers with airports from Asia.” IASEA 2023 Conference- a knowledge exchange platform Over 30 global airport pioneers and influencers at IASEA 2023 shared insights into the future of airports and how Asia Pacific continues to keep up, cementing its position as the must-attend industry conference to understand and navigate opportunities in Asia. Trending conversations discussed at the IASEA 2023 conference were on sustainability and the next major milestone as airports continue to innovate and reinvent their operational models. Asia Pacific’s aviation demand and recovery The conference is very specific to Asia, enabling global airport professionals to understand region-focused challenges" In conjunction with the event, data analyst, Cirium, also presented an exclusive report covering Asia Pacific’s aviation demand and recovery outlook and airport insights with data analytics. “The conference is very specific to Asia, enabling global airport professionals to understand region-focused challenges, traveling behaviours, and regulation issues,” said Anurag Shandilya, Head of Airport Operations, at Noida International Airport. Interactions lead to innovation "Also, Singapore is the most relevant place to hold such conversations for it being so well-connected and as most technology companies are based here." “The key takeaway from the conference is the interaction with industry people, and it is these interactions that will seed the future development innovation.” Speakers at the conference Themed “Re-Conditioning for Asia's Long-Haul Growth”, the conference was headlined by prominent speakers including: Latchida Apaphant, Executive Vice President (Corporate Strategy), Airports of Thailand PLC Anurag Shandilya, Head of Airport Operations, Noida International Airport Michael Portier, Deputy Director Aviation, Surbana Jurong Private Limited Ng Kuan Luen - Director, Ventures, Changi Airports International Tan Lye Teck, Executive Vice President, Safety & Security, Changi Airport Group Mohd Nadziruddin Mohd Basri, Chief Executive Officer, Aviation Services (AVS), Malaysia Airlines Ali Mushthaq, Deputy Chief Officer, Passenger Services, Maldives Airports Company Limited Rafael S. Regular, Assistant GM for Operations (concurrent) Manager, Airport Operations Department, Manila International Airport Authority Eleuterio A. Torrecampo, Officer-In-Charge, Office of the Terminal Manager, Ninoy Aquino International Airport Terminal 1 Rene van Joost, Cargo & Ground Handling Senior Expert, PMO Aviation Services & Cargo (ASC), Angkasa Pura I – injourney Dwi Ananda Wicaksana, Executive General Manager, Soekarno Hatta International Airport Tan Yen Ling, Head, Sustainability and Strategic Projects, SATS Ltd Angela Ng, Director, Aviation Industry, Civil Aviation Authority of Singapore Saurabh Dalvi, Head of Operations (Mumbai, Goa, Hyderabad), CelebiNAS Airport Services India Pvt. Ltd Ma Yin, Vice President, Beijing Daxing International Airport of Capital Airports Holdings Limited Company Joseph Sweet, Aviation Business pioneer | Australasia, ARUP Tim Aldeburgh, Technical Director, Project Management Consultancy & Advisory, WSP Sia Kheng Yok, Chief Executive, Association of Aerospace Industries (Singapore) Jean Roche, Head of International Engineering Services, ADP International Pang Yee Huat, Solution Consultant, Cirium Piyush Chawla, Managing Director APAC, Cirium Prabin Bhattarai, UAV Expert, Civil Aviation Authority of Nepal Richard Tan, Regional Manager Operations, Safety and Security, APAC, International Air Transport Association (IATA) Ben Dawson, Principal, Populous Shantanu Gangakhedkar, Consultant, Frost & Sullivan Asia Pacific Brendan Sobie, Independent Analyst and Consultant, Sobie Aviation inter airport Southeast Asia 2025 will return from 25 – 27 March 2025.
Permiso, an identity threat detection and response startup, is offering complimentary, private threat briefings with the P0 Labs team on attacks against the identity provider (IdP) control plane, a common attack vector by multiple threat groups over the last few months. Attacks against identity providers have been responsible for breaching environments in several high-profile attacks over the last months including MGM and Caesars back in September 2023. Identity-first security strategy "An identity-first security strategy is paramount to defending against modern threat actors. P0 Labs is at the forefront of understanding these attacks by making identity a pillar of their research," said Jason Chan, former Head of Security at Netflix. "Identity is as close to a silver bullet as it gets in the cloud. If you get it wrong, you face significant risks and challenges in securing your enterprise effectively." Free briefings The team will also offer strategies for securely configuring the identity layer of a cloud environment The free briefings, conducted by Ian Ahl, SVP of P0 Labs and former Head of Advanced Practices at Mandiant, and his team will demonstrate what typical cloud attacks against the identity provider's control plan look like, and provide hunting tips on what to look for in an environment to develop effective detections. The team will also offer strategies for securely configuring the identity layer of a cloud environment to better defend against common attacks against identity providers like Okta and Entra ID (formerly Azure AD). Centralised authentication “Threat actor groups have been very successful at bypassing identity providers. They strategically target admin-level identities and can compromise credentials and bypass MFA with ease,” said Permiso Co-founder and Co-CEO Paul Nguyen. "The convenience of centralised authentication has proven to be a significant security risk to many organisations because they simply aren't monitoring the control plane of their identity provider." Native security features The P0 Labs team has been researching and responding to attacks against the IdP control plane" "Security teams are starting to realise that the native security features of these IdPs are not nearly enough to secure their identities in the cloud." "The P0 Labs team has been researching and responding to attacks against the IdP control plane for a while now and it's generated more than a hundred detections and signals for our product. As we have in the past, we want to share this with the broader security community." Impersonation technique in Okta In July of 2022, the P0 labs team discovered an impersonation technique in Okta whereby when an Okta Administrator changes their or another’s username assignment to another existing user, an unexpected impersonation event can occur that allows the impersonator to authenticate and assume the permissions of the impersonated user in the target application. Permiso disclosed their findings to Okta and was told that this is expected behaviour for the edit user assignments functionality. Okta breach Back in October 2023, Okta notified its users of a breach in its customer support system Back in October 2023, Okta notified its users of a breach in its customer support system. At the time, the company reported that 1% of their 18,400 customers were impacted by the incident. After further investigation, the company issued another statement recently claiming they had discovered that in fact, all of its customers had data stolen during the breach. Okta isn't the only identity provider that has been impacted by these attacks. JumpCloud and Azure AD In July of 2023, both JumpCloud and Azure AD were the targets of nation-state threat actors. North Korean state-sponsored threat groups breached JumpCloud where the attack reportedly impacted a handful of customers. Threat actors from the Chinese government were able to access email accounts of 25 organisations including the US Department of State and Commerce when Azure AD was breached at the same time earlier in 2023. Identity-related attacks The continued focus on identity-related attacks is also coupled with a 160% increase in attempts Crowdstrike has reported that 80% of breaches used compromised identities, of which 62% of interactive intrusions involve the abuse of valid accounts, with 34% of intrusions specifically involving the use of domain accounts or default accounts. The continued focus on identity-related attacks is also coupled with a 160% increase in attempts to gather secret keys and other credentials. The report also noted a 147% increase in access broker advertisements for credentials for purchase in criminal or underground communities, demonstrating how valued these credentials are to threat actors that leverage them to complete their mission in the shortest amount of time possible. Cloud Detection and Response Survey Report Earlier in 2023, Permiso released their Cloud Detection and Response Survey Report, where they found that more than 80% of respondents expressed confidence that their current team and tools would be able to prevent a threat actor from being able to breach their environment. 95% of the respondents, however, expressed concern with their ability to detect a threat actor if they were able to gain access to their environment. 55% of those expressed their concern as ‘very concerned’ and ‘extremely concerned.’
Are business alarms set to change forever? Nirovision, an Australian trailblazer in AI-powered video analytics thinks so. The company unveiled its latest breakthrough, Safety Agent Alarm, a world-first innovation that allows an AI agent to actively monitor a workplace’s security cameras and promptly alert for security and safety concerns. Safety Agent Alarm With AI analysing footage in real-time, the Safety Agent is smart enough to distinguish between non-events and genuine safety concerns but can also be given custom prompts and extra knowledge such as “Hi-vis vests are mandatory on-site” to ensure adherence to specific safety rules. Unlike traditional business alarms which are limited to basic motion detection, Safety Agent Alarm empowers workplaces to be notified of events that were previously deemed impossible. Examples of alert detection These are just a few examples of the different kinds of alerts Safety Agent Alarm can detect: Alert for someone lying on the ground. Alert for someone on the roof near the edge. Alert if a worker looks injured. Alert for people physically fighting. Alert for a person climbing a fence. Alert for a vehicle load not suitably restrained. Alert for someone who seems trapped eg. in a cool room. AI-based workplace monitoring Nirovision has already seen the impact its AI technology is having on workplaces As a company that develops its own AI models in-house, Nirovision has already seen the impact its technology is having on workplaces. Whether it is automating site access or enforcing compliance, the addition of the Safety Agent Alarm is another exciting AI development that is set to revolutionise workplace monitoring. “We believe AI is poised to redefine incident monitoring so the future is exciting,” says Jimmy Lee, Nirovision’s CEO. Object detection “Today, multimodal large language models are capable of recognising and discerning what it sees and transcribing its observations in great detail. This, in concert with our efficient object detection models, allows workplaces to receive descriptive alerts for previously unseen safety and security events in real-time.” Recognising the distinct safety requirements of every workplace, Lee emphasises, “It was only a matter of time before these large vision models infiltrated the camera monitoring space so we are proud to be pioneers in bringing this to market.”
Hanwha Vision, the global vision solution provider, has announced its preparedness for the upcoming Cyber Resilience Act (CRA) and Network and Information Security Directive 2nd Edition (NIS 2) expected to come into force in 2024. With a longstanding commitment to cybersecurity best practices and global compliance, Hanwha Vision announced its readiness for the upcoming regulations, before them being ratified into European Union law, to better prepare affected firms, and give users peace of mind. EU’s CRA The EU’s CRA is a regulation that sets minimum cybersecurity requirements for products with digital elements. Under this regulation, products including video cameras must be designed and developed with security in mind, protected against known vulnerabilities, and updated regularly with security patches. Product security features Hanwha Vision is following CRA guidelines owing to the comprehensive cybersecurity processes Users must also be provided with detailed information about product security features and how to use them securely. Although the Act is still being deliberated by the European Parliament and Council, Hanwha Vision is already following the guidelines with the CRA owing to the comprehensive cybersecurity processes it has implemented. NIS2 Likewise, NIS2 is a directive adopted by the European Parliament and the Council of the European Union in December 2020. EU member states are expected to comply with NIS2 by October 2024, to meet specific measures aimed at improving the cybersecurity of network and information systems across the EU. As a Digital Service Provider, Hanwha Vision must conduct regular risk assessments to identify and assess any risks to its networks and information systems, implement appropriate security measures to mitigate any risks identified in assessments, and report cybersecurity incidents to national authorities. Security measures and NDAA Hanwha Vision’s products rely on in much sensitive Government, defence, and commercial applications Hanwha Vision has been hardening its security measures for many years, including removing chipsets manufactured in blacklisted countries from its products, and manufacturing in South Korea and Vietnam. These and other measures have contributed to Hanwha Vision’s compliance with the US National Defense Authorization Act (NDAA). As an indicator of responsible design and trusted cybersecurity, the NDAA is also used across Europe, with Hanwha Vision’s products relied on in many sensitive Government, defence, and commercial applications in the region. Wisenet 7 chipset cameras Hanwha Vision is also one of the few video device manufacturers to achieve the UL CAP certification for its Wisenet 7 chipset cameras. The Wisenet 7, Advanced System On Chip (SoC) offers the highest levels of cybersecurity possible with its device certificate issuing system, as well as Root CA, Secure Boot, Secure Storage, Secure OS, Mutual Authentication, App Verification, and more. S-CERT To facilitate a rapid response to possible security vulnerabilities, Hanwha Vision operates a security vulnerability response team (S-CERT). As well as responding to new threats and vulnerabilities, S-CERT carries out regular penetration testing and security checks. Security Vulnerability disclosure policy Hanwha's Vision is to identify, define, and catalogue publicly reported cybersecurity vulnerabilities Hanwha Vision is also committed to disclosing any potential vulnerabilities as per its Security Vulnerability disclosure policy and was recently authorised by the CVE Program as a CVE® Numbering Authority. This allows Hanwha Vision to identify, define, and catalogue publicly reported cybersecurity vulnerabilities for the benefit of users, partners, and the wider information technology and cybersecurity communities. Cybersecurity Pread Um (Suk Bong), Product and Marketing Director at Hanwha Vision Europe said, “Hanwha Vision has always been committed to providing pioneering cyber-secure products as they are critical to protecting our customers as well as consumers." "Putting cybersecurity at the centre of what we do allows us to supply trustworthy security products to demanding and sensitive environments. This gives users peace of mind as cybersecurity regulations such as the CRA and NIS2 come into force.”
11:11 Systems, a managed infrastructure solutions provider, was named an Aspiring provider in the 2023 Gartner Peer Insights™ Voice of the Customer for Disaster Recovery as a Service (DRaaS) report. 11:11 Systems is one of seven companies included. Customers lauded the organisation for its exceptional commitment, noting they are an “outstanding team dedicated to our account, and these specialists are top of their game.” DRaaS solution The dependability and consistent positive outcomes of 11:11 Systems’ offerings earned them widespread acclaim, with reviews highlighting the “very reliable DRaaS solution that has managed to deliver excellent outcomes over the past years.” Clients also praised 11:11 Systems for its expertise and ongoing support, emphasising that “they know their products very well and they continue to provide exceptional support after implementation.” 'Voice of the Customer’ report This acknowledgment reflects our customers' trust in our solutions and the tangible impacts we have" “We believe our inclusion in the ‘Voice of the Customer’ report reaffirms our strategy and commitment to pushing the boundaries in DRaaS innovation while maintaining our customer-first approach,” said Kaushik Ray, chief experience officer at 11:11 Systems. “We believe this acknowledgment reflects our customers' trust in our solutions and the tangible impacts we have made in their businesses. We're not just a vendor but a partner in our clients' accomplishments.” Reliable, end-to-end protection 11:11 Systems' broad DRaaS offerings are designed to protect businesses from unplanned downtime and meet diverse recovery requirements. 11:11’s industry-pioneering solutions provide reliable, end-to-end protection of workloads running on the customer’s premises or in AWS and Azure cloud environments that leverage AWS, Veeam, and Zerto technology. Whether facing cybercrime, natural disasters, hardware failure, or any unplanned incident, 11:11 Systems ensures a speedy and successful recovery, safeguarding businesses' operational continuity. Gartner Peer Insights Gartner Peer Insights is a respected platform that collects and curates unbiased reviews and ratings from IT professionals, offering invaluable insights into various IT software and services. Its comprehensive "Voice of the Customer" report distills real-world client experiences and feedback, playing an instrumental role in aiding purchase decisions across the technology spectrum.
One of the UK’s crowd safety and security specialists has warned of a continued and serious threat to life and public safety at music, sports, and entertainment events by rogue security guards who are fraudulently obtaining security industry association (SIA) security work licences and who are supposed to be safeguarding and protecting the public. Lloyd Major, a former National Counter Terrorism police officer and specialist adviser in crowd safety and security, whose tech company Halo Solutions provides crowd safety and security software Halo (v5) to some of the biggest sporting events across the world, is helping to stamp out rogue SIA training providers who are facilitating an illegal trade in fraudulently obtained SIA licences with the use of his company’s award-winning crowd safety and security software. Rogue SIA training providers Rogue SIA training providers were proactive in “coaching” trainee security guards to actively pass security courses The security and crowd safety expert warned that rogue SIA training providers were proactively “coaching” trainee security guards and door supervisors to actively pass security courses with answers to questions and missing vital training modules in first aid training crucial to saving lives. Despite many of the trainee security guards being unable to speak English, many of those training providers were actively advertising and boasting of 100% pass rates and “no win-no fee’. Protecting public premises It comes at a crucial time as the Government’s Terrorism (Protection of Premises) Bill also known as ‘Martyn’s Law’ was included in the King’s Speech at the State Opening of Parliament as Monarch (7th November ) and will be committed to Government legislation. King Charles III said, “Legislation will be introduced to protect public premises from terrorism in light of the Manchester Arena attack.” Martyn’s Law Martyn’s Law is named in tribute to Martyn Hett, who was killed at the age of 29 alongside 21 other people in the Manchester Arena bombing in 2017. His mother, Figen Murray, has since dedicated her life to helping stop terrorist attacks in the future and has been one of the driving forces behind shaping the Terrorism (Protection Of Premises) legislation. Rise of rogue security guards Fraudulent licences, or genuine licences obtained fraudulently by cutting corners, are putting lives at risk" Lloyd Major, CEO of Halo Solutions, said, “Rogue SIA training providers are sadly in the spotlight again, skipping whole elements of the SIA door supervisor course that are fundamental to the basic abilities of a trained security guard, including the ability to speak English, deliver first aid and de-escalate conflict." "The dangers of this should be apparent to everyone. Fraudulent licences, or genuine licences obtained fraudulently by cutting corners, are putting lives at risk." Inability to respond in emergencies "In the event of a major safety or security incident, security guards must be trained to an SIA industry standard, can call the emergency services, and communicate with the public." "It is inconceivable to allow anyone to become a security guard or door supervisor who cannot speak English or who cannot administer vital ‘first person on the scene’ lifesaving first aid." Inadequate training and accreditation "We only have to look at the tragedy of the Manchester Arena bombing to see what the potential outcomes would look like if these dangerous people with their inadequate training and accreditation for security staff and with their minimal or non-existent operational capabilities inevitably fail to protect the public.” In 2022, 954 licences were suspended, and 1,260 licences were revoked by the SIA. Halo Accreditation Module The Halo Accreditation Module will be extended to SIA-approved security training providers For the last couple of months, Halo Solutions has been working with key clients to build a new Halo Accreditation Module to help tackle this serious issue. This will be extended to SIA-approved security training providers and will be available from next month (December 2023). Halo (v5) crowd safety and security software The Halo (v5) crowd safety and security software will allow security training providers to: Link their BS7858 screening and vetting responsibilities to verify the identity of trainee security guards taking SIA courses. Have the ability to prove the people attending their courses are who they say they are. The ability to include facial recognition and the generating of a unique verified ID and pass for each person. Trainee security guards can be scanned in at the start of each day and scanned out at the end of each day, making sure they attend the course in full. Generate audit trails for training logs for both the approved security guard and the SIA training provider. The Halo accreditation pass will act as their company ID card and support access control at sites and events that the security guard is approved for. Integration with the Halo (v5) crowd safety and security platform operated by event security teams. Security and safety at risk SIA-approved training providers who have some of the very highest professional standards of training" Lloyd Major added, “Thankfully this very serious issue is confined to a small rogue element of training providers who are putting the safety and security of the public at risk." "We work with some fantastic SIA-approved training providers who have some of the very highest professional standards of training and who continually invest in both the training and accreditation of security staff.” Crowd security and safety technology Halo Solutions, a British security technology company which was founded by Lloyd Major, has quickly established itself as one of the crowd security and safety technology companies in the world, with its Halo (v5) incident and threat management software platform. Lloyd’s policing career saw him sit on the National Policing Events Gold Group (NPEGG), the Tactical Training and Equipment Working Group (TTEWG), and as an expert advisor to the National Police Chiefs’ Council (NPCC) for officer safety and public order. He also worked across England in operational planning units, including sitting on Safety Advisory Groups (SAGs) for specialist planning advice for thousands of events, major tournaments, and operations. Public safety and security Halo (v5) acts as a central command-and-control function that operates from a standard laptop, tablet, or smartphone The Halo (v5) software system was designed with public safety and security at its core, to assist with rapid decision-making, and the ability to integrate streams of information and intelligence to enable faster responses and ultimately protect the public and save lives. Halo (v5) acts as a central command-and-control function that operates from a standard laptop, tablet, or smartphone and can bring together more than 10 different systems integrated into one, with more than 75 client-led features. It integrates monitoring and recording of multiple feeds of information across a venue, from security, CCTV, and live drone feeds to health and safety, cleaning, medical, public reporting, video streaming, ticket scanning, and accreditation and in 2024 will include crowd management, crowd density, flow, sentiment, mood and capacity. Event security The company has played a hugely important role in protecting people and keeping them safe at some of the biggest events on the planet, with major events around the world, including the coronation of King Charles III, the Eurovision Song Contest, FIFA World Cup fan zones in Qatar, the Miami F1 Grand Prix, Silverstone’s British Grand Prix, and Moto GP to mention just a handful. It has also protected fans at some of the UK’s biggest entertainment events, from Notting Hill Carnival and Glastonbury to the Edinburgh Military Tattoo. Security applications The crowd and event safety platform has also been deployed at the NEC Exhibition Centre in Birmingham, ExCeL London, Motorpoint Arena Nottingham, and ACC Liverpool to keep millions of visitors safe each year. The Halo (v5) crowd safety platform has also played a major role in protecting the public across major rail transport infrastructure and stations across the UK. Halo (v5) is already being deployed and protecting the public at some of the world’s largest, most prestigious, and high-profile events, including the FIFA World Cup fan zones in Qatar (2022), Cricket World Cup (2019), British Grand Prix, Notting Hill Carnival, Glastonbury Festival and the Miami F1 Grand Prix.
Expert commentary
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Sometimes, retail crimes are strategic and expertly choreographed. Every step is carefully thought out — from the brand to the location to the items that are taken. Shoplifting, a major safety concern Also, the violence that accompanies these events is rising. Shoppers are rightly concerned about their safety while shopping, and the brand reputations of retailers are under threat. Traditional ‘shoplifting’ has two major differences, when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. Rise in organised retail crimes (ORC) ORC groups take in-demand items that they can resell for a profit, either online or at a physical location ORC groups take in-demand items that they can resell for a profit, either online or at a physical location. Also, ORC attacks are not random - they come with a high level of strategic thinking. “Armed with the right tools, retailers can identify ORC patterns that allow them to potentially anticipate and take steps to mitigate future events,” said Craig Szklany, the Vice President and Product General Manager - Loss Prevention & Liability at Sensormatic Solutions. Although ORC was rising before 2020, the COVID-19 pandemic and its impact on people’s lives and livelihoods accelerated the trend. Economy impacts shoplifting The economy also impacts shoplifting. “When consumers have less money to spend, they are more likely to steal necessities,” said Craig Szklany, adding “Keeping food on the table or finding an alternate source of income to pay the mortgage can be powerful motivators, and some individuals turn to retail crime to keep up.” One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring. Craig Szklany continues, “Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts.” Loss prevention systems with artificial intelligence (AI) Some of these systems are equipped with artificial intelligence (AI) that can identify ‘red’ and ‘green’ shoppers (thieves versus well-intentioned customers), as they move throughout the store, so retailers can respond proactively to potential threats. With enough data on these patterns, systems can alert retailers of at-risk locations" “Widespread use of these technologies can also help track ORC groups, as they move around regions or countries,” said Craig Szklany, adding “With enough data on these patterns, systems can alert retailers of at-risk locations.” He continues, “The increased use of scan-and-go and other forms of self-service checkout has made it easier for consumers to steal. Implementation of these systems has been one of the biggest factors in increased shrink for retailers.” Store visibility technology “The purpose of scan-and-go is to provide a seamless shopping experience for consumers, with smoother checkout and to help retailers reduce the need for employees,” stated Craig Szklany, adding “However, with increased theft, retailers need some form of monitoring at these sections.” He continues, “With store visibility technology and AI, retailers can both monitor self-checkout for theft, while also gathering insights that enable them to better identify and predict theft at these checkouts.” Intelligence-led loss prevention technology Craig Szklany adds, “Intelligence-led loss prevention technology provides a huge return on investment (ROI). Traditionally, items that left the store were as good as gone. With RFID and smart-exit technology, that is no longer the case.” These systems allow retailers to quantify theft events and include data on what was stolen and how much it cost. With that information, retailers can take a proactive approach to theft prevention, by providing enhanced evidence packages to law enforcement, which increases the chances of the items being returned to stores. Challenge of shift to the Internet of Things (IoT) The biggest change in retail technology in the last five years is the shift to the Internet of Things (IoT) The biggest change in retail technology in the last five years is the shift to the Internet of Things (IoT) and Store Visibility technology. Stores outfitted with integrated tags, pedestals, and AI-enabled video cameras can be connected holistically, so that retailers have a clearer insight into the thieves’ journeys in real-time. That data helps prevent future theft. These technologies provide a more accurate look into what exactly went missing, when, and where, which allows retailers to respond to shoplifting, in a way that they had not been possible in the past. Modern loss prevention technologies offer flexibility “The great thing about modern loss prevention technologies is that they’re flexible,” stated Craig Szklany, adding “The same system that tracks ORC events can provide insight into energy use, floor optimisation, customer experience, and more.” RFID tags allow retailers to track inventory at the item level, so they are better prepared to make decisions about stocking and promotions. Computer-vision-based AI (artificial intelligence) that identifies ‘red’ and ‘green’ shoppers can also track customer sentiments and demographics, to enable retailers to offer special discounts and enhanced customer service, in order to improve customer experiences and establish loyalty. Benefits of video loss prevention technologies Ahead of busy shopping seasons, many retailers hire extra employees to serve as physical deterrents against theft, but labour shortages may take this practice out of reach this year. Video loss prevention technologies can reinforce retailers’ workforce, allowing them to be proactive against theft without drawing associates from their main goal: helping customers.
Technology is driving new opportunities in the security industry. Innovation trends include artificial intelligence (AI), edge-based systems, mobile systems, a greater focus on software, and efforts to simplify operation of security systems, even as capabilities become more complex. ISC West 2022 reflected these changing trends. “In addition to emphasising technology innovation, ISC West also reflected an industry that is resilient, dedicated and passionate,” said Mary Beth Shaughnessy, the Event Director of ISC Security Events. ISC West 2022 “Almost 12,000 dealers, installers, integrators, end users and consultants reconnected at ISC West 2022, and there were nearly 20,000 total industry professionals in attendance (including manufacturers),” adds Mary Beth Shaughnessy. The 550 exhibitors and brands on display reflected an industry that has come through the COVID-19 pandemic in better shape than ever, poised for even greater success in the years ahead. Turning video and access control into knowledge Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time Motorola Solutions emphasized several themes that were heard repeatedly throughout the show. “One trend is fulfilling the need to turn video and access control into sources of knowledge, inside the enterprise,” said John Kedzierzski, Motorola Solutions’ Senior Vice President of Video Security and Access Control. Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time, while monitoring access control yields the equivalent of an operating system inside a building. Using the Cloud offers consumer ease-of-use to systems The second trend listed by Motorola Solutions is working to bring the consumer ease-of-use experience into enterprise security solution applications. Professional security systems were previously complicated to buy, install, manage and upgrade. However, using the Cloud, even distributed enterprises can bring consumer ease-of-use to systems, from improving the out-of-box installation experience to boosting the ability to manage the system. Transition to ‘mobile first’ interfaces The third trend emphasised by Motorola Solutions is transition to ‘mobile first’ interfaces, reflecting the need for busy security executives to be on-the-go, but with full access to their systems, without being chained to their desks. Since the last springtime ISC West show in 2019, Motorola Solutions has grown rapidly, both organically and through acquisition of IndigoVision, Pelco, Openpath, Envysion, and Ava Security. Cloud-based Orchestrate system Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code In addition, the company is making it easier to integrate video and access control systems with Motorola’s radio systems, typically carried by security guards. The cloud-based Orchestrate system translates ‘events’ from access control and video, to trigger notifications on a mobile radio. Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code. Simplifying implementation of AI Artificial Intelligence (AI) has traditionally been associated with the use of large servers or even intelligence in the Cloud. Several exhibitors at ISC West helped to change that misconception. For example, Oosto offers a simpler and more economical approach. They supply edge appliances for AI. The purpose-built Vision AI appliance, a small box, puts intelligence at the ‘near edge’, by connecting to up to five cameras. Easy and dependable ‘failover’ ensures redundancy without a big investment, and the system can work with any IP camera, including an end user’s installed base of cameras. Oosto’s TCO (total cost of ownership) calculator Oosto’s TCO (total cost of ownership) calculator spells out how much a customer can save versus using a big server, including lower costs such and power and cooling. AI was probably the biggest buzzword at ISC West, but there was also emphasis on the practical results of applying AI to physical security. Artificial Intelligence (AI) - the biggest buzzword at ISC West I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users" “What surprises me (at the show) is that there is a lot of generic marketing of AI, but we are trying to step back from our analytics and look at applications that serve certain end-users,” said Jeff Corrall, Vice President - Product Management at March Networks, adding “As an industry, we are still at the stage of AI as a buzzword.” Jeff Corrall further said, “I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users. We have to live with the buzzwords, but what we really want is to apply them. That creates a stickiness with the end-user — when high technology is making a difference.” March Networks Labs address specific end-user problems and then apply their systems to provide a solution. Jeff Corrall adds, “A lot of AI is responding to what the customer is asking for, and we are stepping back and making sure the end-user will use it on a consistent basis.” ‘Edge versus cloud’ was a common theme at ISC West Edge versus Cloud ‘Edge versus cloud’ was a common theme at ISC West, pondering where in a system the ‘intelligence’, such as AI and machine learning, as well as other functionality, should reside. Among the companies addressing the quandary was Axis Communications, which focused on the issue using a racing theme at their presentation to the industry press. The winner of the ‘race?’ - The combination of both approaches working together as a team, of course. AXIS Speed Monitor on exhibit One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP Axis Communications also highlighted the deep learning analytics of the ARPEC 8 camera chip (introduced during the COVID-19 pandemic), which will be deployed across their camera line. One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP (Axis Camera Application Platform), the capability to load ‘apps’ onto camera chips at the edge. They also introduced the D4100-E Network strobe siren (a smart edge device), the Audio Manager Pro (a cloud-based software system enabling zoning and callouts for specific areas in a building), the W101 body worn cameras with GPS capabilities, and a Barcode Reader for doorstop applications (another ACAP app). ‘App Store’ approach to expanding applications Azena is at the centre of expanding applications at the edge, promoting new applications through an ‘App Store’ approach that sells software apps that can be loaded onto cameras that are equipped with Azena’s operating system. In the last couple of years, the company (formerly known as Security and Safety Things) has expanded its offerings. There are currently 108 apps in the store from 30 to 40 app developers. There are 14 camera models (from six manufacturers) that are commercially available and run their operating system. The newest camera is a fisheye model from Vivotek. “What we have seen is that a lot of the use cases are pretty unique,” said Fabio Marti, Vice President - Marketing for Azena. Two examples are an application that monitors a flame to ensure it is burning cleanly (no smoke). Another system monitors nets covering fish farms to avoid birds getting tangled up in the nets. Fabio Marti said “A challenge is to find new business avenues for integrators. Everybody is not eager to look beyond their comfort zone.” Focusing on software to ensure user experience Software systems are one of the major focal points for innovation in security systems Software systems are one of the major focal points for innovation in security systems and Verkada is focusing on how software innovation can improve systems. “For decades, innovation was on the hardware front,” said Filip Kaliszan, Verkada’s Founder and Chief Executive Officer (CEO), adding “We saw an opportunity for more innovation on the software side. The customer experience revolves around software.” Ensuring an end-to-end experience “We want to guarantee an end-to-end experience,” adds Filip Kaliszan. As a new company with a ‘hybrid cloud’ approach, Verkada focused on appealing to end users to convince them of the value proposition. Once an end user was convinced, Verkada brought in an integrator partner to deliver the solution. In effect, Verkada finds demand and brings that demand to the integrator. Software-centric operation of a modern building Verkada is broadly focused on ‘software-centric operation of a modern building.’ After starting out in video, Verkada has since expanded into systems for access control, alarm systems, and other categories. They use a combination of third-party hardware and equipment that is custom designed to work seamlessly with their software systems. Verkada’s end goal is to put the various systems together into a platform. They will continue building each product category, which will eventually be unified into ‘the operating system for the building of the future.’
Case studies
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep track of who had the keys. The choice It’s very easy to manage and we can focus our time on providing quality care to our patients" “The Brivo system makes my job easier and frees me up for other things. With Brivo, it’s easy to find out what we need; the system doesn’t lie," Larry Kadin, Facilities and Purchasing Manager, Adelante Healthcare. "It’s very easy to manage and we can focus our time on providing quality care to our patients.” The change Adelante has issued access cards to over 200 staff and the cleaning crews at their seven facilities. Without lots of keys floating around, the healthcare provider no longer has security breaches. One person is administering multiple sites from a single web interface. Access can be programmed easily and quickly, it’s done remotely and in a manner of just minutes. The team has better records and easy access to data that can be provided to other departments. The new system has had significant positive effects on staff productivity and effectiveness. “I’ve not seen anything that comes close to what Brivo provides. The Brivo system is a joy to work with. It saves us so much time compared to other systems we were looking at, ” Larry Kadin.
Central Community College in Nebraska has multiple campuses and educational centres to serve approximately 90 different communities. CCC’s outdated lock-and-key system and access control technology weren’t meeting their security needs. On one campus alone there are 26 buildings with access control needs for students, staff, and vendors. The security team had to provide targeted, scheduled access control for about 15 different user groups. The choice We’re completely satisfied with Brivo, as it can scale to whatever and wherever we need" “From experience, we know that great technical support, customer service, and quick turnaround time is important," Ed Long, Physical Plant Director, Central Community, brivo.com. "We’re completely satisfied with Brivo, as it can scale to whatever and wherever we need. The learning curve was short and sweet.” The change The Brivo system allows CCC to continue to scale its access control across facilities. The system allows for creating and managing hundreds of groups with different access privileges. Dorms are locked 24/7 with controlled access to provide a high level of security for students. An extra measure of security is provided with limited-access holiday scheduling. The team can provide controlled access for vendors to come and go from different buildings. The system provides the confidence that CCC has an effective emergency plan in place.
The proven “CAT” gaming analysis solution from German casino expert Dallmeier is also available for Sic Bo, in addition to Baccarat and Black Jack. The video-based solution offers a whole range of analysis options with which casino operators can increase the “game pace”, combat fraud, and gain valuable insights into the gaming action through real-time data collection. Optimisation challenges Optimising the gameplay at Sic Bo tables poses no small challenge to casino operators. These include potential cheating attempts, difficulties in tracking results, and operations such as late bets. Above all, however, gaming managers benefit from collecting and analysing data that can be used to increase the game pace and optimise the efficiency of tables and dealers. “It's all about the data” Real-time tracking of important data and processes The information that can be used to optimise the gameplay at the Sic Bo table is manifold The information that can be used to optimise the gameplay at the Sic Bo table is manifold. For example, “CAT for Sic Bo” precisely records the game pace of each table based on the times for placing the bets, game phase, and payout and thus makes the performances of tables and dealers comparable. Additional information such as which fields are the most popular, information about the value of the top chip for quick identification of “high-value” bets, objective tracking of “late bets” and other events that regularly lead to discussions between players and casinos complete the portfolio. Data points from existing sources CAT for Sic Bo combines data points from existing Sic Bo consoles with CAT data captured by AI cameras above the table. In this way, data from all participating tables can be collected together and evaluated centrally. This can either be done via the Dallmeier SeMSy® casino software or the data is exported as a CSV file and can then also be evaluated by any other system. Automated Business Intelligence for the Gaming Manager This centralised capture and analysis of data provide gaming managers with insights that previously had to be laboriously collected manually by the PIT manager or were not accessible at all in a highly efficient and automated manner. This opens up a completely new field for gaming managers to optimise the profits of their Sic Bo tables: From a higher game pace to the objective evaluation of dealer performance, support in the fight against fraud to the data-driven optimisation of table layout, placement, minimum bet levels, monitoring of compliance rules or promos.
Athena Security’s Concealed Weapons Detection System was selected by Champions Club Texas to protect patrons, members and staff at a first-of-its-kind hospitality destination in Houston that features a full-service hotel, lounge and bar with Southern-inspired cuisine and private-membership poker. Located in Houston’s expanding Westchase community, Champions Club Texas is celebrating its grand opening as a destination offering something for everyone, from business travellers seeking comfortable accommodations with well-appointed amenities to locals looking for a unique night out. Weapons detection system Athena's Concealed Weapons Detection System (WDS)/Walk Through Metal Detector is engineered to detect a wide range of mass casualty threats like handguns, shotguns, and rifles without requiring individuals to stop as they pass through the detector. There is no need to have individuals remove phones, wallets, or other extraneous items from their pockets due to the proprietary multiple-sensor detection method. The system adheres to Federal Standards while allowing both auditory and visual alert options, as seen in the best practices of Homeland Security for WDS. The concealed weapons detection system is designed to scan walking at an average speed of one person per second. Unintimidating approach Athena Security is a solution that detects weapons upon entry and is one of the many layers of security “At Champions we are raising the bar in hospitality and gaming, and that includes ensuring the most comfortable and safe atmosphere for our valued customers,” said Trent Touchstone, Director of Security, Champions Club Texas. “Athena Security is a solution that detects weapons upon entry and is one of the many layers of security protocols in place at Champions that improves operational efficiency of our security team as a workforce multiplier.” Athena Security’s low profile, unintimidating approach is a welcome differentiator from historic metal detector tech by eliminating the need to check cell phones and keys, allowing for a better flow into the venue. Modest-full time security team Advanced analytics and management protocols allow for deep visibility and flexibility to maintain staffing levels providing the highest level of safety. Touchstone, a 28-year veteran of the United States Marshals Service Chief with a long history of threat analysis, notes that given the hotel and membership club will require 24/7 attention with a modest-full time security team, he appreciates Athena Security’s ability to provide a feature-rich entryway security experience with the ability to automate and accomplish so much remotely.
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
Deployed across a wide range of devices, the Internet of Things (IoT) collects data to help business owners make decisions on a macro scale as well as at a granular level. The IoT is a network of physical devices embedded with sensors, software, and network connectivity that allows them to collect and share data. We called on this week's Expert Panel Roundtable to comment on the intersection of the IoT and physical security. We asked: How is the Internet of Things (IoT) increasing the effectiveness of security systems?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download