Day/Night surveillance
Axis Communications, a pioneer in network video, has introduced Axis Cloud Connect, an open hybrid cloud platform designed to provide customers with more secure, flexible, and scalable security solutions. Together with Axis devices, the platform enables a range of managed services to support system and device management, video and data delivery, and meet high demands in cybersecurity. Cloud adoption trend The video surveillance market is increasingly utilising connectivity to the cloud, drive...
Quanergy Solutions, Inc., a pioneering provider of 3D LiDAR security solutions, and Viakoo, the award-winning provider of service assurance and network edge device management solutions for physical security systems, have announced a new partnership at ISC West 2024. The company's unique partnership provides a seamlessly integrated solution that combines the power of Quanergy’s 3D LiDAR detection, tracking, and classification technology with Viakoo’s industry-proven service ass...
March Networks®, a global pioneer in intelligent video solutions, announced the launch of a new subscription-based video solution called March Networks CloudSight. The cloud-based service is tailored to small and medium-sized businesses (SMBs) and quick service restaurants (QSRs). CloudSight March Networks CloudSight delivers a seamless direct camera-to-cloud video experience and is fully integrated and operational with Searchlight Cloud, the company’s advanced AI-based data analyti...
Everon, also known as ADT Commercial LLC, a pioneering security integrator and premier provider of commercial security, fire, and life safety solutions in the U.S., announced the opening of the Everon Innovation and Operations centre – known as the iO – in the Dallas, TX area. IO centre The iO is designed to be a hub of learning, innovation, and industry-pioneering collaboration and is home to the company’s dedicated monitoring and customer operations centre, groundbreaking I...
Hikvision has announced the latest generation of its Turbo HD range of analogue security products. Turbo HD 8.0 delivers a more comprehensive and interactive security experience for users, enabling them to augment their visual security environment. Four major innovations The revolutionary Turbo HD 8.0 includes four major innovations that bring users real-time communication, 180-degree video protection, and raised night vision to new heights. The enhancements extend the range of T...
Hanwha Vision, the global vision solution provider, is offering dual-light capabilities, with White LED lights and infrared in its intelligent Q Series AI cameras, to deliver enhanced and cost-effective low-light performance - ideal for keeping a wide range of outside areas safe. Dual-light capability and AI The dual-light QNE-C9013RL and QNE-C8013RL cameras remove the need for external illumination sources. This reduces the costs of additional lighting while avoiding light pollution from cons...
News
FLIR, a Teledyne Technologies company announced the expansion of its versatile Si-Series of acoustic imaging cameras with three models in the new Si2 family, designed for detecting compressed air leaks, specialty gas leaks, mechanical faults, and partial discharges: the Si2-Pro, Si2-LD, and Si2-PD. Si2-Series The Si2-Series offers industrial-grade solutions for the detection of air and gas leaks, as well as mechanical faults, such as bearing issues, addressing the top inspection requirements for industries, such as manufacturing, electrical, and utilities.FLIR’s new Si2-Series cameras provide superior performance, with the ability to identify issues over longer distances, detect and measure with increased sensitivity, and produce a more accurate classification of issues. Si2-Pro, Si2-LD, and Si2-PD models Improvements in acoustic camera picture quality include a 12 MP colour camera, 8x digital zoom, and LED illumination The new Si2-Pro, the Si2-LD, and the Si2-PD models offer the best image quality on the market. Improvements in acoustic camera picture quality include a 12 MP colour camera, 8x digital zoom, and LED illumination for addressing dark areas. The Si2 also has increased battery life to keep professionals in the field longer without the need for swapping power sources. Acoustic imaging advancements The specialty gas leak quantification and cost estimates have been expanded beyond compressed air to include other common industrial gases, such as hydrogen, CO2, methane, helium, argon, ammonia, and more. The Si2 cameras apply an array of acoustic imaging advancements that work to detect and quantify air and gas leaks, mechanical faults, and partial discharge, making them the top-performing acoustic imaging cameras on the market for these types of detections. Key features of Si2 models FLIR Si2-Pro: Industrial acoustic imaging camera for pressurised leak detection, mechanical fault detection, and partial discharge detection with on-camera severity assessments. FLIR Si2-LD: Industrial acoustic imaging camera for pressurised leak detection and mechanical fault detection in manufacturing and other industrial environments. FLIR Si2-PD: Industrial acoustic imaging camera for partial discharge detection with on-camera severity assessments for power infrastructure inspection. Advanced automatic filtering The new 'mech mode' feature of the Si2-Series enhances site safety by enabling quick detection FLIR’s advanced automatic filtering identifies leaks by their sound signatures even in the noisiest of industrial environments. The new 'mech mode' feature of the Si2-Series enhances site safety by enabling quick detection of mechanical issues, such as bearing faults, empowering professionals to rapidly evaluate conditions, identify problems, and implement solutions. On-camera decision support Plant professionals can swiftly identify mechanical, leak, and partial discharge issues, and then generate reports for urgent attention. On-camera decision support tools include mechanical defect measurement, classification and severity assessment of partial discharges, leak size estimation, and cost analysis. Enterprise-ready solution The Si2-Pro significantly cuts leaks in facilities to reduce expenses from compressed air and gas leaks The Si2-Pro, the most comprehensive solution that combines the features of the Si2-PD and Si2-LD, actively lowers costs by addressing mechanical bearing issues and partial discharge on electrical equipment, and it also significantly cuts leaks in facilities to reduce expenses from compressed air and gas leaks. “Increasing safety while avoiding costly failures is the aim of the new Si-Series. With the addition of three pioneering-edge models that scale up for professional use in a wide variety of situations, the new Si2-Series of cameras cement their position as the industry’s most complete, enterprise-ready solution,” said Rob Milner, Business Development Director, FLIR. Gas-leak quantification Rob Milner adds, “The highly capable FLIR Thermal Studio will also be upgraded to include gas-leak quantification, making data simple to record and easier to share via reports between users, cutting down the time to perform and record multiple site inspections.” To complement the Si2-Series of acoustic imaging cameras, FLIR provides its acoustic training platform and 24/7 support through its global service organisation.
SightLogix has enhanced its thermal AI detection engine with AI Auto Zoning, another step towards a “Point and Protect” strategy that makes outdoor security easier to set up and manage. AI Auto Zoning simplifies the process of creating comprehensive intruder detection policies with a single click. With a simple button, the SightSensor camera: Automatically draws active detection zones tailored to the camera’s detection range. Defines multi-layered human detection policies and activates Thermal AI nuisance alarm filtering. Displays the true detection range and AI classification distance as lines against the camera's field of view. Intelligently disregards distant areas not relevant to security, such as the sky or traffic. The result is a powerful combination of simplicity and reliable performance. Enabling mobile and remote video applications As a bonus, mobile security towers can be easily relocated from site to site, hassle-free Anyone tasked with monitoring outdoor sites will appreciate the significant value of reducing the time and costs of deploying an outdoor detection system. With AI Auto Zoning, even complex detection policies can be defined in seconds. As a bonus, mobile security towers can be easily relocated from site to site, hassle-free: A single click resets the zones and the camera automatically adjusts its detection areas based on the new location. Available for Sightsensors The Auto Zoning feature is available to all SightSensor cameras purchased after 2018 via a simple firmware update. This update also includes the latest Thermal AI classification model to enhance target classification accuracy. Building on a legacy of detection simplicity AI Auto Zoning is another SightLogix innovation that leverages its longstanding heritage of making outdoor video security highly reliable and easy to use. This includes: Thermal AI that reduces alarms during the day, at night, and in all weather. One-click geo-calibration, leveraging internal sensors that automatically determine target size, speed, direction, and distance from the camera. Massive coverage areas that protect outdoor sites with fewer devices. A web-based perimeter design tool – SightSurvey lets users design a virtual smart camera layout right in the browser, even before visiting the site.
Robotic Assistance Devices (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc. announced a significant addition to its suite of AI analytics. This innovation equips RAD’s robotic security solutions with the capability to detect the rampant threat of hook-and-chain ATM attacks plaguing the banking industry. Hook and Chain attack A Hook and Chain attack involves attaching one end of a chain or cable to an ATM and using a vehicle to exert force on the machine, usually by pulling the chain with the vehicle, to forcefully open the ATM’s safe doors, and allow thieves to access the cash inside. With this development, RAD continues to lead the charge in providing cutting-edge security solutions tailored to meet the evolving challenges faced by financial institutions and other enterprise clients. AI analytics Steve Reinharz, CEO/CTO of AITX and RAD commented, “This important addition to our growing suite of AI analytics is just another example of how RAD is listening, and responding, to the needs of our clients and prospects." "Since the very beginning, RAD has been in the business of saving clients’ money through innovative AI-powered solutions. This new analytic is the embodiment of that mission.” Increased ATM crimes According to a report by ATM Marketplace, the FBI reported 254 thefts in 2021, up from 229 in 2020 According to a report by ATM Marketplace, the FBI reported 254 thefts in 2021, up from 229 in 2020 and 31 in 2019. Hook and chain attacks were the pioneering ATM crime, in which thieves steal cash from an ATM and cause extensive property damage, sometimes with loss and damages approaching $500K per incident. Mark Folmer, CPP, PSP, FSyI, President of RAD, added, “The Hook & Chain analytic was requested during discussions with a pioneering national bank with over 1000 branches. It’s foreseeable that soon a large number of these locations will implement a ROSA or RIO to provide that extra layer of defence, security, and safety.” Reputational and financial impacts ATM attacks result not only in direct financial losses from stolen cash and property damage but also in significant reputational and financial impacts for banking institutions. The public perception of a bank’s security and trustworthiness can be severely damaged in the aftermath of such attacks, causing a loss of customer confidence and potential erosion of market share. Moreover, the costs associated with investigating and resolving these incidents, including legal fees, regulatory fines, and public relations efforts to restore trust, can further strain financial resources. ATM attack detection analytics Troy McCanna, RAD’s Senior Vice President of Revenue Operations, expressed optimism, stating, “This new analytic has the potential to propel RAD further into the banking and finance market segments." "We currently have highly satisfied banking clients who are eager to implement ATM attack detection analytics. Additionally, our sales pipeline includes several significant banking opportunities, and this enhancement should help move them closer to completion.”
Based on feedback from its valued channel partners, SonicWall announced its first delivery of many managed services that will be tailor-made for MSPs. SonicWall is adding endpoint vendors to its Managed Detection and Response (MDR) solution, creating a co-managed security service for new and existing MSPs who offer SonicWall Capture Client or Windows Defender. Cybersecurity platform Customers should expect to see a growing number of managed security offerings that include all things managed from firewalls to cloud security as the SonicWall platform expands. No single vendor can cover all aspects of cybersecurity alone - the threats are too numerous, too sophisticated, and too diverse. Cooperation and collaboration across the industry will be imperative to bolster cybersecurity. To that end, SonicWall is committed to creating a cybersecurity platform that not only allows for tighter integration across its portfolio, but with third-party vendors/partners too. Managed services SonicWall will be delivering an endpoint-agnostic solution, and the feedback has been overwhelmingly positive" “I am thrilled to witness the remarkable momentum sweeping across our business, empowering us to extend managed services to our growing community of MSPs,” said SonicWall CEO and President Bob VanKirk. “We listened to our community and will be delivering an endpoint-agnostic solution, and the feedback has been overwhelmingly positive. Our commitment to empowering our partners is evident, and we will continue to build a world-class security platform they need to sustain this current momentum.” MDR service SonicWall’s MDR service allows organisations the flexibility to choose a tool that’s right for their business by pairing it with several next-generation anti-viruses (NGAVs). All NGAV users can receive the same 24/7 monitoring, threat hunting, and anomaly detection from SonicWall’s dedicated SOC team. Current NGAVs supported are: Capture Client, SonicWall’s advanced EDR solution Windows Defender SentinelOne Cylance 24/7 monitoring Alert fatigue can be a problem as it can be difficult to identify true problems in the noise of false positives In many cases, MSPs don't have a team monitoring alerts around the clock, meaning there can be delays between receiving a critical alert and taking defensive action. Alert fatigue can also be a problem as it can be difficult to identify true problems in the noise of false positives. Adding a SOC provides 24/7 monitoring so that no alert is missed, no matter when it comes in. This allows for more immediate response, and overall, better security for both the MSP and their customers. SonicWall will also be rolling out an EMEA-based SOC in Q2 of 2024. Comprehensive and flexible portfolio SonicWall’s latest launch aligns with its outside-in approach, providing partners with a best-of-suite, comprehensive, and flexible portfolio that accelerates their growth, and it coincides with a larger plan to roll out globally leveraging Artificial Intelligence (AI) and other technology to drive scale and high-service experience. “Today’s MSPs increasingly need a platform of managed security solutions rather than point solutions,” said Senior Vice President of Managed Services at SonicWall Michael Crean. Integrated approach Customers gain 24/7 monitoring, full network visibility, proactive threat detection capabilities “SonicWall now delivers an integrated approach for end-to-end managed threat protection enabling MSPs to help customers navigate the turbulent cybersecurity landscape with confidence and resilience giving them a distinct competitive edge.” Organisations are in desperate need of a human layer of security to identify attacker behaviors across their networks. With this new offer, customers gain 24/7 monitoring, full network visibility, proactive threat detection capabilities, and advanced protection to ensure threats are identified and eradicated. SonicWall Riding Momentum SonicWall achieved a key milestone by adding managed services that will propel partner growth. Additionally, SonicWall doubled down on its cloud-security platform for the modern, remote workforce with its acquisition of Banyan Security by adding zero trust security relied on by pioneering Fortune 100 companies to small businesses who are replacing legacy architectures for SSE solutions, including Zero Trust Network Access (ZTNA).
Resideo Technologies, Inc., a global provider of solutions for home comfort, energy management, security, and safety launched a new video surveillance offering for residential and light commercial applications at its CONNECT 2023 Customer Event. The First Alert® Visual Experience (VX) Series features two video solutions that offer meaningful notifications for person, vehicle, animal, and package detection: the new First Alert® Outdoor Camera and the First Alert® Video Doorbell, announced in March 2023. AI-driven video detection "Video is a pioneering driver of consumer engagement within the smart home, and professional security dealers can offer cutting-edge video solutions with outstanding video quality and reliability backed by our trusted First Alert brand," said Pat Tessier, Senior Director of Product Marketing at Resideo. "The VX Series delivers premium performance, including AI-driven detection that can help reduce nuisance alarms for consumers, and a scalable video offering for professional installers." Features The new First Alert Outdoor Camera is available on the Total Connect® 2.0 app and features: AI-Driven Alerts: Consumers receive meaningful notifications that matter most to them. High-Resolution, Crystal-Clear Video: The 2-megapixel camera with a wide dynamic range provides vibrant, detailed video and features color night vision in addition to infrared night vision. Two-Way Interactive Audio: Visitors can be greeted, or intruders warned, via the siren or the spotlight deterrence features. Durable Design: Ethernet and WiFi networking provide installation flexibility and redundant, as does Power over Ethernet (PoE) and 12-volt DC (direct current) power options, while it can withstand a variety of extreme weather conditions – including temperature, (-40 to 122 degrees Fahrenheit), humidity, dust, moisture, and ultraviolet rays. Compact and modern design They designed something that's easy to sell, and connect, and its intelligence can keep pace" "Resideo's new First Alert Outdoor Camera checks all the boxes: they designed something that's easy to sell, and connect, and its intelligence can keep pace with our customer's surveillance system needs," said Paul Romanelli, President of Suffolk Security Systems and First Alert Pro Resideo Premier Partner. "Our installers also really like the compact and modern design and back box that stows cables out of the way." Integration and availability The First Alert Outdoor Camera integrates with Resideo's ProSeries Security Platform for on-screen video streaming and has flexible, seven and 30-day video clip storage options. The First Alert Video Doorbell and the First Alert Outdoor Camera are both available in North America through professional security dealers and on shelves at ADI Global Distribution, a Resideo company. Resideo CONNECT 2023 The annual CONNECT Customer Event began in 1991 and was previously named the First Alert Professional Convention. It brings together security, HVAC, and plumbing professionals for training, community service, new product and technology announcements, and to celebrate partner achievements. The 2023 CONNECT Customer Event, hosted in Scottsdale, Arizona, also showcased the impact Resideo's solutions can offer its professional services partners: security dealers, HVAC contractors, and plumbers.
With a rise in looting, smash-and-grabs, active assailants, and other security-impacting incidents in malls and retail locations, shoppers are concerned about their safety this upcoming holiday season. Allied Universal®, the world’s pioneering security and facility services provider, knows better than most that the holidays mean an uptick in crime, with the severity and frequency of these incidents almost certainly heightened in November and December. Author's quote “Retailers are being extremely proactive in ensuring a safe experience for customers and are investing in and dedicating resources to keeping shoppers and employees safe,” said Ty Richmond, Allied Universal president of retail. Allied Universal largest provider of security aces and firearm/explosive-detecting canines “Allied Universal is the largest provider of security professionals and firearm/explosive-detecting canines in the retail sector–approximately 10% (30,000) of our workforce in North America is dedicated to retail customers, representing a five percent year-over-year increase.” Top ten shopping safety tips Following are Allied Universal’s top 10 shopping safety tips that can keep holiday heists and Christmas criminals from ruining the magic of the season. Safety tips for holiday shoppers: Be aware of the surroundings at all times. Shop during daylight or at unpopular times. If must shop at night or during busy times, use the buddy system. There’s safety in numbers. Don’t shop ‘til they drop. Fatigue makes them more vulnerable to hazards and threats. Shop at retail locations with visible security guards. Know what to do in an emergency. Know the locations of exits, fire alarm pulls and hiding places like bathrooms and fitting rooms. Protect the wallet and credit card information, especially in line to pay. It’s an easy way to prevent identity theft and credit card fraud. Consider how much they're buying at once and how they’ll get it home safely. Park and lock the vehicle in a well-lit spot. Allow extra time and patience in busy parking lots. Don’t leave valuables or purchased merchandise in the vehicle where it can be seen. Conceal all items. If they find themself in a dangerous or unsafe situation, try to get away as quickly and safely as possible. If can’t do that, find a safe place to hide. And, if they can’t do that, defend and protect themself. Supporting data According to the nearly 2,000 chief security officers who took part in the 2023 World Security Report: 49% of North American companies are expecting to experience security incidents involving violent criminals (61% in the U.S., 33% global average). 46% of North American companies are expecting to experience security incidents involving petty criminals. (51% in the U.S., 35% global average). Last year’s most common external security threat was theft of company physical property at 32% (34% in the U.S., 22% global average).
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Our recent survey on the state of access control in 2023 showed that HID partners and end users, as well as security and IT professionals, may have varying needs and concerns but nearly all agree on one thing: the need for sustainable solutions. Operational transparency In fact, sustainability was a top issue for almost 90% of our survey respondents. Our end users and their consumers are primarily driving this demand, with ever-increasing numbers asking for operational transparency and requiring solutions that reduce environmental impact. And we’re not the only ones seeing these trends. The sustainability shift Together with ASSA ABLOY, they have committed to an ambitious sustainability programme Sustainability continues to be a key focus for HID and is a core consideration when it comes to the development and optimisation of products and solutions. Together with ASSA ABLOY, we have committed to an ambitious sustainability programme with specific, science-backed targets in line with the Paris Agreement. Initiatives While we work hard to lead the way, we’re certainly not alone. Investors are increasingly applying non-financial environmental, social, and corporate governance factors (ESG factors) as part of their analysis process to identify material risks and growth opportunities. Security vendors are including sustainability achievements in their reporting systems. Businesses are increasingly referring to “Net zero” and “renewable” initiatives. Bloomberg predicts that global ESG assets will exceed $53 trillion by 2025, that’s more than one-third of the anticipated total assets under management. The United Nations is focusing on sustainability with their Sustainable Development Goals (SDGs), a set of 17 goals and 169 targets that balance ESGs. Digital sustainability credentials This growing number of eco-minded organisations are seeking sustainability in every facet of their business, including their credential programmes. While digital credentials continue to be a solution that aligns with the sustainability agenda (in addition to delivering many other benefits!), many are seeking physical alternatives to traditional PVC cards. All of this presents a problem for providers: how to create cost-effective, sustainable, and highly-secure physical credentials? For HID, the answer is bamboo. Introducing the HID Eco Card HID Eco Card is made of sustainable, environmentally-friendly bamboo certified by FSC and TUViT Seal 5 The recently released HID Eco Card is made of sustainable, environmentally-friendly bamboo certified by the Forest Stewardship Council (FSC) and TUViT Seal 5. We love that it’s exceptionally fast growing and requires little agricultural intervention like fertilizer or pesticides, plus has low energy consumption and CO2 emissions during processing. Our customers also love that it reduces their plastic and consumables waste. Features In addition to being eco-friendly, the HID Eco Card is: Secure - SIO-enabled, featuring advanced Seos® encryption technology to keep data safe. Versatile - Compatible with a wide range of access control systems and ideal for a variety of applications. Durable - Designed for durability and reuse, with a three-year warranty. Brandable - Can be customised so brands can showcase their commitment to sustainability and security. Small shifts like opting for bamboo badges can make a real difference to the planet and public perception. It’s just one-way organisations are showing their commitment to sustainability and another way HID is pioneering the world in powering trusted identities.
Security beat
New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the new technologies’ value to customers and some typical use cases. The Innovation Lab has been in place for just under a year and just moved into a 2,000-square-foot facility that is staffed with four dedicated ADT Commercial employees and teams from various commercial innovation partners. The idea of the lab is to close the gap between the incubation of new technologies and the needs and realities of the ultimate customer. The goal is to adapt the design of a product to meet the customer’s need, instead of forcing the customer to adapt their use of the technology to meet its limitations. Addressing a problem Every project or investment at the innovation lab starts with the identification of the problem, never the solution" "Every project or investment at the innovation lab starts with the identification of the problem, never the solution," says Ed Bacco, Vice President, Enterprise Security Risk Group for ADT Commercial. “Then we develop detailed functional requirements to address what this technology needs to do to address the problem.” “Then – and only then – do we move toward developing the technical specifications to answer how the technology needs to operate to address the problem,” he adds. Prioritising innovation The approach sets ADT Commercial apart from most labs. The last item they focus on is the creation of a business model to address how they can sell the technology. “Early on, the company recognised that if we truly want to focus on innovation, we need to prioritise invention over profits, which is why the lab doesn’t operate under a profit-and-loss model,” says Bacco. This article will describe two recent technologies the Innovation Lab has been working with, and how they can impact the future of the security industry. Halodi Humanoid Robotics Unlike other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. Unlike some other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment, meaning that they can autonomously open doors, call elevators, present security badges, operate pins pads, and more. Observe and report functionality The basic use case for the bot is based on the fact that the role of 98% of all security guards is to “observe and report.” There is often a misconception in the public that guards are widely permitted to engage hands-on with alleged offenders, but most guarding contracts restrict that ability. Therefore, given the mundane and routine nature of guarding, humans find it a challenge to maintain the high degree of awareness that is needed, whereas the bots never waiver, never rest and never lose awareness. Alternative to human guards If a bot is to serve as an alternative to human guards, then it needs to interact with the human environment The bot wasn’t designed to be “human-like.” There is a general concept in humanoid robotics called the “uncanny valley” that defines a tipping point when humans become uncomfortable with humanoid robots if their design resembles humans too closely. However, if a bot is to serve as an alternative to human guards, then it needs to be capable of interacting with an environment that was designed for humans. That means opening doors, riding elevators, bending down, picking up items, etc. Remotely operated Current robotic devices are skilled at sensing/analysing the environments they are deployed in, but their ability to interact with them is limited. The other advantage of a humanoid robot is when it’s being remotely operated in the avatar mode, meaning virtually, the human operator finds the experience familiar and intuitively knows what to do. Access, intrusion, and VMS integration The bots can be integrated with access control, intrusion, and video management systems and can conduct patrols autonomously and report anomalies and/or respond to alarms via those same systems. The bots can be equipped with other sensors to constantly analyse the environment for threats to human life such as carbon monoxide, smoke, hazardous chemicals, or poor air quality. IR capabilities IR capabilities also enable the bot to detect the possible failing or overheating of equipment They are capable of “seeing” in the Infrared Range (IR), which makes them suitable for responding to the source of fire/smoke alarms while humans evacuate. IR capabilities also enable the bot to detect the possible failing or overheating of equipment. Although designed to operate autonomously, the bot can also be controlled by a simple point-and-click mapping device or using the avatar control system. Applications “The biggest challenge we’ve seen with customers who are conducting in-field pilots is aligning their excitement of how the bots can improve their traditionally non-security applications with the current capabilities,” says Bacco. These applications include using the bots to conduct safety audits of items like fire extinguishers and Automated External Defibrillators (AEDs), serving as a fire watch, greeting visitors in the lobby, and automating gates at industrial and distribution sites. Autonomous Indoor Drones COVID-19 has shown that customers are looking for predictable and repeatable solutions to meet their security needs" As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. “The COVID-19 pandemic has shown that customers are looking for predictable and repeatable solutions to meet their security needs that aren’t dependent on humans,” says Bacco. The three use cases for the drones are automated alarm response, random tours, and directed missions. Automated response mode In the automated response mode, when an alarm is triggered, the drone will automatically initiate a mission to the point of alarm and report any anomalies (i.e., people, heat signature, etc.). It can also be programmed to fly random patrols as a deterrent to a possible breach, and an operator can remotely initiate a mission using a simple point-and-click map interface. Drone mobility An obvious comparison is to fixed camera systems, which are an important component of any security system. But, unlike a fixed device, the mobility of a drone enables a view of an environment that is more easily understood by humans, meaning that we think and see in 3D, whereas fixed views are limited to 2D. Added to that, there is a deterrence factor that a mobile surveillance device has over a fixed. Noise consideration and applications Customers want to fly drones 24/7 in minimally manned locations such as data centres, warehouses The drone is designed to operate in environments that are being shared with humans. As an example, it will not initiate a mission if a person is standing under it, and it will autonomously alter course if a person is in its flight path. However, like all drones, the noise factor is a consideration, and the best applications in offices are after hours. Customers want to fly them 24/7 in more minimally manned locations such as data centres, warehouses, and manufacturing facilities, where noise is less a factor. Stand-alone and integrated system An indoor drone can be operated as a stand-alone system with its user interface, or it can be integrated fully with traditional security and VMS systems. “We are also developing additional computer vision-based analytics that will leverage the cameras on the drone,” says Bacco.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalisation is changing. Today, networking enables video images to be shared throughout a school system, travelling over existing networks, empowering a more centralised security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Multiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ cameras Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-light capability It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. There are video cameras available with extreme low-light capability to see in near-dark or complete darkness Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realised in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorised party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorised locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realised) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorise monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security market Smart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognisable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Case studies
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution will be deployed at Appomattox County Public Schools (ACPS), Virginia to protect students and faculty against gun-related threats. ACPS Comprising four schools - a primary, elementary, middle, and high school - ACPS educates approximately 2,500 students annually. With a commitment to fostering a safe and nurturing learning environment for all students, the school has implemented several security measures in recent years. These include assigning individual School Resource Officers (SROs) to each school, facilitating comprehensive walkthroughs of all facilities by local and state law enforcement, installing exterior door alarms and student computer monitor software, and enhancing its after-hours surveillance system. ZeroEyes will be the latest addition to this multilayered security approach. School safety “School safety is of the highest priority right now, and to have a technology that could potentially save a life or stop a threat before anything happens made ZeroEyes a no-brainer for us,” said Philip Amos, Supervisor of Security and Technology, Appomattox County Public Schools. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. ZeroEyes Operations Center If a gun is identified, images are instantly shared with ZOC staffed 24/7/365 by specially trained U.S. military If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement, SROs, and ACPS staff as quickly as 3 to 5 seconds from detection. Swift and accurate security communications "In the instance of a gun-related threat, first responders and school leadership must receive swift and accurate security communications to help them navigate the potentially deadly situation,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are proud that ZeroEyes has been chosen to provide this type of situational awareness to Appomattox County Public Schools. Their proactive stance against gun violence is truly commendable."
Motorola Solutions announced its deployment of 4,000 VB400 body cameras to police forces in Austria. The nationwide rollout will help front-line teams to de-escalate potentially dangerous situations, capture evidence during operations and improve safety and transparency in all interactions. The latest Global Peace Report stated that Austria is one of the safest countries in the world, but according to the Ministry of the Interior, extremism, smuggling and cybercrime continue to be threats to Austria's security. To meet these challenges, the Austrian government decided to invest in a number of initiatives to increase safety and security in the country, including the deployment of body cameras for the national police. VB400 body cameras They offer a pre-and post-recording ability to help ensure incidents are seized from the start “Body cameras have proven to play a crucial role in helping to improve safety at the front line, while also serving as a valuable source of evidence in criminal cases,” said Michael Kaae, corporate vice president at Motorola Solutions. “We see an increasing demand for video technology, including body cameras, in-car video and fixed video solutions to help first responders keep their communities safe.” The VB400 body cameras will be provided with VideoManager evidence management software, enabling the secure handling and storage of evidential footage. Officers can easily upload and manage video footage, organised by time, date and location as part of their existing daily workflows. They offer a pre-and post-recording capability to help ensure incidents are captured from the start. TETRA digital radio technology Motorola Solutions has been a trusted partner of public safety organisations in Austria for over 20 years. All public safety organisations including police, fire brigades and emergency services rely on the reliable and secure Tetron network, which uses TETRA digital radio technology from Motorola Solutions.
Established in 1952, a cluster of educational institutions situated in Meenambakkam near Chennai, Tamil Nadu, India, holds a prestigious position as one of the nation's oldest and most esteemed establishments. Throughout its history, it has developed primary and secondary schools alongside colleges in Chennai, providing an extensive selection of courses spanning science, arts, commerce, and business management. By 2016, it had transformed into a prominent research and post-graduate institution, featuring specialised research divisions in physics, mathematics, and economics. Business scenario Spread across a vast 40+ acre campus, the educational institutions accommodate over 9000 students and employ a dedicated faculty of more than 350 staff members. With over 100 classrooms, indoor and outdoor stadiums, auditoriums, seminar halls, libraries, labs, and hostel facilities, the infrastructure is extensive. Ensuring premises safety and security Institution identified the need for a comprehensive solution capable of effectively monitoring all areas Given the size of the campus and the significant student population, ensuring the safety and security of the premises became a primary concern. Despite having previously installed a competitor's video surveillance system, the coverage proved inadequate. Consequently, they identified the need for a comprehensive solution capable of effectively monitoring all areas, including schools, colleges, and hostel facilities. Their requirement was not only for thorough coverage but also for the ability to conduct both local and centralised monitoring from a single location. Challenges faced by the institution Securing over 9000 students and staff across the premises presented a significant challenge. A centralised video surveillance solution was needed to monitor both school and college premises from one location. The widespread infrastructure, including classrooms, auditoriums, playgrounds, and hostel premises, made centralised surveillance challenging due to its scattered nature. Previous installations of competitor video surveillance systems failed to provide extensive coverage in all necessary locations on the premises. A large number of cameras and recording servers with higher RAM were required for scalability. Concerns were raised about the reliability of competitor brands' servers, especially those based in China, as they could be vulnerable to hacking attempts, posing a threat to the security of the educational environment. Matrix solution Matrix proposed its professional series of 2MP Dome IP cameras to secure indoor premises such as classrooms, libraries, auditoriums, seminar halls, and administrative offices, ensuring comprehensive coverage. Additionally, 5MP Bullet IP cameras were recommended to safeguard outdoor facilities and infrastructure across the campus. Over 600 cameras were deployed throughout the school and college premises to provide extensive coverage. For recording and viewing the footage, Matrix experts suggested the Matrix ENVR - SATATYA NVR12808XCTS - 128 Channel Enterprise ENVR. Matrix ENVR features an in-built Video Management Software - Matrix SATATYA SAMAS, eliminating the need for separate software installation and providing a user-friendly GUI. Furthermore, Matrix's ENVR is seamlessly integrated with third-party IP Cameras already installed on the premises. Matrix ENVR offers centralised system management with well-defined user roles and rights, along with a distributed architecture enabling centralised configuration, user-based login roles and rights, and an Audit Trail of user activities and IP addresses. Products offered SATATYA MIBR20FL36CWS (470 Nos.): 2MP IR Bullet Camera with 3.6mm Fixed Lens SATATYA MIDR50FL28CWS (142 Nos.): 2MP IR Dome Camera with 2.8mm Fixed Lens SATATYA NVR12808XCTS (5 Nos.): 128 Channel Enterprise NVR with 8 SATA Port SATATYA SAMAS USER10: 10 Concurrent User Licence for Smart Client and Mobile Client Solution benefits Matrix IP Cameras ensured comprehensive coverage across the premises. Matrix ENVRs feature an in-built server and software - Matrix SATATYA SAMAS, eliminating the need for separate software investments and simplifying centralised video surveillance. Users could access any camera installed at any location from any remote location. Matrix Server-grade ENVRs, based in India, offer greater reliability compared to competitors' servers in China, reducing the risk of hacking attempts. With four levels of redundancies, Matrix ENVRs minimise system downtime even in the event of network and power failures.
CityFitness is one of the largest fitness gym chains in New Zealand. With almost 50 gyms across the country (average area: 5,000 square metres), each facility is open 24/7 and accommodates a huge number of people daily. A tailored automatic speedgate solution that is secure, reliable, and efficient is imperative to ensure quick access to their facilities and prevent unauthorised individuals from entering the gyms. Integration with a third-party platform CityFitness has an existing access control system from a third-party supplier. Integrating Dahua turnstiles with this system was not a simple task. Nevertheless, working together with a local partner installer, the local Dahua team was able to successfully integrate the Dahua turnstile gates with the existing third-party platform. Solution: Intelligent access control Dahua’s turnstile gates were successfully deployed in 10 gym facilities of CityFitness across the country. These swing turnstiles include DHI-ASGB610X-L (left side), Dahua DHI-ASGB620X-D (centre of dual lanes), and DHI-ASGB610X-R (right side). This solution provides an automatic access control management specifically tailored to City Fitness’ actual requirements for security, reliability, and efficiency. It is equipped with a built-in accurate people-counting function and infrared anti-tailgating sensors to prevent unauthorised access. Flexible integration It can be easily configured for single and multi-entry setups, making it suitable for a wide range of applications An alarm will sound if someone follows an entering person without swiping. It can be flexibly integrated with third-party platforms, with several access methods available such as RFID, facial recognition, and QR code scanning. Also, it can be easily configured for single and multi-entry setups, making it suitable for a wide range of applications. Results: Safe, reliable, and efficient access control This automatic speed gate solution developed by Dahua significantly transformed the access control management in CityFitness facilities, enabling quick access to their gyms while ensuring the safety of their members. The local Dahua team also provides unwavering service and support that significantly contributed to the overall success of the project. Anti-tailgating technology “CityFitness chose Dahua because their speed gate exceeded our expectations. It enhances our access control, and its anti-tailgating technology ensures a safe environment,” says Clint Paul, National Security Manager at CityFitness. "The integration options and configurability make it perfect for our needs."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its proactive AI gun detection and intelligent situational awareness platform has been selected by Woodbine Community School District in Woodbine, Iowa, to protect students, faculty, and staff from individuals attempting to bring illegal guns onto the campus. U.S. school shooting rates continue to surge. Enhancing school safety Woodbine Community School District, a rural pre-K-12 public school district that operates two schools and serves 500+ students, adopted ZeroEyes to address these growing safety concerns. “We are dedicated to enhancing school safety so that our teachers can focus on education and students can concentrate on learning,” said Justin Wagner, superintendent, of Woodbine Community Schools. Instant verification, validation, and communication Step in a series of proactive mitigation and safety precautions we are taking to keep students and staff safe" “Choosing ZeroEyes means instant verification, validation, and communication to local law enforcement of anyone wishing to harm students or staff with a gun." "Their outstanding team and 24/7/365 in-house operations centre provide us with the utmost confidence that we are providing the most advanced notification system available. This is an important step in a series of proactive mitigation and safety precautions we are taking to keep students and staff safe.” Actionable intelligence If ZeroEyes detects a gun on campus, the software will instantly send images to the ZeroEyes Operation Centre (ZOC), staffed by specially trained U.S. military and law enforcement veterans, 24/7/365. These experts will verify the threat and dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local Woodbine staff and first responders in as fast as 3 to 5 seconds from detection. AI gun detection technology "We're proud to see Woodbine Community Schools adopt our AI gun detection technology,” said Mike Lahiff, CEO and co-founder, of ZeroEyes. “We see it as our duty to help create a safer learning environment for children. We hope to see a day where schools are free from violence, ensuring students, parents, and staff can live without fear of gun-related threats.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
By all reports we have heard, 2024 is rushing by at a rapid pace. Many of us are just now catching our breaths after the busy holiday season, even though spring is practically here. Having had a healthy taste of 2024 already, our Expert Panel Roundtable is eager to weigh in on what lies ahead for the rest of the year to come. We asked this week’s panel: What large trends are driving growth in the physical security industry in the year ahead?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![3 ways AI can improve safety and reduce compliance costs](https://www.sourcesecurity.com/img/white-papers/612/shutterstock-1694245051-920x533.jpeg)
3 ways AI can improve safety and reduce compliance costs
Download![Assessing safety readiness for education campuses](https://www.sourcesecurity.com/img/white-papers/612/education-1-920x533.jpg)
Assessing safety readiness for education campuses
Download![Improving city mobility using connected video technology](https://www.sourcesecurity.com/img/white-papers/612/safe-city-3-920x533.jpg)
Improving city mobility using connected video technology
Download![Making sense of today’s security camera options](https://www.sourcesecurity.com/img/white-papers/612/vicon-todays-security-camera-option-920.jpg)
Making sense of today’s security camera options
Download![How to catch shoplifters with thermal imaging](https://www.sourcesecurity.com/img/white-papers/612/flir-retail-surveillance-620.jpg)
How to catch shoplifters with thermal imaging
Download![Hikvision DarkFighter Technology for high-quality images at night](https://www.sourcesecurity.com/img/white-papers/612/hikvision-darkfighter-620.jpg)
Hikvision DarkFighter Technology for high-quality images at night
Download![Hikvision Anti-IR Reflection Dome Camera](https://www.sourcesecurity.com/img/white-papers/612/anti-ir-camera620.jpg)
Hikvision Anti-IR Reflection Dome Camera
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Day/Night surveillance: Manufacturers & Suppliers
- Hikvision Day/Night surveillance
- Dahua Technology Day/Night surveillance
- Bosch Day/Night surveillance
- LILIN Day/Night surveillance
- AV Costar Day/Night surveillance
- Pelco Day/Night surveillance
- Hanwha Vision Day/Night surveillance
- Sony Day/Night surveillance
- Illustra Day/Night surveillance
- Axis Communications Day/Night surveillance
- Messoa Day/Night surveillance
- Vicon Day/Night surveillance
- Visionhitech Day/Night surveillance
- UltraView Day/Night surveillance
- Bolide Day/Night surveillance
- LTV Europe Day/Night surveillance
- VIVOTEK Day/Night surveillance
- Panasonic Day/Night surveillance
- eneo Day/Night surveillance
- IDIS Day/Night surveillance