Day/Night surveillance
North Yorkshire and Devon & Cornwall are the latest police forces to become ECHO-connected, having joined in August and November 2024, respectively. Their addition brings the total number of ECHO-connected police forces in the UK to 13, with ECHO enabling the efficient handling of over 70,000 Intruder and Hold-up Alarms incidents annually, improving police response times and outcomes for victims. Pioneering Echo-connected alarm receiving centres (ARCs) including ADT, Secom, Cougar/K-SOC and...
As demand for high-efficiency security systems rises among large enterprises, the global security solution provider VIVOTEK (3454-TW) introduces new software service “Device Manager”. Remote management service This all-in-one remote management service allows large enterprises to manage thousands of network cameras, assign IPs, and update firmware remotely, significantly reducing time and labor costs, and acting like a dedicated security manager for the company. For instance, when...
OliverIQ, the first truly complete Smart Home as a Service (SHaaS) platform announced that it has signed Centrale D’Alarme De Bromont as its first security provider partner in Canada. Headquartered in Bromont, Quebec, the company provides security services against break-ins, fires, floods, and more. As an OliverIQ partner, Centrale D’Alarme De Bromont can offer comprehensive smart home automation, management, and support services to its residential customers. Home automation...
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unifie...
Hikvision, a major manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value is excited to announce the release of the DS-KIS600 Intercom Kit, designed to deliver advanced home security in a compact package. Two-way communication Featuring the DS-KV6113-WPE1 door station, this kit offers crystal-clear two-way communication with a noise-reducing microphone, perfect for narrow door frames. With the Hik-Connect App, home...
Vemotion Interactive, the UK manufacturer of low-latency, high-performance, plug-and-play live video streaming solutions, has launched a new version of their popular Polecam rapid deployment camera. Polecam Development of the innovative and ultra-reliable original rapid deployment CCTV camera, the new Polecam delivers high-quality live video, even over low bandwidths, to provide a robust, integrated wireless video surveillance solution that also features a fast ‘plug...
News
Konica Minolta Europe and Kepler Vision Technologies announce European cooperation in the healthcare sector. Kepler has developed the AI-based Night Nurse solution used in Konica Minolta’s MOBOTIX C71 camera. The solution is designed to enable better care and improved monitoring of the well-being of elderly patients. The Kepler Night Nurse will be shipped internationally by Konica Minolta Europe. Night Nurse solution The care industry faces increasingly difficult challenges due to an aging population and workforce. While the population of 65+ continues to grow, the workforce sustaining care for this demographic is shrinking. Utilising AI and computer vision learnings, Kepler Vision’s Night Nurse solution brings a reliable fall detector to the hospital staff. Smart sensor technology The solution automatically sends messages in the event of a fall, enabling an immediate response Its smart sensor technology is currently embedded in Konica Minolta’s Mobotix C71 camera. The solution automatically sends messages in the event of a fall, enabling an immediate response. Due to this automation, the hospital can better manage the workload of care workers and overcome any staff shortages. Authority comments Petr Atanasčev at Konica Minolta says, “We are proud to be working with Kepler Vision Technologies. Their innovative Kepler Night Nurse product is exactly the type of work we want to collaborate with, and we are happy to help spread this internationally.” Harro Stokman, CEO of Kepler Vision Technologies says, “Partnering with Konica Minolta is one of our most important partnerships to secure. Being able to utilise their knowledge and expertise in the IT sector allows for us to focus on making."
Hikvision, a major manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to announce an exclusive, limited-time offer on its cutting-edge ColorVu cameras, recognised as the industry standard for 24/7 full-colour surveillance. Through September 30, security professionals can get Hikvision’s ColorVu cameras at the most competitive price-performance ratio ever offered. 24/7 full-colour imaging "As the pioneering force behind ColorVu technology, Hikvision has consistently set the standard for 24/7 full-colour imaging. This special offer underscores our dedication to empowering security professionals and end users with our groundbreaking innovations," said John Xiao, Vice President of Marketing, at Hikvision USA. "With an unrivaled range of form factors and cutting-edge full-colour capabilities, ColorVu cameras are indispensable for modernising any security system.” ColorVu cameras features With its array of features, these aren’t simply a camera; they’re a versatile and powerful security investment With prices starting as low as $120, Hikvision’s ColorVu cameras provide unparalleled image clarity, even in the most challenging lighting conditions. Hikvision’s extensive lineup of ColorVu cameras features 4 MP resolution, true Wide Dynamic Range (WDR), and advanced analytics, including human and vehicle detection. With its array of features, these aren’t simply a camera; they’re a versatile and powerful security investment. Promotional models 4 MP ColorVu Mini Dome Camera: Available in black or white housing with deep learning human and vehicle classification. 4 MP ColorVu Mini Bullet Camera: Get real-time audio security with its built-in microphone and deep learning human and vehicle classification. 4 MP ColorVu Dome Camera: Built-in microphone for real-time audio security, audio and alarm interface available, plus deep learning analytics. 4 MP ColorVu Turret Camera: Real-time audio security with a built-in microphone and deep learning capabilities. 4 MP Panoramic ColorVu Fixed Turret Network Camera: One image that presents all the scenes covered by the camera. 4 MP 12X ColorVu PTZ Camera Expansive night view up to 164 feet (50 m) IR distance and 328 feet (100 m) white light. Upgrade security with ColorVu, the industry pioneer in 24/7 full-colour surveillance. Don't miss this limited-time opportunity to experience unparalleled image quality at an exceptional price.
VOSKER, a provider of cutting-edge surveillance solutions, has announced the latest evolution of its camera, the VKX, which includes new features like on-demand mode, better image quality for both day and night usage, a 2X larger solar panel, and new front-access design. The VKX can operate 100% autonomously for up to 6 months without an external power supply. Front access design Due to the camera’s larger, frameless solar panel, the setup doesn’t require any wires or even a wifi network, only LTE cellular connectivity. The new front access design means a sturdier build with fewer components, allowing for quick battery swaps without needing to dismantle the entire camera from its mounting bracket. This highly compact evolution of the technology is more portable than ever and allows the user to install or upgrade the camera without compromising any existing security measures. Easy installment It’s designed for customers who need portable security, in remote places without wifi It’s designed for customers who need portable security, in remote places without wifi or access to power. Not only do these new key features allow for an easier installment and rapid deployment, but they also reflect VOSKER’s continued dedication to evolving their product. “The VKX is something we’ve been looking forward to sharing with our customers,” says VOSKER co-founder, President, and CEO Jimmy Angers. Impact of product feedback “This newest generation was heavily influenced by their feedback on previous products. We take our customers’ input on the product very seriously because, ultimately, it's for them and we’re always looking to improve their experience when using our products." "We’re very proud of the improvements we’ve made on this new camera and look forward to continuing to find innovative ways to keep building on this success.” Expansion of new technologies The launch of VKX comes just a few short months after VOSKER announced its latest financing round of USD 125M with the participation of EDC, The Royal Bank of Canada, and Scotiabank. The significant infusion in capital is aimed at the company’s growth and accelerating the development and market expansion of new technologies like the VKX. VOSKER app The VKX is also supported by an updated version of the VOSKER app, which has been improved to help users quickly get the information that matters most to them – the changes include updates to search, filters, and notifications. They push the boundaries of what’s possible in the world of surveillance technology, ensuring that customers receive the most advanced and reliable solutions available.
CyberSecurity Malaysia (CSM), the national cybersecurity specialist agency under the purview of Malaysia’s Ministry of Digital signed a Memorandum of Understanding (MoU) with Flexxon and AI MSP. Flexxon is a global pioneer of AI-powered hardware security solutions, and AI MSP is an IT and cybersecurity company that offers Flexxon’s X-PHY AI Cybersecurity Solutions and professional services in Malaysia. Digital transformation The MoU aims to establish a comprehensive framework for cooperation in digital transformation and the introduction of pre-emptive hardware-based AI cybersecurity solutions. The collaboration aims to enhance the country’s cybersecurity capabilities and develop new methodologies and tools to safeguard against evolving cyber threats. Signing ceremony The collaboration aims to enhance the country’s cybersecurity capabilities and develop new methodologies The signing ceremony took place at Cyber DSA 2024 in Kuala Lumpur and was signed by Mr. Roshdi Ahmad, Chief Operating Officer, of CyberSecurity Malaysia, Ms. Camellia Chan, Co-Founder and CEO of Flexxon, and Mr. Kevin Lim, Technical Director of AI MSP. With witnesses YBrs. Tuan Fabian Bigar, Secretary General, Ministry of Digital, and Ms. May Chng, Co-Founder and COO of Flexxon. New cybersecurity standards Ms. Camellia Chan, CEO of Flexxon, commented, “We are honoured to collaborate with CyberSecurity Malaysia, together with our partner AI MSP. Working with forward-looking and like-minded organisations that embrace innovation is essential to outpacing cybercriminals that have continued to exploit traditional security methods." "This partnership underscores our commitment to providing cutting-edge hardware-based security solutions that protect critical infrastructure and the vast network of data. Together, we aim to set new standards in cybersecurity.” AI-powered hardware solutions Echoing Ms. Chan’s sentiments, Mr. Kevin Lim, Technical Director of AI MSP, said, “AI MSP is committed to enhancing security standards by implementing proactive measures that address emerging cyber threats." "Our collaboration with Flexxon and CSM builds a bridge for the integration of advanced AI-powered hardware solutions, furthering our goal of delivering holistic and effective security solutions across Malaysia.” Bolstering security architecture The partnership seeks to enable the rapid adoption of Flexxon’s cutting-edge cybersecurity technologies The synergistic partnership seeks to enable the rapid adoption of Flexxon’s cutting-edge cybersecurity technologies within the Malaysian Government and foster capacity building in information technology and information security across the country. Key activities include organising and participating in cybersecurity outreach events, training programmes, and service initiatives to promote awareness and best practices in cybersecurity. Cyberthreat detection and response Singapore-headquartered Flexxon has led the charge in developing AI-embedded hardware security solutions since it unveiled the X-PHY Solid State Drive (SSD) in 2021 – the world’s first AI-powered cybersecurity SSD. Its solutions leverage the memory medium to proactively and autonomously detect and respond to cyber threats including Zero Day threats, ransomware, and physical intrusions. It has since expanded its growing suite of patented solutions to include the X-PHY cybersecurity laptops, X-PHY Server Defender, and X-PHY Vault. Malaysia ramps up cybersecurity governance The Bill includes provisions such as the establishment of the National Cyber Security Committee Malaysia has increasingly prioritised cybersecurity to protect its digital infrastructure and data, with its latest Cyber Security Bill passed in parliament on 25 March 2024. The Bill includes provisions such as the establishment of the National Cyber Security Committee, licencing of cyber security service providers, and enforcement provisions. Secure and resilient digital future CSM’s timely collaboration with Flexxon and AI MSP aligns with the nation’s strategic goals, addressing the pressing need for advanced security measures in the face of increasing cyber threats. By integrating Flexxon’s AI-powered X-PHY hardware solutions, Malaysia aims to enhance its defencive capabilities, ensuring a secure and resilient digital future for its citizens and industries. Products and services can be explored at Flexxon and AI MSP’s booth at Cyber DSA. Situated in Hall 6 number 6009, Kuala Lumpur Convention Centre, from 6 – 8 August 2024.
Assured Fire and Security, the Essex-based installer of electronic fire and security systems, is driving nationwide growth using the latest mobile working technology from BigChange. Assured, formerly Elan Fire and Security Systems, has already expanded its business by 60 percent since implementing the 6-in-1 cloud-based solution. Live-linked mobile devices Using live-linked mobile devices running the BigChange app, Assured has increased engineer productivity, reduced operational costs, and improved management visibility of the field service operation. "Our previous system, despite being the specialist software package solution for our sector, was server-based and poorly supported," commented Paul Salmon, Managing Director of Assured Fire and Security, adding "It required on-site servers to run, a dedicated computer to access and it could take days for anyone to get back to us from the technical support team, on even the most basic query." Additional support subscriptions Paul Salmon continues, "Remote access was a big no-no as they always informed us it was never designed for that. And for anything outside of the ordinary, additional 'Modules' had to be purchased at great costs, along with additional support subscriptions." "BigChange is like a breath of fresh air," said Paul Salmon, adding "From the first demo to a call to the Roadcrew support team at 3 in the morning, I just love everything about it. BigChange is changing the way we run our business and will support our growth ambitions for years to come." BigChange job management system The cloud-based solution offers 24/7/365 access from any internet-enabled device and connects field engineers Assured has been using the BigChange job management system, which incorporates a mobile workforce app, customer relationship management (CRM), job scheduling, live tracking, financial management, and business intelligence tools in one integrated platform, for around 2 years during which time the business has grown significantly. The cloud-based solution offers 24/7/365 access from any internet-enabled device and connects field engineers, in real-time, with back-office systems using the BigChange app. Improving engineer efficiency Fleet solutions, including vehicle checks, driver behaviour alerts, and real-time tracking, are helping Assured compete with larger players in the sector in terms of professionalism, health and safety, and responsiveness, while intelligent scheduling and resource allocation are improving engineer efficiency and reducing running costs. Assured is also benefiting from BigChange’s integrated CRM system which allows it to maximise sales opportunities manage existing customers, and undertake marketing campaigns with minimal admin resources. Capture, record, and share Assured is also using customisable job sheets, site history accounts, and job completion reports Assured is also using customisable job sheets, site history accounts, and job completion reports to capture, record, and share detailed information about completed installations, stock used, and additional works required. Complete with date, time, and location stamped photographs and signatures this information feeds into finance and reporting tools for customer updates and faster invoicing. Service and support "For us, it's all about automation," said Paul Salmon, adding "BigChange has introduced digital workflows and processes to all aspects of our business which has allowed us, as a relatively small organisation, to compete and often outshine, the larger operators." He concludes, "BigChange means we can concentrate on what we do best – installing the best possible systems, with the best possible service and the best possible support. This has contributed to an overall increase in business of between 60 and 70 percent." Round-the-clock protection At the forefront of the fire and security sector Assured is a family-run business with more than thirty years’ experience. Based in Essex with an office in central London, Assured is an NSI / NACOSS Gold and Fire Gold installer, working with domestic, industrial, and commercial customers across the UK. From individual homeowners to million-pound estates, local Councils to nationwide garage chains, Assured can tailor systems to individual requirements ensuring round-the-clock protection from unwanted intruders, personal attacks, fire, and flood.
Axis Communications, a pioneer in network video, has introduced Axis Cloud Connect, an open hybrid cloud platform designed to provide customers with more secure, flexible, and scalable security solutions. Together with Axis devices, the platform enables a range of managed services to support system and device management, video and data delivery, and meet high demands in cybersecurity. Cloud adoption trend The video surveillance market is increasingly utilising connectivity to the cloud, driven by the need for remote access, data-driven insights, and scalability. While the number of cloud-connected cameras is growing at a rate of over 80% per year, the trend toward cloud adoption has shifted more towards the implementation of hybrid security solutions, a mix of cloud and on-premises infrastructure, using smart edge devices as powerful generators of valuable data. Creating opportunity and delivering value The managed services enable secure remote access to live video operations Axis Cloud Connect enables smooth integration of Axis devices and partner applications by offering a selection of managed services. To keep systems up to date and ensure consistent system performance and cybersecurity, Axis takes added responsibility for hosting, delivering, and running digital services to ensure availability and reliability. The managed services enable secure remote access to live video operations and improved device management with automated updates throughout the lifecycle. It also offers user and access management for easy and secure control of user access rights and permissions. Secure-by-design solutions According to Johan Paulsson, CTO, of Axis Communications, “Axis Cloud Connect is a continuation of our commitment to deliver secure-by-design solutions that meet changing customer needs." "This offering combines the benefits of cloud technology and hybrid architectures with our deep knowledge of analytics, image usability, cybersecurity, and long-term experience with cloud-based solutions, all managed by our team of experts to reduce friction for our customers.” Powering the next-gen AXIS Camera Station The AXIS Camera Station suite is engineered to more precisely match users' needs With a focus on adding security, flexibility, and scalability to its offerings, Axis is also pleased to announce that it has built the next generation of its video management system (VMS) - AXIS Camera Station - on Axis Cloud Connect. Accordingly, Axis is extending its VMS into a suite of solutions that includes AXIS Camera Station Pro, Edge, and Centre. The AXIS Camera Station suite is engineered to more precisely match users' needs based on flexible options for video surveillance and device management, architecture and storage, analytics and data management, and cloud-based services. AXIS Camera Station Edge: An easily accessible cam-to-cloud solution combines Axis edge devices' power with Axis cloud services. It provides a cost-effective, easy-to-use, secure, and scalable video surveillance solution. It is easy to install and maintain, with minimal equipment on-site. Only a camera with an SD card is needed or use the AXIS S30 Recorder Series depending on the requirements. This flexible and reliable recording solution offers effortless control from anywhere. Available April 30, 2024. AXIS Camera Station Pro: It ensures customers have full flexibility to take control of their site and build the right solution A powerful and flexible video surveillance and access management software for customers who want full control of their system. It ensures they have full flexibility to take control of their site and build the right solution on their private network, while also benefiting from optional cloud connectivity. It supports the complete range of Axis products and has all the powerful features needed for active video management and access control. It includes new features such as a web client, data insight dashboards improved search functionality, and optional cloud connectivity. Available Q3, 2024. AXIS Camera Station Centre: Providing new possibilities to effectively manage and operate hundreds or even thousands of cloud-connected AXIS Camera Station Pro or AXIS Camera Station Edge sites all from one centralised location. Accessible from anywhere, it enables aggregated multi-site device management, user management, and video operation. In addition, it offers corporate IT functionality such as Active Directory, user group management, and 24/7 support. Available H2, 2024. Cybersecurity measures Axis Cloud Connect, the AXIS Camera Station offering, and Axis devices are all built with robust cybersecurity measures to ensure compliance with industry standards and regulations. In addition, with powerful edge devices and the AXIS OS working in tandem with Axis cloud capabilities, users can expect high-level performance with seamless software and firmware updates. The new cloud-based platform and the solutions built upon it by both Axis and selected partners aim to create opportunity and value throughout the channel, allowing companies to utilise the cloud at a pace that makes the most sense for their evolving business needs.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Our recent survey on the state of access control in 2023 showed that HID partners and end users, as well as security and IT professionals, may have varying needs and concerns but nearly all agree on one thing: the need for sustainable solutions. Operational transparency In fact, sustainability was a top issue for almost 90% of our survey respondents. Our end users and their consumers are primarily driving this demand, with ever-increasing numbers asking for operational transparency and requiring solutions that reduce environmental impact. And we’re not the only ones seeing these trends. The sustainability shift Together with ASSA ABLOY, they have committed to an ambitious sustainability programme Sustainability continues to be a key focus for HID and is a core consideration when it comes to the development and optimisation of products and solutions. Together with ASSA ABLOY, we have committed to an ambitious sustainability programme with specific, science-backed targets in line with the Paris Agreement. Initiatives While we work hard to lead the way, we’re certainly not alone. Investors are increasingly applying non-financial environmental, social, and corporate governance factors (ESG factors) as part of their analysis process to identify material risks and growth opportunities. Security vendors are including sustainability achievements in their reporting systems. Businesses are increasingly referring to “Net zero” and “renewable” initiatives. Bloomberg predicts that global ESG assets will exceed $53 trillion by 2025, that’s more than one-third of the anticipated total assets under management. The United Nations is focusing on sustainability with their Sustainable Development Goals (SDGs), a set of 17 goals and 169 targets that balance ESGs. Digital sustainability credentials This growing number of eco-minded organisations are seeking sustainability in every facet of their business, including their credential programmes. While digital credentials continue to be a solution that aligns with the sustainability agenda (in addition to delivering many other benefits!), many are seeking physical alternatives to traditional PVC cards. All of this presents a problem for providers: how to create cost-effective, sustainable, and highly-secure physical credentials? For HID, the answer is bamboo. Introducing the HID Eco Card HID Eco Card is made of sustainable, environmentally-friendly bamboo certified by FSC and TUViT Seal 5 The recently released HID Eco Card is made of sustainable, environmentally-friendly bamboo certified by the Forest Stewardship Council (FSC) and TUViT Seal 5. We love that it’s exceptionally fast growing and requires little agricultural intervention like fertilizer or pesticides, plus has low energy consumption and CO2 emissions during processing. Our customers also love that it reduces their plastic and consumables waste. Features In addition to being eco-friendly, the HID Eco Card is: Secure - SIO-enabled, featuring advanced Seos® encryption technology to keep data safe. Versatile - Compatible with a wide range of access control systems and ideal for a variety of applications. Durable - Designed for durability and reuse, with a three-year warranty. Brandable - Can be customised so brands can showcase their commitment to sustainability and security. Small shifts like opting for bamboo badges can make a real difference to the planet and public perception. It’s just one-way organisations are showing their commitment to sustainability and another way HID is pioneering the world in powering trusted identities.
Security beat
New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the new technologies’ value to customers and some typical use cases. The Innovation Lab has been in place for just under a year and just moved into a 2,000-square-foot facility that is staffed with four dedicated ADT Commercial employees and teams from various commercial innovation partners. The idea of the lab is to close the gap between the incubation of new technologies and the needs and realities of the ultimate customer. The goal is to adapt the design of a product to meet the customer’s need, instead of forcing the customer to adapt their use of the technology to meet its limitations. Addressing a problem Every project or investment at the innovation lab starts with the identification of the problem, never the solution" "Every project or investment at the innovation lab starts with the identification of the problem, never the solution," says Ed Bacco, Vice President, Enterprise Security Risk Group for ADT Commercial. “Then we develop detailed functional requirements to address what this technology needs to do to address the problem.” “Then – and only then – do we move toward developing the technical specifications to answer how the technology needs to operate to address the problem,” he adds. Prioritising innovation The approach sets ADT Commercial apart from most labs. The last item they focus on is the creation of a business model to address how they can sell the technology. “Early on, the company recognised that if we truly want to focus on innovation, we need to prioritise invention over profits, which is why the lab doesn’t operate under a profit-and-loss model,” says Bacco. This article will describe two recent technologies the Innovation Lab has been working with, and how they can impact the future of the security industry. Halodi Humanoid Robotics Unlike other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. Unlike some other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment, meaning that they can autonomously open doors, call elevators, present security badges, operate pins pads, and more. Observe and report functionality The basic use case for the bot is based on the fact that the role of 98% of all security guards is to “observe and report.” There is often a misconception in the public that guards are widely permitted to engage hands-on with alleged offenders, but most guarding contracts restrict that ability. Therefore, given the mundane and routine nature of guarding, humans find it a challenge to maintain the high degree of awareness that is needed, whereas the bots never waiver, never rest and never lose awareness. Alternative to human guards If a bot is to serve as an alternative to human guards, then it needs to interact with the human environment The bot wasn’t designed to be “human-like.” There is a general concept in humanoid robotics called the “uncanny valley” that defines a tipping point when humans become uncomfortable with humanoid robots if their design resembles humans too closely. However, if a bot is to serve as an alternative to human guards, then it needs to be capable of interacting with an environment that was designed for humans. That means opening doors, riding elevators, bending down, picking up items, etc. Remotely operated Current robotic devices are skilled at sensing/analysing the environments they are deployed in, but their ability to interact with them is limited. The other advantage of a humanoid robot is when it’s being remotely operated in the avatar mode, meaning virtually, the human operator finds the experience familiar and intuitively knows what to do. Access, intrusion, and VMS integration The bots can be integrated with access control, intrusion, and video management systems and can conduct patrols autonomously and report anomalies and/or respond to alarms via those same systems. The bots can be equipped with other sensors to constantly analyse the environment for threats to human life such as carbon monoxide, smoke, hazardous chemicals, or poor air quality. IR capabilities IR capabilities also enable the bot to detect the possible failing or overheating of equipment They are capable of “seeing” in the Infrared Range (IR), which makes them suitable for responding to the source of fire/smoke alarms while humans evacuate. IR capabilities also enable the bot to detect the possible failing or overheating of equipment. Although designed to operate autonomously, the bot can also be controlled by a simple point-and-click mapping device or using the avatar control system. Applications “The biggest challenge we’ve seen with customers who are conducting in-field pilots is aligning their excitement of how the bots can improve their traditionally non-security applications with the current capabilities,” says Bacco. These applications include using the bots to conduct safety audits of items like fire extinguishers and Automated External Defibrillators (AEDs), serving as a fire watch, greeting visitors in the lobby, and automating gates at industrial and distribution sites. Autonomous Indoor Drones COVID-19 has shown that customers are looking for predictable and repeatable solutions to meet their security needs" As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. “The COVID-19 pandemic has shown that customers are looking for predictable and repeatable solutions to meet their security needs that aren’t dependent on humans,” says Bacco. The three use cases for the drones are automated alarm response, random tours, and directed missions. Automated response mode In the automated response mode, when an alarm is triggered, the drone will automatically initiate a mission to the point of alarm and report any anomalies (i.e., people, heat signature, etc.). It can also be programmed to fly random patrols as a deterrent to a possible breach, and an operator can remotely initiate a mission using a simple point-and-click map interface. Drone mobility An obvious comparison is to fixed camera systems, which are an important component of any security system. But, unlike a fixed device, the mobility of a drone enables a view of an environment that is more easily understood by humans, meaning that we think and see in 3D, whereas fixed views are limited to 2D. Added to that, there is a deterrence factor that a mobile surveillance device has over a fixed. Noise consideration and applications Customers want to fly drones 24/7 in minimally manned locations such as data centres, warehouses The drone is designed to operate in environments that are being shared with humans. As an example, it will not initiate a mission if a person is standing under it, and it will autonomously alter course if a person is in its flight path. However, like all drones, the noise factor is a consideration, and the best applications in offices are after hours. Customers want to fly them 24/7 in more minimally manned locations such as data centres, warehouses, and manufacturing facilities, where noise is less a factor. Stand-alone and integrated system An indoor drone can be operated as a stand-alone system with its user interface, or it can be integrated fully with traditional security and VMS systems. “We are also developing additional computer vision-based analytics that will leverage the cameras on the drone,” says Bacco.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalisation is changing. Today, networking enables video images to be shared throughout a school system, travelling over existing networks, empowering a more centralised security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Multiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ cameras Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-light capability It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. There are video cameras available with extreme low-light capability to see in near-dark or complete darkness Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realised in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorised party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorised locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realised) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorise monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security market Smart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognisable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, and EPS, an Ohio-based security systems integrator announced a partnership to protect schools against the threat of gun-related violence. They also unveiled their first joint customer, the Tri-County Career Centre (TCCC) in Southeastern Ohio, which has adopted ZeroEyes’ proactive security technology to protect students, faculty, and staff. Camera placements The partnership aims to amplify customer service and extend the reach of ZeroEyes’ technology to new territories. EPS played a key role in the adoption and implementation of ZeroEyes at the TCCC, conducting site visits, identifying the most effective outdoor cameras, and working closely with ZeroEyes to determine the optimal camera placements. Public, and school safety “As a 100% family-owned business that has been operating for over 40 years throughout the US, EPS prides itself on staying ahead of the game when it comes to technology, the public, and school safety,” says EPS President Charles Wilde. “ZeroEyes’ edge technology and proven commitment to public safety fits squarely within EPS’s model. It's an impressive product, and it's only going to get better as AI continues to advance. I believe it to be a first line of defense against the school shootings that are happening throughout the US.” Comprehensive security integration services EPS specialises in custom solutions across fire detection, security, access control, and video surveillance Based in Canal Winchester, Ohio, EPS provides comprehensive security integration services from design through installation and maintenance. The company specialises in custom solutions across fire detection, security, access control, and video surveillance. “After seeing a ZeroEyes demo presented by an existing EPS client, I instantly knew we needed it as an additional layer of protection,” said Connie Altier, Superintendent of TCCC. “This technology provides a level of safety that I wasn’t even aware existed. Once I learned about it, there was no question in my mind—we had to implement it to ensure the highest level of security for our school.” TCCC Serving the community for 50+ years, TCCC educates 650 students spanning eight districts in rural Southeastern Ohio. The school offers programs for high school students and adults, and its diverse programs are designed to provide students with the critical know-how and real-world exposure needed to excel in their selected careers. TCCC is the first school in Athens County, Ohio to implement a multi-layered security system complete with security cameras, key card door access, a full-time onsite resource officer, and ZeroEyes. AI gun detection and intelligent situational awareness If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras. If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the school security team as quickly as 3 to 5 seconds from detection. Protection against gun-related violence “As we work toward a safer future for all, partnering with systems integrators like EPS helps us expand our reach to new areas so we can protect more people," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Our solution complements EPS's model perfectly, creating a powerful duo to enhance security measures. We look forward to working together to protect the TCCC and other future joint customers against gun-related incidents.”
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution is deployed at the University of New Haven. This integration marks the first time a Connecticut university has adopted ZeroEyes, enhancing the safety and security measures across the campus and surrounding areas. University of New Haven The University of New Haven, located on a suburban campus near New Haven, Connecticut, serves a community of over 10,000 students, faculty, and staff. Its comprehensive, multilayered safety and security strategy ensures protection 24/7/365 with features such as electronic card access gates, CCTV cameras, emergency phones, and the LiveSafe app, which facilitates real-time communication with the University Police Department that patrols the entire campus. Threat identify, assess, and respond With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify, assess, and respond to potential gun-related threats. “The security of our campus and the safety of our students, faculty, staff, and visitors are our paramount priority,” said Adam Brown, chief of the University of New Haven Police Department. AI-based gun-detection system “From our first conversations with ZeroEyes, it was clear they could help enrich the safety and security of our community by offering an AI-based gun-detection system that uses the most advanced technology – supported by a specially trained operations center – to identify and analyze the presence of a firearm." "Testing, implementing, and integrating ZeroEyes into our safety and security systems and protocols has been seamless. ZeroEyes’ expertise in this critical area of public safety provides an important tool that enhances the safety and security of our community.” Situational awareness software If a gun is identified, images are instantly shared with the ZOC which is staffed 24/7/365 ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location, to local law enforcement and university security as quickly as 3 to 5 seconds from detection. Campus safety “Our collaboration with the University of New Haven underscores their unwavering dedication to campus safety in Connecticut,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “By integrating our AI gun detection solution, the university is taking a significant step forward in safeguarding its students, faculty, and staff. We are honored to support their mission to create a secure educational environment.”
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution will be deployed at Appomattox County Public Schools (ACPS), Virginia to protect students and faculty against gun-related threats. ACPS Comprising four schools - a primary, elementary, middle, and high school - ACPS educates approximately 2,500 students annually. With a commitment to fostering a safe and nurturing learning environment for all students, the school has implemented several security measures in recent years. These include assigning individual School Resource Officers (SROs) to each school, facilitating comprehensive walkthroughs of all facilities by local and state law enforcement, installing exterior door alarms and student computer monitor software, and enhancing its after-hours surveillance system. ZeroEyes will be the latest addition to this multilayered security approach. School safety “School safety is of the highest priority right now, and to have a technology that could potentially save a life or stop a threat before anything happens made ZeroEyes a no-brainer for us,” said Philip Amos, Supervisor of Security and Technology, Appomattox County Public Schools. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. ZeroEyes Operations Center If a gun is identified, images are instantly shared with ZOC staffed 24/7/365 by specially trained U.S. military If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement, SROs, and ACPS staff as quickly as 3 to 5 seconds from detection. Swift and accurate security communications "In the instance of a gun-related threat, first responders and school leadership must receive swift and accurate security communications to help them navigate the potentially deadly situation,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are proud that ZeroEyes has been chosen to provide this type of situational awareness to Appomattox County Public Schools. Their proactive stance against gun violence is truly commendable."
Round table discussion
By all reports we have heard, 2024 is rushing by at a rapid pace. Many of us are just now catching our breaths after the busy holiday season, even though spring is practically here. Having had a healthy taste of 2024 already, our Expert Panel Roundtable is eager to weigh in on what lies ahead for the rest of the year to come. We asked this week’s panel: What large trends are driving growth in the physical security industry in the year ahead?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
White papers
3 ways AI can improve safety and reduce compliance costs
DownloadAssessing safety readiness for education campuses
DownloadImproving city mobility using connected video technology
DownloadMaking sense of today’s security camera options
DownloadHow to catch shoplifters with thermal imaging
DownloadHikvision DarkFighter Technology for high-quality images at night
DownloadHikvision Anti-IR Reflection Dome Camera
DownloadVideos
Day/Night surveillance: Manufacturers & Suppliers
- Hikvision Day/Night surveillance
- Dahua Technology Day/Night surveillance
- Bosch Day/Night surveillance
- LILIN Day/Night surveillance
- AV Costar Day/Night surveillance
- Pelco Day/Night surveillance
- Hanwha Vision Day/Night surveillance
- Sony Day/Night surveillance
- Illustra Day/Night surveillance
- Axis Communications Day/Night surveillance
- Messoa Day/Night surveillance
- Vicon Day/Night surveillance
- Visionhitech Day/Night surveillance
- UltraView Day/Night surveillance
- Bolide Day/Night surveillance
- LTV Europe Day/Night surveillance
- VIVOTEK Day/Night surveillance
- eneo Day/Night surveillance
- Panasonic Day/Night surveillance
- IDIS Day/Night surveillance
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download