Data Security
Zimperium, the pioneer in mobile security, released new research highlighting the evolving landscape of mobile phishing attacks. The data-driven analysis of mobile phishing vectors in 2024 underscores an urgent need for organisations to adopt mobile-specific security strategies to combat these increasingly sophisticated threats, as evidence shows that attackers have moved to a ‘mobile first’ strategy to penetrate corporate networks and sensitive data. Key findings from Zimper...
SecurityBridge, the Cybersecurity Command Centre for SAP, announced the launch of SecurityBridge Security Information Event Management (SIEM) and IT Service Management (ITSM) for SAP. These innovative company platform additions are designed to enhance SAP-specific security monitoring and incident management. Broader IT security operations Through the enhancements, APIs allow workflow integration between infrastructure security and SAP security to enable the sharing of identified IoCs (Indicat...
42Crunch, a market major in API security, has announced the appointment of Tansel Ismail and Tushar Kothari to its Board of Directors. 42Crunch is experiencing rapid growth as enterprises increasingly embrace a security-by-design approach to address the vulnerabilities inherent in their APIs. These appointments will help 42Crunch strengthen its strategic leadership to serve the growing demand for robust, secure-by-design, scalable API security for enterprises globally. New Board Members appoin...
Matrix successfully marked its presence at IBEX India 2025, the premier trade fair for the BFSI and fintech sectors, reaffirming its commitment to cyber-secure and enterprise-grade security and telecom solutions. The event, known for bringing together key stakeholders from the banking, financial services, and insurance industry, provided Matrix with a platform to showcase its innovative, future-ready solutions tailored for BFSI organisations. End-to-end secure and smart BFSI solutions At IBEX...
Colt Technology Services (Colt), the digital infrastructure company, announced an expansion to its technology portfolio with Managed LEO+, a new managed service which integrates Low Earth Orbit (LEO) satellite connectivity with cellular 4G/5G. Managed LEO+, now available to Colt customers across 65 countries, brings a greater choice of networking technologies to businesses with operations - such as production facilities, manufacturing sites and retail locations - in rural and hard-to-reac...
HENSOLDT, the sensor solutions provider, announced the launch of the DL-6000, its sixth-generation data link solution, at IDEX 2025. Engineered to deliver exceptional security and reliability, the DL-6000 enables seamless, long-range, line-of-sight HD video and telemetry data exchange across multiple platforms. New standard in video transmission DL-6000 is an IP-based, high-data communications link that sets a new standard in video The DL-6000 is an IP-based, high-data communications link th...
News
LogiMAT 2025 is hosting a Mobile Robotics User Forum to complement the AGV and AMR solutions on display in Hall 8. Experts from Forum AGV will offer visitors a broad program of information and personal consultation in five categories covering the current trends in how AGV systems and AMRs are deployed. Pre-registration is requested. Mobile robotics is a topic of growing importance for those seeking efficient material flows in intralogistics. But potential users are often daunted by the prospect of running a cost–benefit analysis, choosing and implementing a system, and managing a fleet. That's why LogiMAT 2025 has augmented its accompanying program to include the Mobile Robotics User Forum. Array of AGVs and AMRs Visitors can benefit from a quiet ambiance for one-on-one talk with subject-matter experts to help Forum AGV under the direction of Dr. Günter Ullrich is partnering with the Association of German Engineers (VDI) to offer a program on current trends in AGV systems and AMRs, grouped into five categories and taking place in the gallery of Hall 6 (Booth 6H01) throughout the day on all three days of LogiMAT. Visitors can benefit from a quiet atmosphere for one-on-one consultation with subject-matter experts to help them make the right decision when browsing the dizzying array of AGVs and AMRs on display in Hall 8. Use cases of AGV systems and AMRs “The use cases of AGV systems and AMRs can be complex and challenging, so users need to educate themselves,” remarks Ullrich, Managing Director of Forum AGV, explaining the added value that visitors gain from LogiMAT. “The new Mobile Robotics User Forum complements the products and solutions on display in the exhibit halls with an unbiased source of information tailored to the individual—to help ensure successful AGV/AMR projects.” AGV system users The Mobile Robotics User Forum at LogiMAT is focusing on how to select and properly use such keys Forum AGV, which organises the user forum, brings experienced planners and consultants together with experts from its member businesses and partnering entities in the world of AGV systems, positioning itself as a knowledge forum for high-level information and personalised consultation. The Mobile Robotics User Forum at LogiMAT is focusing on how to select and properly use such solutions. AGV system users and anyone interested in mobile robotics can obtain informed, neutral advice and bring their own specific questions to the experts. The user forum is also supported by other companies, institutes, and organisations, including the Berufsgenossenschaft BGHW (Mannheim), the Fraunhofer Institutes IML (Dortmund) and IPA (Stuttgart), DEKRA (Ulm), and TÜV Süd. Five themed categories The LogiMAT program is divided into five themed categories: Technology: Experts introduce various AGV/AMR vehicle types and designs, focusing on varying levels of autonomy and different systems of navigation, control, braking, and steering—plus an overview of different sensor technologies, drive systems, and load capacities. Planning: Experts talk about the proper design and structure of projects, product requirements documents, and fleet management—and about standardised communication interfaces between AGVs and controllers using the VDA 5050 standard. Proof of concept: Experts offer insights into the technical feasibility of mobile robotics concepts for intralogistics and their cost-effectiveness for each visitor's own system. Safety: Visitors learn about key aspects of running a safe facility and protecting people and property when deploying AGV systems. The new EU Machinery Regulation is also sure to be a focus of attention. Cybersecurity: This fifth category offers expert insights into the increasingly important topic of data security, including the substance of the EU's Machine Regulation, NIS2 Implementing Act, and Cyber Resilience Act. The organisers anticipate strong demand, and since slots for personal consultation are limited, anyone interested in attending is asked to pre-register for their date and category of choice.
Matrix, a pioneering OEM in Security and Telecom solutions, is excited to announce its participation in the 12th edition of IBEX India 2025, scheduled for February 13-14 at Jio World Convention Centre, BKC, Mumbai. IBEX INDIA is a premier trade fair and conference connecting the BFSI Tech and Fintech sectors with cutting-edge banking technologies, where Matrix will showcase its advanced security solutions tailored for the banking sector, ensuring robust surveillance and access control for a secure banking environment. BFSI Sector at IBEX India 2025 Matrix is bringing its enterprise-grade IP Video Surveillance Solutions to IBEX India 2025, designed to meet the evolving security needs of the Banking and Fintech sector. These solutions empower financial institutions with advanced, cyber-secured surveillance, ensuring data integrity and operational resilience. Cyber-Secured Surveillance for BFSI: Matrix network cameras and VMS offer robust data protection with global cybersecurity compliance (OWASP-aligned), securing sensitive financial assets while ensuring trust and regulatory adherence. AI-Driven Analytics for Financial Security: Advanced video analytics, including intrusion detection, motion detection, and facial recognition, help banks and fintech firms mitigate security risks proactively. Centralized Security Management for BFSI: Real-time, remote monitoring with instant alerts via SMS, email, or WhatsApp ensures continuous vigilance and swift incident response for banking environments. Visit Matrix at IBEX India 2025 to explore how its scalable, BFSI-focused surveillance solutions enhance security, compliance, and operational efficiency for modern financial institutions. Advanced access control solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025, tailored to meet the stringent security and access management needs of banks, financial institutions, and fintech enterprises. Designed for scalability, compliance, and operational efficiency, these solutions provide seamless security while ensuring controlled access across multiple locations. Centralized Multi-Branch Access Management: Matrix enables banks and financial institutions to centrally manage access across multiple branches, corporate offices, and data centres, ensuring uniform security policies and streamlined administration. Elevator Access Control for High-Security Zones: Secure critical areas like executive floors, treasury rooms, and data centres with floor-wise access control, preventing unauthorised entry and enhancing operational security. Smart Visitor Management for Financial Institutions: Strengthen security with pre-registered visitor approvals, live tracking, and seamless check-ins, ensuring controlled access to sensitive banking areas while enhancing visitor experience. Visit Matrix at IBEX India 2025 to explore how its next-gen Access Control Solutions help banks and fintech enterprises achieve uncompromised security, regulatory compliance, and seamless access management. Intelligent time-attendance solutions for IBEX India 2025 Matrix is set to showcase its advanced Time-Attendance Solutions at IBEX India 2025, designed to enhance workforce efficiency, compliance, and operational accuracy for banks, financial institutions, and fintech enterprises. These solutions provide seamless automation and real-time insights, ensuring optimised workforce management in highly regulated environments. Precision-driven Workforce Management for Financial Institutions: Automate job processing and workforce tracking, ensuring accurate resource allocation and operational efficiency across multiple banking branches and corporate offices. Field Visit Management for BFSI Teams: Enable real-time tracking and reporting of field officers and relationship managers, enhancing accountability and productivity across distributed banking operations. Flexible & Secure Attendance Management: Empower employees with self-service portals for attendance, shift management, and leave tracking, ensuring seamless workforce operations while maintaining compliance with industry regulations. Visit Matrix at IBEX India 2025 to discover how its future-ready Time-Attendance Solutions help banks and fintech institutions achieve operational excellence, compliance, and workforce efficiency in a rapidly evolving financial landscape. Why visit Matrix at IBEX India 2025? Explore how Matrix is revolutionising security and workforce management for banks, financial institutions, and fintech enterprises with its cyber-secured IP Video Surveillance, advanced Access Control, and intelligent Time-Attendance solutions. At IBEX India 2025, experience live product demonstrations and interactive sessions, showcasing how Matrix’s solutions seamlessly integrate into banking and fintech infrastructures, ensuring regulatory compliance, operational efficiency, and data security. Gain first-hand insights into scalable and enterprise-grade security systems, designed to safeguard financial institutions, optimise workforce management, and enhance secure access to critical areas. Visit the Matrix booth to discover how cutting-edge technologies can help banks and fintech companies streamline security operations, mitigate risks, and drive growth in a rapidly evolving financial landscape.
Kaseya, the pioneering global provider of AI-powered cybersecurity and IT management software, released The State of Backup and Recovery Report 2025: Navigating the Future of Data Protection. The survey of over 3,000 IT professionals worldwide reveals the importance of data protection and the increased need for robust backup and recovery strategies to address current and future challenges. While 40% felt confident in their systems, 33% have reported nightmares – and many are less prepared than they believe. Cyber landscape “In today’s cyber landscape, it’s hard to be confident about any systems you’re using,” said Frank DeBenedetto, GTM General Manager, MSP Suite, Kaseya. “So much is out of your control, it’s not surprising that nearly a third of IT professionals have had nightmares about their backup. From human error to natural disasters to ransomware attacks, the only way to know your systems work is to test them repeatedly.” Security and recovery With only 10% of businesses reporting zero outages last year, many businesses tested their backups With only 10% of businesses reporting zero outages last year, many businesses tested their backups in a trial by fire – if nothing else. Only 15% test their backups daily with another 25% testing weekly. Disaster recovery tests were given even less attention, with only 11% testing daily and 20% testing weekly. And 12% of those surveyed admitted they tested their disaster recovery on an ad hoc basis or not at all. Looking at recovery times, 60% of respondents believed they could recover in under a day; however, only 35% could do so in reality. Approximately 40% of respondents can recover lost SaaS data in hours, with others requiring days or weeks (35%). More concerning, 8% were unsure of their recovery time and 2% didn’t believe they could recover any lost SaaS data. An alarming 40% of respondents would need days or weeks to recover data from a public cloud and 8% do not back up their public cloud data at all. Challenges More than half of the businesses surveyed plan to switch their primary backup solution but are finding major challenges in trying to do so. Price is one of the pioneering challenges. With IT budgets tightening, businesses need to find a way to balance cost efficiency while maintaining a robust data protection strategy. Optimizing cloud costs emerged as the greatest challenge for businesses looking to move workloads to the cloud with 15% having difficulty finding the right cloud service provider for their business. Actionable insights 10% of firms said alerting and reporting is a challenge because their backup systems don’t have insights Having multiple backup tools created inefficiencies for 10% of businesses and over half of those surveyed spent more than 2 hours a day monitoring, managing and troubleshooting backups. When looking at their current infrastructure, 10% of businesses said alerting and reporting is a challenge because their backup systems don’t have actionable insights and deep enough visibility. Best practices As businesses look to switch their backup solutions in the complex hybrid IT environment, they must ensure they’re taking every consideration to protect their data, as well as their client and consumers’ data. By leveraging advanced technologies, like cloud-native solutions and automated testing tools, businesses can save time and effort on time-consuming tasks. With the right vendor, they can become even more efficient thanks to integrated solutions and premium support. Most importantly, an apex backup infrastructure should have a strategic plan in place that plans for scalability and clearly defines backup policies. The plan will help ensure enhanced security of backup systems by implementing multilayered security measures and regularly auditing systems to ensure they’re protected against evolving threats.
With its latest update, Regula Document Reader SDK, a comprehensive software solution for identity document verification, ensures 100% support for the new ISO/IEC 39794-5 standard regulating the methods of facial data storage and verification in e-passport chips. According to the ICAO guidelines, all document readers and verification systems must be compatible with the new standard by 2026, with passport issuers required to fully adopt the new format by 2030. ISO/IEC 19794-5:2005 standard The ISO/IEC 39794-5 standard introduces an enhanced framework for facial image data, significantly improving interoperability, processing speed, and recognition accuracy across different identity verification (IDV) systems worldwide. Unlike the previous ISO/IEC 19794-5:2005 standard, which primarily stored a basic facial image, the new format records additional metadata, including detailed facial landmarks, precise eye and hair colour, and other biometric attributes. Why this matters The richer set of pre-stored reference points eliminates the need for separate face detection The richer set of pre-stored reference points eliminates the need for separate face detection and feature extraction during verification. Instead of calculating key facial points from scratch, IDV systems can use the pre-recorded metadata, accelerating processing times and ensuring consistent, high-quality recognition results—regardless of the local algorithm used for comparison. This standardisation guarantees that a person’s face in their passport will be consistently and accurately verified across different countries, improving global interoperability. Framework for future extensions Apart from that, the ISO/IEC 39794-5 standard implements a flexible framework for future extensions. This means that as new attributes or enhancements are introduced in the future, all systems supporting this standard will remain fully functional without requiring urgent updates—unlike the current situation, where all IDV systems would need to be updated to accommodate new data formats. Regula’s long-standing expertise Regula’s expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation Although the current ISO/IEC 19794-5:2005 will remain valid, the industry has started the transition period, and businesses worldwide should be ready to process the new format data before 2026. Regula’s long-standing expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation to the new standard even prior to its coming into force. Identity verification systems The company’s participation in the recent testing event in Australia demonstrated its ability to correctly extract, interpret, and verify biometric facial data encoded according to ISO/IEC 39794-5. This means that identity verification systems using Regula’s software are future-proofed against compatibility issues that could arise as countries transition to the new format. Transition to the new standard Regula's IDV software is compatible with document readers on the market and can be easily used In addition, the new standard will require organisations from banks to border control to update their passport readers with software that fits this standard. Regula's IDV software is compatible with most document readers on the market and can be easily used with any device model. This implies a seamless transition to the new standard without replacing existing hardware, ensuring a cost-effective and hassle-free upgrade. Efficiency in biometric verification “The shift to ISO/IEC 39794-5 is a major step forward in improving compatibility and efficiency in biometric verification. With more detailed metadata now embedded in e-passports, identity verification systems can achieve faster processing and more accurate recognition results." "Our expertise in RFID chip processing ensures that Regula’s technology is already fully equipped to support this transition, providing organisations with seamless, future-proof solutions that help them stay in line with regulatory changes,” says Ihar Kliashchou, Chief Technology Officer at Regula.
A new study from Juniper Research, the foremost experts in the Internet of Things market, has found that the global number of IoT devices protected by cybersecurity solutions will reach 28 billion by 2028; rising from only 14 billion in 2024. This represents a growth of over 100% over the next four years. However, despite this sizable growth, it warned that as the complexity of IoT networks’ grows, frameworks that underpin security solutions are increasingly necessary to counter fragmented approaches to IoT cybersecurity. ZTA frameworks enable scalability ZTA frameworks operate on the principle that no device on a network is to be inherently trusted With weak IoT security, enterprise IoT users risk events such as data breaches, financial losses and regulatory non-compliance. To best position IoT networks against these threats, the study identified the implementation of zero-trust architecture (ZTA) frameworks as a priority. ZTA frameworks operate on the principle that no device on a network is to be inherently trusted; requiring constant authentication. These frameworks also offer greater visibility of IoT device activity through continuous authentication; enabling earlier threat detection and mitigation. Deployed across IoT networks Given the scale of expected IoT growth, and rapid digitalisation by small-to-medium enterprises (SMEs), these frameworks will need to be deployed across IoT networks of various sizes. As the number of networks grow, vendors must leverage the scalability of ZTA frameworks to ensure that cybersecurity solutions keep pace. IoT cybersecurity market Vendors leverage the scalability of ZTA frameworks to ensure that cybersecurity keep pace Research author Michelle Joynson stated, “The IoT cybersecurity market is expected to reach $51 billion by 2028; partly driven by adoption from SMEs." "To capitalise, vendors must simplify their solutions in a time when IoT architectures are becoming increasingly complex, and a greater number of connectivity technologies are used.” About the Research The research suite offers a comprehensive assessment of the IoT cybersecurity market to date, including insightful market analysis and in-depth forecasts for 60 countries. The dataset contains over 18,200 market statistics within a five-year period. It includes a ‘Competitor Leaderboard’ and product and service analysis to examine the current and future market opportunities.
Netwrix, a vendor specialising in cybersecurity solutions focused on data and identity threats, released the new component of Netwrix Privilege Secure, which simplifies secure remote access for distributed workforces and third-party vendors. The new add-on reduces the attack surface by eliminating traditional VPN dependencies through granular, identity-based access control. It enables employees to access critical systems securely from any location, grants just-in-time privileges to reduce risks, and simplifies managing vendor and third-party access with temporary, controlled permissions. Remote access capabilities “As more organisations adopt Zero Trust Architecture, securing remote access has become an integral part of this strategy,” says Michael Tweddle, Chief Product Officer at Netwrix. “Netwrix’s secure remote access capabilities allow organisations to apply Zero Trust policies to privileged users accessing critical systems remotely and ensure that no user or device is inherently trusted, regardless of their location or network.” Key benefits of Netwrix Privilege Secure Key benefits of the latest enhancement of Netwrix Privilege Secure include: Quick Setup: Simplifies deployment with minimal infrastructure changes, allowing organisations to get up and running faster. VPN-Less Connectivity: Enhances security with identity-based access, reducing latency and removing the complexities of traditional VPNs. Granular Access Controls: Ensures precise control over who accesses what, minimising the risk of unauthorised access. Advanced Auditing Capabilities: Provides comprehensive session monitoring and logging for improved oversight to simplify decision-making processes in IT teams and accelerate investigation in case of spotting abnormalities. Integrated Multi-Factor Authentication (MFA): Strengthens remote access security by requiring MFA for all remote connections.
LogiMAT 2025 is hosting a Mobile Robotics User Forum to complement the AGV and AMR solutions on display in Hall 8. Experts from Forum AGV will offer visitors a broad program of information and personal consultation in five categories covering the current trends in how AGV systems and AMRs are deployed. Pre-registration is requested. Mobile robotics is a topic of growing importance for those seeking efficient material flows in intralogistics. But potential users are often daunted by the prospect of running a cost–benefit analysis, choosing and implementing a system, and managing a fleet. That's why LogiMAT 2025 has augmented its accompanying program to include the Mobile Robotics User Forum. Array of AGVs and AMRs Visitors can benefit from a quiet ambiance for one-on-one talk with subject-matter experts to help Forum AGV under the direction of Dr. Günter Ullrich is partnering with the Association of German Engineers (VDI) to offer a program on current trends in AGV systems and AMRs, grouped into five categories and taking place in the gallery of Hall 6 (Booth 6H01) throughout the day on all three days of LogiMAT. Visitors can benefit from a quiet atmosphere for one-on-one consultation with subject-matter experts to help them make the right decision when browsing the dizzying array of AGVs and AMRs on display in Hall 8. Use cases of AGV systems and AMRs “The use cases of AGV systems and AMRs can be complex and challenging, so users need to educate themselves,” remarks Ullrich, Managing Director of Forum AGV, explaining the added value that visitors gain from LogiMAT. “The new Mobile Robotics User Forum complements the products and solutions on display in the exhibit halls with an unbiased source of information tailored to the individual—to help ensure successful AGV/AMR projects.” AGV system users The Mobile Robotics User Forum at LogiMAT is focusing on how to select and properly use such keys Forum AGV, which organises the user forum, brings experienced planners and consultants together with experts from its member businesses and partnering entities in the world of AGV systems, positioning itself as a knowledge forum for high-level information and personalised consultation. The Mobile Robotics User Forum at LogiMAT is focusing on how to select and properly use such solutions. AGV system users and anyone interested in mobile robotics can obtain informed, neutral advice and bring their own specific questions to the experts. The user forum is also supported by other companies, institutes, and organisations, including the Berufsgenossenschaft BGHW (Mannheim), the Fraunhofer Institutes IML (Dortmund) and IPA (Stuttgart), DEKRA (Ulm), and TÜV Süd. Five themed categories The LogiMAT program is divided into five themed categories: Technology: Experts introduce various AGV/AMR vehicle types and designs, focusing on varying levels of autonomy and different systems of navigation, control, braking, and steering—plus an overview of different sensor technologies, drive systems, and load capacities. Planning: Experts talk about the proper design and structure of projects, product requirements documents, and fleet management—and about standardised communication interfaces between AGVs and controllers using the VDA 5050 standard. Proof of concept: Experts offer insights into the technical feasibility of mobile robotics concepts for intralogistics and their cost-effectiveness for each visitor's own system. Safety: Visitors learn about key aspects of running a safe facility and protecting people and property when deploying AGV systems. The new EU Machinery Regulation is also sure to be a focus of attention. Cybersecurity: This fifth category offers expert insights into the increasingly important topic of data security, including the substance of the EU's Machine Regulation, NIS2 Implementing Act, and Cyber Resilience Act. The organisers anticipate strong demand, and since slots for personal consultation are limited, anyone interested in attending is asked to pre-register for their date and category of choice.
Matrix, a pioneering OEM in Security and Telecom solutions, is excited to announce its participation in the 12th edition of IBEX India 2025, scheduled for February 13-14 at Jio World Convention Centre, BKC, Mumbai. IBEX INDIA is a premier trade fair and conference connecting the BFSI Tech and Fintech sectors with cutting-edge banking technologies, where Matrix will showcase its advanced security solutions tailored for the banking sector, ensuring robust surveillance and access control for a secure banking environment. BFSI Sector at IBEX India 2025 Matrix is bringing its enterprise-grade IP Video Surveillance Solutions to IBEX India 2025, designed to meet the evolving security needs of the Banking and Fintech sector. These solutions empower financial institutions with advanced, cyber-secured surveillance, ensuring data integrity and operational resilience. Cyber-Secured Surveillance for BFSI: Matrix network cameras and VMS offer robust data protection with global cybersecurity compliance (OWASP-aligned), securing sensitive financial assets while ensuring trust and regulatory adherence. AI-Driven Analytics for Financial Security: Advanced video analytics, including intrusion detection, motion detection, and facial recognition, help banks and fintech firms mitigate security risks proactively. Centralized Security Management for BFSI: Real-time, remote monitoring with instant alerts via SMS, email, or WhatsApp ensures continuous vigilance and swift incident response for banking environments. Visit Matrix at IBEX India 2025 to explore how its scalable, BFSI-focused surveillance solutions enhance security, compliance, and operational efficiency for modern financial institutions. Advanced access control solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025, tailored to meet the stringent security and access management needs of banks, financial institutions, and fintech enterprises. Designed for scalability, compliance, and operational efficiency, these solutions provide seamless security while ensuring controlled access across multiple locations. Centralized Multi-Branch Access Management: Matrix enables banks and financial institutions to centrally manage access across multiple branches, corporate offices, and data centres, ensuring uniform security policies and streamlined administration. Elevator Access Control for High-Security Zones: Secure critical areas like executive floors, treasury rooms, and data centres with floor-wise access control, preventing unauthorised entry and enhancing operational security. Smart Visitor Management for Financial Institutions: Strengthen security with pre-registered visitor approvals, live tracking, and seamless check-ins, ensuring controlled access to sensitive banking areas while enhancing visitor experience. Visit Matrix at IBEX India 2025 to explore how its next-gen Access Control Solutions help banks and fintech enterprises achieve uncompromised security, regulatory compliance, and seamless access management. Intelligent time-attendance solutions for IBEX India 2025 Matrix is set to showcase its advanced Time-Attendance Solutions at IBEX India 2025, designed to enhance workforce efficiency, compliance, and operational accuracy for banks, financial institutions, and fintech enterprises. These solutions provide seamless automation and real-time insights, ensuring optimised workforce management in highly regulated environments. Precision-driven Workforce Management for Financial Institutions: Automate job processing and workforce tracking, ensuring accurate resource allocation and operational efficiency across multiple banking branches and corporate offices. Field Visit Management for BFSI Teams: Enable real-time tracking and reporting of field officers and relationship managers, enhancing accountability and productivity across distributed banking operations. Flexible & Secure Attendance Management: Empower employees with self-service portals for attendance, shift management, and leave tracking, ensuring seamless workforce operations while maintaining compliance with industry regulations. Visit Matrix at IBEX India 2025 to discover how its future-ready Time-Attendance Solutions help banks and fintech institutions achieve operational excellence, compliance, and workforce efficiency in a rapidly evolving financial landscape. Why visit Matrix at IBEX India 2025? Explore how Matrix is revolutionising security and workforce management for banks, financial institutions, and fintech enterprises with its cyber-secured IP Video Surveillance, advanced Access Control, and intelligent Time-Attendance solutions. At IBEX India 2025, experience live product demonstrations and interactive sessions, showcasing how Matrix’s solutions seamlessly integrate into banking and fintech infrastructures, ensuring regulatory compliance, operational efficiency, and data security. Gain first-hand insights into scalable and enterprise-grade security systems, designed to safeguard financial institutions, optimise workforce management, and enhance secure access to critical areas. Visit the Matrix booth to discover how cutting-edge technologies can help banks and fintech companies streamline security operations, mitigate risks, and drive growth in a rapidly evolving financial landscape.
Kaseya, the pioneering global provider of AI-powered cybersecurity and IT management software, released The State of Backup and Recovery Report 2025: Navigating the Future of Data Protection. The survey of over 3,000 IT professionals worldwide reveals the importance of data protection and the increased need for robust backup and recovery strategies to address current and future challenges. While 40% felt confident in their systems, 33% have reported nightmares – and many are less prepared than they believe. Cyber landscape “In today’s cyber landscape, it’s hard to be confident about any systems you’re using,” said Frank DeBenedetto, GTM General Manager, MSP Suite, Kaseya. “So much is out of your control, it’s not surprising that nearly a third of IT professionals have had nightmares about their backup. From human error to natural disasters to ransomware attacks, the only way to know your systems work is to test them repeatedly.” Security and recovery With only 10% of businesses reporting zero outages last year, many businesses tested their backups With only 10% of businesses reporting zero outages last year, many businesses tested their backups in a trial by fire – if nothing else. Only 15% test their backups daily with another 25% testing weekly. Disaster recovery tests were given even less attention, with only 11% testing daily and 20% testing weekly. And 12% of those surveyed admitted they tested their disaster recovery on an ad hoc basis or not at all. Looking at recovery times, 60% of respondents believed they could recover in under a day; however, only 35% could do so in reality. Approximately 40% of respondents can recover lost SaaS data in hours, with others requiring days or weeks (35%). More concerning, 8% were unsure of their recovery time and 2% didn’t believe they could recover any lost SaaS data. An alarming 40% of respondents would need days or weeks to recover data from a public cloud and 8% do not back up their public cloud data at all. Challenges More than half of the businesses surveyed plan to switch their primary backup solution but are finding major challenges in trying to do so. Price is one of the pioneering challenges. With IT budgets tightening, businesses need to find a way to balance cost efficiency while maintaining a robust data protection strategy. Optimizing cloud costs emerged as the greatest challenge for businesses looking to move workloads to the cloud with 15% having difficulty finding the right cloud service provider for their business. Actionable insights 10% of firms said alerting and reporting is a challenge because their backup systems don’t have insights Having multiple backup tools created inefficiencies for 10% of businesses and over half of those surveyed spent more than 2 hours a day monitoring, managing and troubleshooting backups. When looking at their current infrastructure, 10% of businesses said alerting and reporting is a challenge because their backup systems don’t have actionable insights and deep enough visibility. Best practices As businesses look to switch their backup solutions in the complex hybrid IT environment, they must ensure they’re taking every consideration to protect their data, as well as their client and consumers’ data. By leveraging advanced technologies, like cloud-native solutions and automated testing tools, businesses can save time and effort on time-consuming tasks. With the right vendor, they can become even more efficient thanks to integrated solutions and premium support. Most importantly, an apex backup infrastructure should have a strategic plan in place that plans for scalability and clearly defines backup policies. The plan will help ensure enhanced security of backup systems by implementing multilayered security measures and regularly auditing systems to ensure they’re protected against evolving threats.
With its latest update, Regula Document Reader SDK, a comprehensive software solution for identity document verification, ensures 100% support for the new ISO/IEC 39794-5 standard regulating the methods of facial data storage and verification in e-passport chips. According to the ICAO guidelines, all document readers and verification systems must be compatible with the new standard by 2026, with passport issuers required to fully adopt the new format by 2030. ISO/IEC 19794-5:2005 standard The ISO/IEC 39794-5 standard introduces an enhanced framework for facial image data, significantly improving interoperability, processing speed, and recognition accuracy across different identity verification (IDV) systems worldwide. Unlike the previous ISO/IEC 19794-5:2005 standard, which primarily stored a basic facial image, the new format records additional metadata, including detailed facial landmarks, precise eye and hair colour, and other biometric attributes. Why this matters The richer set of pre-stored reference points eliminates the need for separate face detection The richer set of pre-stored reference points eliminates the need for separate face detection and feature extraction during verification. Instead of calculating key facial points from scratch, IDV systems can use the pre-recorded metadata, accelerating processing times and ensuring consistent, high-quality recognition results—regardless of the local algorithm used for comparison. This standardisation guarantees that a person’s face in their passport will be consistently and accurately verified across different countries, improving global interoperability. Framework for future extensions Apart from that, the ISO/IEC 39794-5 standard implements a flexible framework for future extensions. This means that as new attributes or enhancements are introduced in the future, all systems supporting this standard will remain fully functional without requiring urgent updates—unlike the current situation, where all IDV systems would need to be updated to accommodate new data formats. Regula’s long-standing expertise Regula’s expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation Although the current ISO/IEC 19794-5:2005 will remain valid, the industry has started the transition period, and businesses worldwide should be ready to process the new format data before 2026. Regula’s long-standing expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation to the new standard even prior to its coming into force. Identity verification systems The company’s participation in the recent testing event in Australia demonstrated its ability to correctly extract, interpret, and verify biometric facial data encoded according to ISO/IEC 39794-5. This means that identity verification systems using Regula’s software are future-proofed against compatibility issues that could arise as countries transition to the new format. Transition to the new standard Regula's IDV software is compatible with document readers on the market and can be easily used In addition, the new standard will require organisations from banks to border control to update their passport readers with software that fits this standard. Regula's IDV software is compatible with most document readers on the market and can be easily used with any device model. This implies a seamless transition to the new standard without replacing existing hardware, ensuring a cost-effective and hassle-free upgrade. Efficiency in biometric verification “The shift to ISO/IEC 39794-5 is a major step forward in improving compatibility and efficiency in biometric verification. With more detailed metadata now embedded in e-passports, identity verification systems can achieve faster processing and more accurate recognition results." "Our expertise in RFID chip processing ensures that Regula’s technology is already fully equipped to support this transition, providing organisations with seamless, future-proof solutions that help them stay in line with regulatory changes,” says Ihar Kliashchou, Chief Technology Officer at Regula.
A new study from Juniper Research, the foremost experts in the Internet of Things market, has found that the global number of IoT devices protected by cybersecurity solutions will reach 28 billion by 2028; rising from only 14 billion in 2024. This represents a growth of over 100% over the next four years. However, despite this sizable growth, it warned that as the complexity of IoT networks’ grows, frameworks that underpin security solutions are increasingly necessary to counter fragmented approaches to IoT cybersecurity. ZTA frameworks enable scalability ZTA frameworks operate on the principle that no device on a network is to be inherently trusted With weak IoT security, enterprise IoT users risk events such as data breaches, financial losses and regulatory non-compliance. To best position IoT networks against these threats, the study identified the implementation of zero-trust architecture (ZTA) frameworks as a priority. ZTA frameworks operate on the principle that no device on a network is to be inherently trusted; requiring constant authentication. These frameworks also offer greater visibility of IoT device activity through continuous authentication; enabling earlier threat detection and mitigation. Deployed across IoT networks Given the scale of expected IoT growth, and rapid digitalisation by small-to-medium enterprises (SMEs), these frameworks will need to be deployed across IoT networks of various sizes. As the number of networks grow, vendors must leverage the scalability of ZTA frameworks to ensure that cybersecurity solutions keep pace. IoT cybersecurity market Vendors leverage the scalability of ZTA frameworks to ensure that cybersecurity keep pace Research author Michelle Joynson stated, “The IoT cybersecurity market is expected to reach $51 billion by 2028; partly driven by adoption from SMEs." "To capitalise, vendors must simplify their solutions in a time when IoT architectures are becoming increasingly complex, and a greater number of connectivity technologies are used.” About the Research The research suite offers a comprehensive assessment of the IoT cybersecurity market to date, including insightful market analysis and in-depth forecasts for 60 countries. The dataset contains over 18,200 market statistics within a five-year period. It includes a ‘Competitor Leaderboard’ and product and service analysis to examine the current and future market opportunities.
Netwrix, a vendor specialising in cybersecurity solutions focused on data and identity threats, released the new component of Netwrix Privilege Secure, which simplifies secure remote access for distributed workforces and third-party vendors. The new add-on reduces the attack surface by eliminating traditional VPN dependencies through granular, identity-based access control. It enables employees to access critical systems securely from any location, grants just-in-time privileges to reduce risks, and simplifies managing vendor and third-party access with temporary, controlled permissions. Remote access capabilities “As more organisations adopt Zero Trust Architecture, securing remote access has become an integral part of this strategy,” says Michael Tweddle, Chief Product Officer at Netwrix. “Netwrix’s secure remote access capabilities allow organisations to apply Zero Trust policies to privileged users accessing critical systems remotely and ensure that no user or device is inherently trusted, regardless of their location or network.” Key benefits of Netwrix Privilege Secure Key benefits of the latest enhancement of Netwrix Privilege Secure include: Quick Setup: Simplifies deployment with minimal infrastructure changes, allowing organisations to get up and running faster. VPN-Less Connectivity: Enhances security with identity-based access, reducing latency and removing the complexities of traditional VPNs. Granular Access Controls: Ensures precise control over who accesses what, minimising the risk of unauthorised access. Advanced Auditing Capabilities: Provides comprehensive session monitoring and logging for improved oversight to simplify decision-making processes in IT teams and accelerate investigation in case of spotting abnormalities. Integrated Multi-Factor Authentication (MFA): Strengthens remote access security by requiring MFA for all remote connections.


Expert commentary
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
As urban populations grow and security challenges evolve, Californian cities have increasingly turned to advanced surveillance systems to enhance public safety. Surveillance infrastructure Between 2022 and 2024, these cities have made significant strides in upgrading their surveillance infrastructure, driven by concerns over crime, public safety, and the need for more sophisticated emergency response systems. This article explores how California's urban areas are improving surveillance technologies and practices, with a focus on citywide initiatives, partnerships with technology firms, and the integration of AI-driven systems. Introduction of smart city surveillance The push toward smart city technology has reshaped the security landscape in California The push toward smart city technology has reshaped the security landscape in California. With the state being home to some of the world's most innovative technology firms, cities such as Los Angeles (LA), San Francisco, and San Diego are leveraging this expertise to develop and implement advanced surveillance systems. Citywide surveillance initiatives Since 2022, the state has seen an increase in citywide surveillance initiatives aimed at addressing rising crime rates, enhancing traffic management, and improving emergency response. These systems include AI-enhanced video analytics, high-definition cameras, and real-time monitoring centers, helping law enforcement track and respond to incidents more efficiently. Key surveillance developments across Californian cities 1. Los Angeles: AI and Facial Recognition Integration Los Angeles has led the way in deploying state-of-the-art surveillance systems, particularly in high-crime areas and transportation hubs. In 2023, the Los Angeles Police Department (LAPD) expanded its use of artificial intelligence (AI) in crime prevention. The department integrated AI-enhanced video analytics with its existing network of over 30,000 surveillance cameras throughout the city, a move designed to improve real-time crime detection and automate the identification of suspicious activity. Privacy law compliance The city government has enacted measures to restrict the application of facial recognition to high-priority cases Facial recognition technology has also been a controversial but increasingly used tool in the city’s surveillance strategy. While privacy concerns remain, LA has implemented strict regulations to ensure that this technology is used in compliance with privacy laws. In response to public concerns, the city government has enacted measures to restrict the application of facial recognition to high-priority cases such as locating missing persons or identifying known offenders. According to a 2023 Los Angeles Times report, these technologies have helped reduce violent crime in areas where the systems are deployed, with a notable 15% reduction in crime rates in Downtown LA. 2. San Francisco: Data-Driven Crime Prevention San Francisco, a tech hub, has similarly embraced advanced surveillance systems, with a focus on predictive policing. The city's law enforcement agencies have adopted data-driven approaches that rely on vast amounts of data collected through surveillance cameras and other sensors placed around the city. Pilot programme In 2022, the San Francisco Police Department (SFPD) introduced a pilot programme that integrated predictive analytics with its citywide surveillance system. By analysing patterns of criminal activity, the system can forecast potential hotspots and allocate resources more effectively. Although controversial due to concerns over profiling and civil liberties, the system has been credited with helping police prevent several large-scale crimes. Transparency in the use of surveillance data Measures include annual audits and public reporting, ensuring that the system adheres to standards Moreover, the city has implemented stringent oversight measures to ensure transparency in the use of surveillance data. This includes annual audits and public reporting, ensuring that the system adheres to legal and ethical standards. A 2023 report from The San Francisco Chronicle indicated that this initiative has led to a 10% improvement in response times to major incidents, particularly in high-density areas like the Financial District. 3. San Diego: Smart Traffic and Public Safety Surveillance San Diego has also taken significant steps to upgrade its urban surveillance capabilities. One of the key focuses of the city has been integrating surveillance systems into its transportation infrastructure. The city’s Smart Streetlights programme, which began as a traffic monitoring initiative, was expanded in 2022 to include surveillance capabilities aimed at improving public safety. Smart Streetlights programme Under this programme, thousands of streetlights equipped with cameras and sensors have been installed throughout San Diego. These lights not only monitor traffic conditions but also detect suspicious activities, accidents, and emergencies. The data collected is transmitted in real-time to the city’s public safety command center, where law enforcement can respond to incidents more quickly. A 2023 evaluation by the San Diego Union-Tribune revealed that the Smart Streetlights programme had helped reduce traffic-related accidents by 12% and had become a vital tool in aiding crime investigations. Cybersecurity measures All data collected through its surveillance network is secure from potential breaches or unauthorised access Additionally, San Diego has focused on enhancing its cybersecurity measures to protect the integrity of its surveillance data. The city government partnered with local cybersecurity firms to ensure that all data collected through its surveillance network is secure from potential breaches or unauthorised access. Key technologies driving city surveillance in California The success of these surveillance initiatives can be attributed to the rapid advancement of several key technologies, which have transformed traditional security systems into sophisticated, AI-driven solutions. 1. AI-Powered Video Analytics AI-powered video analytics is at the forefront of city surveillance efforts in California. This technology enables the automatic detection of unusual patterns or activities, significantly enhancing the ability of law enforcement agencies to identify potential threats in real time. AI systems can analyse vast amounts of video footage quickly, reducing the need for manual monitoring. 2. Facial Recognition Technology Despite its controversial nature, facial recognition technology has been adopted in several Californian cities for high-priority security applications. While cities like San Francisco have restricted its use, other cities such as Los Angeles have integrated it into their surveillance networks under strict legal frameworks. 3. Predictive Analytics This technology allows police departments to focus their resources more effectively by identifying potential hotspots Predictive analytics, used prominently in San Francisco, relies on data collected from various surveillance systems to predict potential criminal activity. This technology allows police departments to focus their resources more effectively by identifying potential hotspots based on past crime patterns. 4. Smart Sensors and IoT Integration Cities like San Diego have embraced the Internet of Things (IoT) by embedding smart sensors into urban infrastructure. These sensors, connected to central monitoring systems, help cities track everything from traffic conditions to air quality. They also play a crucial role in public safety by identifying anomalies and triggering alerts for law enforcement. Challenges and controversies While the benefits of enhanced surveillance are clear, Californian cities face several challenges in the implementation of these technologies. 1. Privacy Concerns The increased use of surveillance technologies, particularly AI and facial recognition, has raised significant privacy concerns. Advocacy groups have called for stricter regulations to prevent misuse and protect individual privacy rights. In response, cities like San Francisco and Los Angeles have implemented oversight committees and enacted laws to govern the use of these technologies. 2. Data Security The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity As cities collect vast amounts of surveillance data, ensuring its security is a major challenge. The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity measures. San Diego's partnership with local tech firms to secure its surveillance infrastructure is an example of proactive steps being taken to address this issue. 3. Balancing Surveillance and Civil Liberties Striking a balance between effective surveillance and the protection of civil liberties continues to be a contentious issue. Critics argue that predictive policing and AI-driven surveillance systems can lead to biased decision-making and discriminatory practices. California cities have responded by introducing transparency measures, including public audits and open-data initiatives, to maintain public trust. California Urban Surveillance: A Model Worth Emulating The last couple of years have seen Californian cities making significant progress in upgrading their surveillance and security systems. By integrating AI, predictive analytics, and IoT technologies into their urban infrastructures, cities like Los Angeles, San Francisco, and San Diego are setting new standards for public safety and crime prevention. However, as these technologies continue to evolve, cities must also address the ethical and legal challenges they present, particularly in the areas of privacy and data security. With careful planning and regulation, California’s approach to urban surveillance could serve as a model for other cities worldwide.
Security beat
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Case studies
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honour all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. Buffalo Park The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Challenge Provide a welcoming and secure environment for visitors and deter criminal activity within the park. Achieve 360° coverage across all interior and exterior areas without using cables, which would have made the project cost-prohibitive. Design a wireless surveillance system to cover the park’s large areas of open ground. Surveillance system installation “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Factors to consider From a risk and public safety perspective, the goal from the start was to maintain an open and welcoming environment “We conducted a site survey, considering the line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Solution Install a Hanwha Vision surveillance system comprising multidirectional and AI cameras. 4K multi-sensor cameras Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Ease of playback Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” Cable cost and distance One challenge the team encountered during the design phase was running a cable for a project of this scale. “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” NDAA compliant solutions The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence. In the past, we could not effectively supply law enforcement with usable information to identify a suspect." Use of AI in cameras The Hanwha cameras’ use of AI plays a key role in delivering those capabilities "We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the colour of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. Sense of security “We absolutely would see an increase in the value and number of cameras that we use,” said Abbott. Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.” Results Ability to effectively monitor all park areas and more effective forensic searches. Reduction in on-premise incidents. Streamlined collaboration with law enforcement agencies.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programmes and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organisations like Allied Universal allows us to build on shared expertise and advance this important mission.”
The university encountered a significant challenge with the competitor’s attendance tracking solution for its teaching staff. Seeking a more precise and seamless method of capturing daily attendance across multiple campuses, the institution aimed to establish a centralised platform for attendance management. The key objectives included enhancing ease of access for employees to view their attendance records and efficiently manage leave requests. A notable consideration was the need for a specialised provision to accommodate professors who frequently moved across campuses for lecture commitments. This case study delves into the university’s pursuit of a robust attendance management solution for 3000 users to address these specific challenges and optimise operational efficiency. Challenges The major challenges that the university faced for the smooth operation of Its Attendance Management System were: Inefficient Existing Attendance Management Solution: The university encountered difficulties with a competitor’s attendance management system, which proved more cumbersome than facilitative. Managing attendance across various faculties became a challenge, exacerbating complications in understanding university-level payroll processing. Irregularity in Daily Attendance Marking for Teaching Staff: A critical requirement for the university was the seamless daily marking of professors’ attendance. The need for effective channelisation of attendance arose to ensure precise tracking and streamlined payroll management. Improper Attendance Management across Multiple Campuses: Given the multi-location setup of the campuses, there was an urgent need for centralising attendance data. This centralised approach was essential for easily managing attendance across all locations. Delayed Data Transmission from Devices: The existing solution faced challenges as punch data from devices was not transmitted to the system in a timely manner. This delay resulted in complications, necessitating manual synchronisation efforts to address the issue. Inability for Employees to Access Attendance Data and Leave Management Issues: Staff faced limitations in checking their attendance data using the current system. Additionally, the absence of support for leave request submissions led to improper leave management practices, creating a need for more efficient solutions. These operational challenges prompted the university to seek innovative solutions, aiming to enhance the overall efficiency and effectiveness of its attendance management processes. Solution To tackle the pressing issues confronted by the client, Matrix successfully deployed a thorough solution that efficiently resolved the organisational issues they were facing. Matrix Implemented its Attendance Management System to achieve: Implementation of Comprehensive Attendance Management System: Matrix successfully deployed an Enterprise-grade Time-Attendance Solution, effectively addressing the client’s organisational challenges in attendance management. This solution streamlined the entire attendance process, eliminating complexities across diverse campuses. Effortless Attendance Marking for Teaching Staff: Matrix introduced biometric devices across various faculties, enabling seamless attendance punching for teaching staff. The widespread availability of devices ensured precise tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix implemented a centralised solution for attendance management, consolidating data from multiple campuses. This centralised approach facilitated efficient control and management of attendance across diverse locations. Automatic Data Transmission from Devices: Matrix Time-Attendance terminals were deployed with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal allowed users to view attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. The innovative solutions offered by Matrix not only addressed the client’s challenges but also significantly improved attendance operations, fostering enhanced efficiency throughout the organisation. This case study underscores Matrix’s ability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient control Matrix’s deployment of its Enterprise-grade Time-Attendance Solution remarkably transformed the operations of the historic Vadodara-based university. Overcoming challenges posed by an inefficient attendance management system, Matrix streamlined the entire process, offering clarity in payroll processing and easing attendance tracking across diverse faculties. Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient payroll management. Centralised attendance management system The introduction of a centralised attendance management system across multiple campuses enhanced control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals with automated data push technology, eliminating manual synchronisation. The implementation also included a user-friendly Employee Self-Service Portal, enabling staff to effortlessly view attendance data and submit leave requests. Matrix provided a hierarchy-based approval system that helped to streamline the client’s leave management requirements. The tailored solutions significantly improved operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix’s success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients.
The Orange County Sheriff’s Department has transformed its Real Time Operations Centre (RTOC) with RGB Spectrum’s cutting-edge XtendPoint KVM-over-IP technology, advancing public safety operations through enhanced video processing, seamless information sharing, and real-time collaboration. RGB Spectrum solution Led by Dave Fontneau, Chief Information Officer of the Technology Division, the Orange County RTOC was designed as a technology incubator, unifying multiple agencies under one centralised hub. The implementation of RGB Spectrum’s XtendPoint solution has streamlined operations by providing flexible, high-performance control and visualisation tools, allowing law enforcement and emergency response teams to quickly and effectively manage critical incidents. Driving innovation in public safety The division supports everything from public safety communications and dispatch to infrastructure In 2020, the Orange County Sheriff’s Department established the Technology Division to consolidate disparate resources, creating a unified vision for technological advancement. With approximately 150 personnel, the division supports everything from public safety communications and dispatch to infrastructure, security, and IT applications. To enhance efficiency and collaboration, the RTOC needed a powerful, adaptable solution capable of integrating multiple systems and applications. After evaluating various options, the department selected RGB Spectrum, a pioneer in real-time video processing and control. Seamless communication and rapid response “We sought out strategic partners that could drive innovation at the RTOC, and RGB Spectrum delivered." "XtendPoint gives us the flexibility to push and pull content anywhere across the county, ensuring seamless communication and rapid response during emergencies,” said Dave Fontneau, Chief Information Officer of the Orange County Sheriff’s Department Technology Division. How RGB Spectrum’s XtendPoint KVM-over-IP The XtendPoint KVM-over-IP solution plays a crucial role in facilitating real-time operations, ensuring seamless video and data distribution across multiple locations. Key benefits include: Unified Multi-System Control: Operators manage multiple applications using a single keyboard and mouse, improving navigation and response times. Seamless Information Sharing: Real-time data distribution enables quick decision-making and better situational awareness. Scalable & Flexible Deployment: XtendPoint integrates with video walls and remote operators, ensuring interoperability with existing systems. Enhanced Operator Experience: Reduces workspace clutter, heat, and noise by relocating computing resources to a secure IT environment. Business Continuity & Remote Access: Allows authorised personnel to access critical systems via LAN, WAN, or VPN for remote monitoring and response. The future of the Orange County RTOC The implementation of RGB Spectrum’s technology has positioned the Orange County RTOC as a state-of-the-art public safety command centre, fostering improved collaboration between departments, federal agencies, and emergency response teams. “We’re excited about the future of the RTOC and how this technology will change the way we do policing,” Fontneau added. “By integrating innovative solutions like XtendPoint, we’re better equipped to respond to critical incidents and support our community.”
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organising a fast incident response. Camera-based detection Gradually introduced since the nineties, camera-based detection is well established. Both visual and thermal imaging cameras have proven to be a fail-proof solution for 24/7 automatic incident detection inside tunnels. With the latest camera technology upgrade of the Damsgård Tunnel in Bergen, Norway is premiering AI-enhanced dual-vision cameras as a new evolution in incident detection. Damsgård Tunnel technology upgrade In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement The Damsgård Tunnel is part of Norwegian National Road 555, which runs from Fjell to the city center of Bergen. The road tunnel opened in 1992 and has two tubes of around 2.3 kilometers in length, each carrying two lanes of traffic through the Damsgårdsfjellet mountain.In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement of ventilation systems, lighting, drainage, and camera technology. AI-enhanced dual-vision cameras Unique to this project is that, for the first time in Norway, AI-enhanced dual-vision cameras will be used. The traffic cameras from sensor specialist FLIR combine thermal and visual imaging technology in a ruggedised housing and rely on advanced deep learning algorithms that enable the camera to detect stopped vehicles, wrong-way drivers, queues, crossing pedestrians, and even smoke and fires in their early stages. Approximately 80 FLIR cameras are scheduled for installation in the second half of the year. The history of tunnel incident detection in Norway The Damsgård tunnel upgrade is another milestone in Norway’s long-standing efforts to secure the country’s vast number of tunnels. Due to Norway’s complex landscape, with fjords, mountains, and islands, road tunnels have always been a way to solve the region’s unique transportation challenges. Norway has embraced the use of automatic incident detection in its road tunnels ever since the technology came into being, with FLIR setting the pace of this evolution since the beginning. In 1995, FLIR cameras were already used in the 1,500-meter-long Ekeberg Tunnel near Oslo. FLIR automatic incident detection system In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems In August 1996, when a bus stopped and caught fire in that tunnel, the FLIR automatic incident detection system generated an alert to the tunnel operators, enabling them to close the tunnel entries and exits and activate warnings to oncoming motorists. In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems in tunnels continent-wide and since then the technology evolution has not stopped. Visual and thermal incident detection Initially, visual CCTV cameras were used to detect incidents. The technology enabled first response teams to be deployed minutes, even seconds after an incident or an irregularity (a fallen object, a pedestrian, a car slowing down) was detected. About ten years ago, FLIR introduced thermal incident detection cameras in tunnels. These cameras are established as critical assets that guarantee operators' accurate detection throughout the tunnel infrastructure. 24/7 traffic detection The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight can obstruct the view of visible-light cameras and therefore disturb traffic detection. Because thermal cameras detect heat, not light, they have no issues with these phenomena. As a result, thermal cameras can detect traffic 24/7 and in all weather conditions. Fire detection FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest One of the biggest advantages of thermal cameras in the field of tunnel safety is that they can effectively see through smoke. This makes them the ideal technology for tunnel safety operators or emergency response teams to find their way through a smoke-filled tunnel or for incident detection systems to spot issues in time. FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest and most reliable technology for fire detection inside road tunnels. The role of dual-vision cameras Both visual and thermal cameras have their merits. A visual camera may provide operators with more detail to assess the nature of an incident, while thermal cameras have proven to be unbeatable in detecting incidents in complete darkness and challenging weather conditions. Currently, both detection technologies can be combined into one system, hereby offering operators a more comprehensive view of the environment and improved accuracy compared to single-sensor systems. FLIR’s TrafiBot Dual AI camera is an example of such a combined system. ITS-Series Dual AID cameras In 2018, FLIR’s ITS-Series Dual AID cameras were installed at the entrance and exit of the Lyderhorn Tunnel near Bergen. In 2021, technology integrator Trafsys also installed 332 of FLIR’s dual-vision cameras in the Hundvåg and Eiganes tunnels, which are part of the extensive Ryfast project. The cameras’ fire detection functionality proved effective when a car fire occurred in the Hundvåg tunnel in July 2020; the FLIR ITS dual thermal AID camera detected the fire within 7 seconds of visible flames, following an initial alert for a stopped vehicle and pedestrians. Artificial Intelligence in incident detection AI algorithms embedded in the FLIR camera analyse captured images in real-time and full-resolution FLIR’s TrafiBot Dual AI, installed in the above-mentioned Damsgård Tunnel announces a new wave of incident detection cameras. The camera also combines a visual and a thermal camera in one unit, but what makes it stand out is the use of artificial intelligence and deep learning. AI algorithms embedded in the FLIR camera analyse captured images in real-time and full resolution. This latest addition to FLIR’s portfolio of AI cameras is setting a new standard for automatic incident detection in tunnels, generating extremely accurate traffic data, incident detection information, and live track data. Video image analysation Of course, analytics on traffic cameras are not new. Early cameras from decades ago already used some form of AI. So, what’s the difference with this new generation of AI cameras? Much has to do with how detection systems analyse video images. Early generations of smart cameras analysed the variation of gray levels in groups of pixels in successive video frames. Smart predictions When a vehicle enters a detection zone, the pixel value within that zone changes, and detection is activated. AI systems, however, look at the entire camera image and use object detection techniques to analyse the traffic scene. This results in much better presence detection, better classification of traffic users, and the ability to determine position, speed, and direction. These new AI systems can handle more complex traffic situations and they are much better at making smart predictions. Identification and classification of objects Computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked It’s not hard to see where this is coming from. Over the past decades, computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked as fuel for making AI better and more efficient. Instead of rule-based analytics—if x happens, then y—data-based systems are now in the lead. These systems can be trained on large datasets of images and learn how to identify and classify objects in an image. They use this knowledge to make decisions based on new images that they have never seen before. Benefits of AI-based detection systems AI-powered detection systems are much more accurate than their non-AI alternatives. For tunnel operators, this is a big deal. Nothing is a bigger nuisance for control room operators than having to pay attention to continuous unwanted alarms. AI can help filter out unwanted alarms by distinguishing between routine activity, weather phenomena, and actual incidents. High performance As an important aspect of their accuracy, AI-based systems are much more successful in detecting different vehicle classes. Detectors from FLIR will easily distinguish between a car and a van, or between a small and a large truck. It’s even possible to train a system to detect specific objects or incidents. And because cameras are so smart, installers nowadays are more flexible in installing their equipment. Even in less ideal camera positions, the detection performance of AI-based systems is high. Vehicle parameters Based on vehicle parameters such as speed and direction, they can easily see where a car is going FLIR’s AI detectors can also predict vehicle trajectories. Based on vehicle parameters such as speed and direction, they can easily see where a car is going, even if for part of that trajectory the view of that car is occluded by a passing truck. This makes detection much faster and more accurate. Operators can even be warned by so-called pre-alarms for cars that are slowing down and likely to cause a collision. Reduces human monitoring For traffic or security operators, AI offers many benefits. Since incidents can be detected much faster and with more accuracy, operators will be able to make better-informed decisions, especially in high-stress situations, and they will be able to deploy emergency teams more quickly. AI will also reduce the need for constant human monitoring, allowing operators to focus on other tasks.AI will benefit traffic planners too. Data collected from a camera can be analysed over time to identify trends, patterns, or areas with a higher potential for incidents. This can be valuable for proactive traffic planning, infrastructure improvements, or for overall risk management. Data as the cornerstone of AI performance AI-based detection systems will become the norm very swiftly. Since these systems depend on massive data sets, it’s easy to understand that the detection performance will soon be determined by the quality of the data it is trained with. High-performance systems will need a lot of data for training—in case video images of traffic—but not just any data that has been plucked from the internet will do. Challenges with publicly available datasets The problem with that approach is that, more often than not, publicly available datasets are limited Some camera manufacturers rely on publicly available datasets to train their AI systems. The problem with that approach is that, more often than not, these datasets are limited or of low quality. For example, internet data sets hardly have any thermal images, traffic images are mostly collected during sunny weather or friendly daytime conditions, and they are often taken from useless angles. FLIR model and prediction AI-based products from FLIR, on the other hand, are trained on datasets that have been collected in-house, over more than 30 years, with data samples that are relevant for practically any traffic scene you can think of. What’s more, FLIR’s datasets are continuously growing and with it the quality of its models and predictions. For FLIR, data is the true quality mark which stands for high-performance, accurate traffic detection. The future is AI Norway and FLIR share an interesting history of evolving incident detection technology. A lot has changed since the installation of the first FLIR automatic incident detection system in the Ekeberg tunnel in 1995. Currently, incident detection systems combine multiple sensors—visual and thermal—and, most importantly, they use AI, which enables them to improve their detection performance over time with every new video image they process. Artificial intelligence has a promising future in incident detection. Norwegian tunnels, and the average daily traffic of 40,000 vehicles in the Damsgård Tunnel, will only benefit from it.
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honour all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. Buffalo Park The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Challenge Provide a welcoming and secure environment for visitors and deter criminal activity within the park. Achieve 360° coverage across all interior and exterior areas without using cables, which would have made the project cost-prohibitive. Design a wireless surveillance system to cover the park’s large areas of open ground. Surveillance system installation “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Factors to consider From a risk and public safety perspective, the goal from the start was to maintain an open and welcoming environment “We conducted a site survey, considering the line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Solution Install a Hanwha Vision surveillance system comprising multidirectional and AI cameras. 4K multi-sensor cameras Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Ease of playback Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” Cable cost and distance One challenge the team encountered during the design phase was running a cable for a project of this scale. “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” NDAA compliant solutions The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence. In the past, we could not effectively supply law enforcement with usable information to identify a suspect." Use of AI in cameras The Hanwha cameras’ use of AI plays a key role in delivering those capabilities "We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the colour of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. Sense of security “We absolutely would see an increase in the value and number of cameras that we use,” said Abbott. Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.” Results Ability to effectively monitor all park areas and more effective forensic searches. Reduction in on-premise incidents. Streamlined collaboration with law enforcement agencies.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programmes and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organisations like Allied Universal allows us to build on shared expertise and advance this important mission.”
The university encountered a significant challenge with the competitor’s attendance tracking solution for its teaching staff. Seeking a more precise and seamless method of capturing daily attendance across multiple campuses, the institution aimed to establish a centralised platform for attendance management. The key objectives included enhancing ease of access for employees to view their attendance records and efficiently manage leave requests. A notable consideration was the need for a specialised provision to accommodate professors who frequently moved across campuses for lecture commitments. This case study delves into the university’s pursuit of a robust attendance management solution for 3000 users to address these specific challenges and optimise operational efficiency. Challenges The major challenges that the university faced for the smooth operation of Its Attendance Management System were: Inefficient Existing Attendance Management Solution: The university encountered difficulties with a competitor’s attendance management system, which proved more cumbersome than facilitative. Managing attendance across various faculties became a challenge, exacerbating complications in understanding university-level payroll processing. Irregularity in Daily Attendance Marking for Teaching Staff: A critical requirement for the university was the seamless daily marking of professors’ attendance. The need for effective channelisation of attendance arose to ensure precise tracking and streamlined payroll management. Improper Attendance Management across Multiple Campuses: Given the multi-location setup of the campuses, there was an urgent need for centralising attendance data. This centralised approach was essential for easily managing attendance across all locations. Delayed Data Transmission from Devices: The existing solution faced challenges as punch data from devices was not transmitted to the system in a timely manner. This delay resulted in complications, necessitating manual synchronisation efforts to address the issue. Inability for Employees to Access Attendance Data and Leave Management Issues: Staff faced limitations in checking their attendance data using the current system. Additionally, the absence of support for leave request submissions led to improper leave management practices, creating a need for more efficient solutions. These operational challenges prompted the university to seek innovative solutions, aiming to enhance the overall efficiency and effectiveness of its attendance management processes. Solution To tackle the pressing issues confronted by the client, Matrix successfully deployed a thorough solution that efficiently resolved the organisational issues they were facing. Matrix Implemented its Attendance Management System to achieve: Implementation of Comprehensive Attendance Management System: Matrix successfully deployed an Enterprise-grade Time-Attendance Solution, effectively addressing the client’s organisational challenges in attendance management. This solution streamlined the entire attendance process, eliminating complexities across diverse campuses. Effortless Attendance Marking for Teaching Staff: Matrix introduced biometric devices across various faculties, enabling seamless attendance punching for teaching staff. The widespread availability of devices ensured precise tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix implemented a centralised solution for attendance management, consolidating data from multiple campuses. This centralised approach facilitated efficient control and management of attendance across diverse locations. Automatic Data Transmission from Devices: Matrix Time-Attendance terminals were deployed with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal allowed users to view attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. The innovative solutions offered by Matrix not only addressed the client’s challenges but also significantly improved attendance operations, fostering enhanced efficiency throughout the organisation. This case study underscores Matrix’s ability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient control Matrix’s deployment of its Enterprise-grade Time-Attendance Solution remarkably transformed the operations of the historic Vadodara-based university. Overcoming challenges posed by an inefficient attendance management system, Matrix streamlined the entire process, offering clarity in payroll processing and easing attendance tracking across diverse faculties. Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient payroll management. Centralised attendance management system The introduction of a centralised attendance management system across multiple campuses enhanced control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals with automated data push technology, eliminating manual synchronisation. The implementation also included a user-friendly Employee Self-Service Portal, enabling staff to effortlessly view attendance data and submit leave requests. Matrix provided a hierarchy-based approval system that helped to streamline the client’s leave management requirements. The tailored solutions significantly improved operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix’s success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients.
The Orange County Sheriff’s Department has transformed its Real Time Operations Centre (RTOC) with RGB Spectrum’s cutting-edge XtendPoint KVM-over-IP technology, advancing public safety operations through enhanced video processing, seamless information sharing, and real-time collaboration. RGB Spectrum solution Led by Dave Fontneau, Chief Information Officer of the Technology Division, the Orange County RTOC was designed as a technology incubator, unifying multiple agencies under one centralised hub. The implementation of RGB Spectrum’s XtendPoint solution has streamlined operations by providing flexible, high-performance control and visualisation tools, allowing law enforcement and emergency response teams to quickly and effectively manage critical incidents. Driving innovation in public safety The division supports everything from public safety communications and dispatch to infrastructure In 2020, the Orange County Sheriff’s Department established the Technology Division to consolidate disparate resources, creating a unified vision for technological advancement. With approximately 150 personnel, the division supports everything from public safety communications and dispatch to infrastructure, security, and IT applications. To enhance efficiency and collaboration, the RTOC needed a powerful, adaptable solution capable of integrating multiple systems and applications. After evaluating various options, the department selected RGB Spectrum, a pioneer in real-time video processing and control. Seamless communication and rapid response “We sought out strategic partners that could drive innovation at the RTOC, and RGB Spectrum delivered." "XtendPoint gives us the flexibility to push and pull content anywhere across the county, ensuring seamless communication and rapid response during emergencies,” said Dave Fontneau, Chief Information Officer of the Orange County Sheriff’s Department Technology Division. How RGB Spectrum’s XtendPoint KVM-over-IP The XtendPoint KVM-over-IP solution plays a crucial role in facilitating real-time operations, ensuring seamless video and data distribution across multiple locations. Key benefits include: Unified Multi-System Control: Operators manage multiple applications using a single keyboard and mouse, improving navigation and response times. Seamless Information Sharing: Real-time data distribution enables quick decision-making and better situational awareness. Scalable & Flexible Deployment: XtendPoint integrates with video walls and remote operators, ensuring interoperability with existing systems. Enhanced Operator Experience: Reduces workspace clutter, heat, and noise by relocating computing resources to a secure IT environment. Business Continuity & Remote Access: Allows authorised personnel to access critical systems via LAN, WAN, or VPN for remote monitoring and response. The future of the Orange County RTOC The implementation of RGB Spectrum’s technology has positioned the Orange County RTOC as a state-of-the-art public safety command centre, fostering improved collaboration between departments, federal agencies, and emergency response teams. “We’re excited about the future of the RTOC and how this technology will change the way we do policing,” Fontneau added. “By integrating innovative solutions like XtendPoint, we’re better equipped to respond to critical incidents and support our community.”
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organising a fast incident response. Camera-based detection Gradually introduced since the nineties, camera-based detection is well established. Both visual and thermal imaging cameras have proven to be a fail-proof solution for 24/7 automatic incident detection inside tunnels. With the latest camera technology upgrade of the Damsgård Tunnel in Bergen, Norway is premiering AI-enhanced dual-vision cameras as a new evolution in incident detection. Damsgård Tunnel technology upgrade In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement The Damsgård Tunnel is part of Norwegian National Road 555, which runs from Fjell to the city center of Bergen. The road tunnel opened in 1992 and has two tubes of around 2.3 kilometers in length, each carrying two lanes of traffic through the Damsgårdsfjellet mountain.In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement of ventilation systems, lighting, drainage, and camera technology. AI-enhanced dual-vision cameras Unique to this project is that, for the first time in Norway, AI-enhanced dual-vision cameras will be used. The traffic cameras from sensor specialist FLIR combine thermal and visual imaging technology in a ruggedised housing and rely on advanced deep learning algorithms that enable the camera to detect stopped vehicles, wrong-way drivers, queues, crossing pedestrians, and even smoke and fires in their early stages. Approximately 80 FLIR cameras are scheduled for installation in the second half of the year. The history of tunnel incident detection in Norway The Damsgård tunnel upgrade is another milestone in Norway’s long-standing efforts to secure the country’s vast number of tunnels. Due to Norway’s complex landscape, with fjords, mountains, and islands, road tunnels have always been a way to solve the region’s unique transportation challenges. Norway has embraced the use of automatic incident detection in its road tunnels ever since the technology came into being, with FLIR setting the pace of this evolution since the beginning. In 1995, FLIR cameras were already used in the 1,500-meter-long Ekeberg Tunnel near Oslo. FLIR automatic incident detection system In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems In August 1996, when a bus stopped and caught fire in that tunnel, the FLIR automatic incident detection system generated an alert to the tunnel operators, enabling them to close the tunnel entries and exits and activate warnings to oncoming motorists. In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems in tunnels continent-wide and since then the technology evolution has not stopped. Visual and thermal incident detection Initially, visual CCTV cameras were used to detect incidents. The technology enabled first response teams to be deployed minutes, even seconds after an incident or an irregularity (a fallen object, a pedestrian, a car slowing down) was detected. About ten years ago, FLIR introduced thermal incident detection cameras in tunnels. These cameras are established as critical assets that guarantee operators' accurate detection throughout the tunnel infrastructure. 24/7 traffic detection The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight can obstruct the view of visible-light cameras and therefore disturb traffic detection. Because thermal cameras detect heat, not light, they have no issues with these phenomena. As a result, thermal cameras can detect traffic 24/7 and in all weather conditions. Fire detection FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest One of the biggest advantages of thermal cameras in the field of tunnel safety is that they can effectively see through smoke. This makes them the ideal technology for tunnel safety operators or emergency response teams to find their way through a smoke-filled tunnel or for incident detection systems to spot issues in time. FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest and most reliable technology for fire detection inside road tunnels. The role of dual-vision cameras Both visual and thermal cameras have their merits. A visual camera may provide operators with more detail to assess the nature of an incident, while thermal cameras have proven to be unbeatable in detecting incidents in complete darkness and challenging weather conditions. Currently, both detection technologies can be combined into one system, hereby offering operators a more comprehensive view of the environment and improved accuracy compared to single-sensor systems. FLIR’s TrafiBot Dual AI camera is an example of such a combined system. ITS-Series Dual AID cameras In 2018, FLIR’s ITS-Series Dual AID cameras were installed at the entrance and exit of the Lyderhorn Tunnel near Bergen. In 2021, technology integrator Trafsys also installed 332 of FLIR’s dual-vision cameras in the Hundvåg and Eiganes tunnels, which are part of the extensive Ryfast project. The cameras’ fire detection functionality proved effective when a car fire occurred in the Hundvåg tunnel in July 2020; the FLIR ITS dual thermal AID camera detected the fire within 7 seconds of visible flames, following an initial alert for a stopped vehicle and pedestrians. Artificial Intelligence in incident detection AI algorithms embedded in the FLIR camera analyse captured images in real-time and full-resolution FLIR’s TrafiBot Dual AI, installed in the above-mentioned Damsgård Tunnel announces a new wave of incident detection cameras. The camera also combines a visual and a thermal camera in one unit, but what makes it stand out is the use of artificial intelligence and deep learning. AI algorithms embedded in the FLIR camera analyse captured images in real-time and full resolution. This latest addition to FLIR’s portfolio of AI cameras is setting a new standard for automatic incident detection in tunnels, generating extremely accurate traffic data, incident detection information, and live track data. Video image analysation Of course, analytics on traffic cameras are not new. Early cameras from decades ago already used some form of AI. So, what’s the difference with this new generation of AI cameras? Much has to do with how detection systems analyse video images. Early generations of smart cameras analysed the variation of gray levels in groups of pixels in successive video frames. Smart predictions When a vehicle enters a detection zone, the pixel value within that zone changes, and detection is activated. AI systems, however, look at the entire camera image and use object detection techniques to analyse the traffic scene. This results in much better presence detection, better classification of traffic users, and the ability to determine position, speed, and direction. These new AI systems can handle more complex traffic situations and they are much better at making smart predictions. Identification and classification of objects Computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked It’s not hard to see where this is coming from. Over the past decades, computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked as fuel for making AI better and more efficient. Instead of rule-based analytics—if x happens, then y—data-based systems are now in the lead. These systems can be trained on large datasets of images and learn how to identify and classify objects in an image. They use this knowledge to make decisions based on new images that they have never seen before. Benefits of AI-based detection systems AI-powered detection systems are much more accurate than their non-AI alternatives. For tunnel operators, this is a big deal. Nothing is a bigger nuisance for control room operators than having to pay attention to continuous unwanted alarms. AI can help filter out unwanted alarms by distinguishing between routine activity, weather phenomena, and actual incidents. High performance As an important aspect of their accuracy, AI-based systems are much more successful in detecting different vehicle classes. Detectors from FLIR will easily distinguish between a car and a van, or between a small and a large truck. It’s even possible to train a system to detect specific objects or incidents. And because cameras are so smart, installers nowadays are more flexible in installing their equipment. Even in less ideal camera positions, the detection performance of AI-based systems is high. Vehicle parameters Based on vehicle parameters such as speed and direction, they can easily see where a car is going FLIR’s AI detectors can also predict vehicle trajectories. Based on vehicle parameters such as speed and direction, they can easily see where a car is going, even if for part of that trajectory the view of that car is occluded by a passing truck. This makes detection much faster and more accurate. Operators can even be warned by so-called pre-alarms for cars that are slowing down and likely to cause a collision. Reduces human monitoring For traffic or security operators, AI offers many benefits. Since incidents can be detected much faster and with more accuracy, operators will be able to make better-informed decisions, especially in high-stress situations, and they will be able to deploy emergency teams more quickly. AI will also reduce the need for constant human monitoring, allowing operators to focus on other tasks.AI will benefit traffic planners too. Data collected from a camera can be analysed over time to identify trends, patterns, or areas with a higher potential for incidents. This can be valuable for proactive traffic planning, infrastructure improvements, or for overall risk management. Data as the cornerstone of AI performance AI-based detection systems will become the norm very swiftly. Since these systems depend on massive data sets, it’s easy to understand that the detection performance will soon be determined by the quality of the data it is trained with. High-performance systems will need a lot of data for training—in case video images of traffic—but not just any data that has been plucked from the internet will do. Challenges with publicly available datasets The problem with that approach is that, more often than not, publicly available datasets are limited Some camera manufacturers rely on publicly available datasets to train their AI systems. The problem with that approach is that, more often than not, these datasets are limited or of low quality. For example, internet data sets hardly have any thermal images, traffic images are mostly collected during sunny weather or friendly daytime conditions, and they are often taken from useless angles. FLIR model and prediction AI-based products from FLIR, on the other hand, are trained on datasets that have been collected in-house, over more than 30 years, with data samples that are relevant for practically any traffic scene you can think of. What’s more, FLIR’s datasets are continuously growing and with it the quality of its models and predictions. For FLIR, data is the true quality mark which stands for high-performance, accurate traffic detection. The future is AI Norway and FLIR share an interesting history of evolving incident detection technology. A lot has changed since the installation of the first FLIR automatic incident detection system in the Ekeberg tunnel in 1995. Currently, incident detection systems combine multiple sensors—visual and thermal—and, most importantly, they use AI, which enables them to improve their detection performance over time with every new video image they process. Artificial intelligence has a promising future in incident detection. Norwegian tunnels, and the average daily traffic of 40,000 vehicles in the Damsgård Tunnel, will only benefit from it.


Round table discussion
New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?
2025 is likely to see further advancements in artificial intelligence, with potential impacts on various aspects of society, including the security industry. The new year will also require security professionals to adapt to changing market conditions and develop contingency plans for unforeseen events. Industry changes will accelerate and challenge everyone in the security market to keep up. Making specific predictions for the new year can be a struggle, but we asked our Expert Panel Roundtable: What will be the big news for security in the year ahead?
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Products


White papers

The truth behind 9 mobile access myths
Download
2024 trends in video surveillance
Download
How intelligent video is transforming banking and financial institutions
Download
Securing data centres: Varied technologies and exacting demands
Download
Best practices for asset management
Download
Understanding the IT needs of video surveillance
Download
AI in security solution
Download
Managing security in the age of boundaryless working
Download
7 proven solutions for law enforcement key control and asset management
Download
Palm vein recognition
Download
Cybersecurity for enterprise: The essential guide to protecting your business
Download
The security challenges of data centers
Download
Access control system planning phase 2
Download
Honeywell GARD USB threat report 2024
Download
Access control system planning phase 1
Download
The truth behind 9 mobile access myths
Download
2024 trends in video surveillance
Download
How intelligent video is transforming banking and financial institutions
Download
Securing data centres: Varied technologies and exacting demands
Download
Best practices for asset management
Download
Understanding the IT needs of video surveillance
Download
AI in security solution
Download
Managing security in the age of boundaryless working
Download
7 proven solutions for law enforcement key control and asset management
Download
Palm vein recognition
Download
Cybersecurity for enterprise: The essential guide to protecting your business
Download
The security challenges of data centers
Download
Access control system planning phase 2
Download
Honeywell GARD USB threat report 2024
Download
Access control system planning phase 1
Download
The truth behind 9 mobile access myths
Download

Videos
Data Security: Manufacturers & Suppliers

7 proven solutions for law enforcement key control and asset management
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download
Guide for HAAS: New choice of SMB security system
Download
The truth behind 9 mobile access myths
Download