Digital video surveillance
Allied Universal®, the security and facility services provider, announces that Carmen Randall, Vice President of Training and Development for North America, has earned the 2024 OnCon Icon ‘Top 100 Learning & Development Professional’ award. The OnCon Icon Awards are voted on by peers and presented to individuals based on accomplishments at their companies and within the talent acquisition community. Voters chose recipients who demonstrate a successful mix of achievements and...
The Monitoring Association (TMA) is pleased to announce that National Monitoring Center has renewed the prestigious ‘TMA Five Diamond Monitoring Center’ designation. This designation is granted annually to monitoring centres that satisfy all of the requirements of the ‘five points of excellence’. Commitment to ongoing job-related education and testing by having 100% of its monitoring centre operators certified using the TMA online training series on industry best pra...
Thales announced the release of the 2024 Thales Cloud Security Study, its annual assessment of the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organisations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (...
TeamViewer, a renowned global provider of remote connectivity and workplace digitalisation solutions, announced the integration of its technology into Sony BRAVIA Professional Displays. This strategic implementation is designed to improve the maintenance and incident response capabilities of managed commercial displays used in complex environments, such as restaurants, shopping malls, and airports. As a result, TeamViewer and Sony customers can improve efficiency and increase sustainability in...
HENSOLDT Australia has delivered a key milestone for the AIR5431 Phase 2 program by introducing a new Air Traffic Control (ATC) sensor into operational service at the Army Aviation Centre Oakey, achieving Initial Operational Capability for the Royal Australian Air Force (RAAF). Project AIR5431 Phase 2 is replacing the ageing Australian Defence Air Traffic System and Alenia surveillance sensors located at the Australian Defence Force’s fixed bases across Australia. The sensors pr...
Secure Logiq and Ivideon are pleased to announce a strategic partnership aimed at enhancing cooperation and delivering unparalleled video surveillance capabilities. Harnessing the strength of both companies, this partnership merges Secure Logiq’s advanced server technology with Ivideon's comprehensive cloud solutions, creating a hybrid approach that meets the dynamic needs of modern video surveillance. On-premises solutions With over 12 years of experience, Ivideon has emerged as a rapi...
News
With approximately 3,000 sheriffs covering 70% of the United States, managing resources efficiently is paramount. The integration of security cameras, drones, and body cameras with powerful facial recognition systems enables law enforcement to scan large areas in real-time or retrospectively, identifying suspect appearances and gathering valuable information. Some of these technologies will be showcased at the National Sheriffs' Association Conference in Oklahoma this week. Drones enhancing search and rescue operations Drones have become essential tools for sheriff departments, particularly in search and rescue operations. In Sumter County, Florida, the sheriff's office has utilised high-tech drones to quickly locate missing individuals, saving numerous lives. These drones provide real-time aerial surveillance, which is crucial in vast and challenging terrains where traditional search methods may be less effective. Body cameras identifying suspects in real-time Body cameras are now widely adopted to ensure transparency and accountability in law enforcement. These devices record interactions between officers and the public, providing evidence in cases of allegations of misconduct. Moreover, body cameras help in documenting crime scenes and capturing real-time events, essential for accurate forensic analysis and legal proceedings. Facial recognition for quick identification Facial recognition is rapidly being merged into law enforcement plans to expedite the process Facial recognition technology is rapidly being integrated into law enforcement systems to expedite the identification process. This technology is particularly useful for spotting wanted individuals and verifying the identities of inmates transported to court. Sheriff's departments use facial recognition to cross-reference faces with databases of known offenders, ensuring that suspects are correctly identified and apprehended swiftly. Corsight AI's advanced facial intelligence platform Corsight AI provides an advanced facial intelligence platform to law enforcement agencies worldwide. According to Shay Poleg, Corsight AI U.S. Sales Director: "Our platform allows for real-time scanning and post-event analysis, recognising wanted individuals and identifying suspicious scenarios. We provide sheriffs with the tools they need to enhance public safety and streamline operations. To be able to do this, you'll need software able to reliably recognise a face in real-world conditions of low visibility, poor video quality, limited camera angles, distance, motion, facial coverage, and outdoor darkness." Speeding forensic investigations In forensic investigations, advanced technologies play a pivotal role. When evidence is collected from crime scenes, drones and body cameras help document the scene meticulously. Video analytics and facial recognition further aid in the fast analysis of long hours of video footage to identify suspects or witnesses, significantly speeding up the investigative process. Sheriff departments across the U.S. are committed to leveraging these technologies to enhance their capabilities, improve public safety, and maintain the highest standards of accountability in their operations. As these tools continue to evolve, their integration into everyday law enforcement activities is expected to become even more widespread and sophisticated.
IDScan.net, a major provider of ID and identity verification software, is proud to welcome Dan Kelleher to its leadership team as the new Vice President of Operations. With an extensive background in finance and a proven track record of driving operational excellence during a thirty-year career at Hertz, Kelleher's appointment marks a significant milestone in IDScan.net's growth strategy. “Reducing the business impacts of identity theft and fraud has been a key challenge throughout my career,” said Dan Kelleher, adding “I’m excited to join the other side - an organisation leveraging technology to create solutions to reduce fraud. Already in my short time here I have seen firsthand how artificial intelligence, combined with significant investments in engineering, are necessary to combat modern, sophisticated fraud attempts.” Prior roles of Kelleher Kelleher began his career as an auditor in public accounting with a focus on banking Prior to joining Hertz, Kelleher began his career as an auditor in public accounting with a focus on banking, manufacturing, transportation, and retail clients. His Hertz career began as an Assistant Controller and advanced to Controller roles where he partnered with field operations to drive financial performance. Most recently, he led North America initiatives focused on operating cost efficiencies and process improvement before ending his career with the globally recognised car rental brand in late 2023. In his new role, Kelleher will help oversee onboarding and ongoing management of large, commercial accounts using the VeriScan or DIVE products for ID and identity verification. His experience in enterprise organisations makes him an ideal liaison between the IDScan.net team and the revenue, operations, finance, and security teams at large organisations searching for ways to deter bad actors. Identity verification market “I have been on the other side; working in a business and looking for solutions to theft and bad debt,” said Dan Kelleher, adding “Businesses should know that there are robust, powerful tools available to ensure your customers are legitimate. I expect a sea change over the coming years, as large, global companies realise an increased need to truly authenticate each customer. The security, operational, and financial benefits are simply too great not to put technologies in place.” Dan Kelleher is part of a large cohort of new hires at the New Orleans-based technology company, as the technology firm rapidly expands to service the growing identity verification market, expected to reach $30 billion by 2030.
Global IT services provider Claranet Benelux has entered into a new agreement with secure digital communication specialist Zivver. This collaboration offers companies and institutions in the Benelux region an easy way to prevent data leaks, communicate securely via email and meet the strict security requirements of NIS2 and DORA, among others. Claranet Benelux is a pioneering IT service provider that focuses on providing digital workplaces, security, networks and solutions in the field of managed hosting and cloud. Zivver helps organisations to prevent data leaks, communicate safely and appropriately secure information and comply with relevant legislation. Security and compliance requirements With Zivver, Claranet Benelux is adding solutions for secure emailing, secure file sharing, registered mail and digital signing to its managed services portfolio. Zivver requires no additional technical knowledge to integrate into customers' existing IT solutions. This allows organisations to continue using their current email tools, but also meet security and compliance requirements. Zivver requires no other technical facts to blend into clients' existing IT solutions By integrating Zivver into Outlook and Gmail, employees do not have to change their behaviour, but Zivver supports them with machine learning-based decision support to send the right information to the right person in the right way with the right security, while following the organisation's policy. Requirements of NIS2 and DORA According to Paul van Boerdonk, Managing Director at Claranet Benelux, things like secure emailing and secure file sharing should no longer be considered an option, but an absolute necessity. "Organisations must be sure that their email communications are secure and that their confidential information does not fall into the wrong hands. This will become even more important in the future to meet the strict requirements of NIS2 and DORA." “Claranet Benelux is offering its customers a secure digital communication platform that guarantees them privacy and confidentiality. Apart from the ease of use and security that Zivver offers, the fact that it is the market leader was the deciding factor for us with over 10,000 customers worldwide.” Zivver's solutions Rick Goud, CIO at Zivver, is also positive about the collaboration. He added: "Claranet has a proven track record in providing cloud and network services to companies in the Benelux region. We share the same ambition and vision on ensuring the privacy and security of companies and institutions. Together we can offer strong added value to Claranet Benelux customers and help them increase resilience against data leaks." Zivver's solutions for secure emailing, secure file sharing, registered mail and digital signing are now available to all Claranet Benelux customers. With Zivver, companies can save time and costs and benefit from a safe, user-friendly and efficient way of digital communication.
Barco, a pioneer in control room solutions, is showcasing its updated portfolio designed for the control rooms market at InfoComm 2024 (Las Vegas, NV, 12-14 June). With new flagship products in control room software, as well as its LED video walls and LCD video walls, the company sets new standards for the market. To optimally bring these products to market, Barco announces partnerships with WESCO, the major US distributor of professional electronics, and the French distributor IP-Partners. Video walls Barco has been designing visualisation solutions for the control rooms market since the early 1990s, focusing particularly on large video walls and display controllers. The release of powerful networking and software solutions in later years positioned Barco, as a manufacturer of complete control room solutions. Since 2022, the company has entirely updated its flagship product portfolio. Barco CTRL Barco just released the 1.3 version, and a major update containing several exciting features is planned The introduction of Barco CTRL, Barco’s innovative software and hardware platform for control rooms, added a new dimension of simplicity, scalability, and (cyber)security to the operator workflow. This platform is continuously enhanced with new features, making it even more powerful and performing. Barco just released the 1.3 version, and a major update containing several exciting features is planned for this summer. TruePix (TP) The launch of TruePix (TP), the premium LED video wall solution combined with the new Infinipix Gen2 image processor, was a major milestone for large visualisation displays. This range is now expanded with the TP-I variant which brings more brightness with lower power consumption – further reducing the ecological footprint of the solution. ISO/IEC 27001 certification Additionally, the recent (September 2023) launch of Barco UniSee II has further perfected the viewing experience for LCD video walls. To emphasise its dedication to security, Barco was also granted the ISO/IEC 27001 certification for its control room solutions – the most prominent guide for establishing, implementing, maintaining, and continually improving an information management system. A broader market accessibility In France, Nantes-based distributor IP-Partners has included Barco CTRL in its product portfolio To bring these powerful and innovative solutions to a broader market, Barco teamed up with major US distributor WESCO. Starting in June 2024, this established and highly trusted Pennsylvania-based company will distribute Barco products to customers in the American market. In France, Nantes-based distributor IP-Partners has included Barco CTRL in its product portfolio, broadening the market reach for our products. Significant advantage "These new partnerships are part of the expansion ambitions of Barco’s control rooms business unit," says Tom Sys, Executive VP of Barco Control Rooms. He adds, "The combination of an innovative portfolio and vast expertise gives us a unique position in the market, and we want to be as accessible as possible to future users. The power and high level of security of Barco CTRL, for example, give us a significant advantage over the competition. We feel this is our momentum, and we’re planning to seize every opportunity." Exciting upcoming projects The drive and ambition of the Control Rooms division have resulted in several high-profile projects. For example, MotorLand Aragón, a renowned racetrack in Alcañiz (Spain), has upgraded its safety using Barco technology to visualise and distribute all video and data of the circuit. Additionally, the British satellite telecommunications company Inmarsat has installed three new control rooms at their London site, featuring Barco LED video walls and networking solutions. Emergency response infrastructure For the refurbishment of its control rooms, the French National Police also turned to Barco, modernising its emergency response infrastructure with a Barco UniSee wall and TransForm N networked visualisation platform. By designing products and solutions that fully meet the customers’ needs, Barco lives up to its promise: Empowering control rooms excellence. Visit them at InfoComm 2024 (Las Vegas, 13-14 July), booth number C5309.
The full-day expo is headed to New Jersey and expects up to 5,000 attendees and hundreds of exhibitors, with the Bridge Cable team as some of those attendees. The full team of Bridge Cable is set to attend the ADI Expo 2024, as it makes a stop in Cherry Hill, New Jersey on Tuesday, August 27th, 2024. ADI Expo The annual event exhibits manufacturers like Honeywell, Resideo, Telguard, Turing, DSC, Yale, and more. Attendees will be spending the day learning the latest trends within telecommunications and receiving hands-on training from industry experts. The Bridge Cable team will be networking with these major suppliers and various members of the ADI team, and sharing updates about their newest projects, services, and partnerships. Past expo experiences A senior technician at Bridge Cable, Ray Faas, shared some insight about the team’s past experiences A senior technician at Bridge Cable, Ray Faas, shared some insight about the team’s past experiences with the expo, and their excitement for the next one, "I am super excited to be going back to the ADI Expo again as there is always something new to learn about in the telecommunications industry." He adds, "I love seeing the new products and keeping up with the technology as it advances. Something is going on in every part of the building with the grand ballroom having vendors and meals like breakfast, lunch, and dessert, and classes and demonstrations going on as well." Networking opportunity Ray Faas continues, "I have been to a few classes in the past that discussed fibre, access control systems, and video surveillance, and have been to both a door lock and security camera demonstration." He further stated, "There are a ton of different sales representatives that you can network with from security camera companies to hardware/tool companies, and they always take the time to share valuable information with you and answer any questions you may have. There is also a ton of awesome gear and products that ADI gives away throughout the event, which is an aspect I am always excited about!"
TrueConf, a major provider of secure video collaboration solutions, unveiled TrueConf AI Server at GITEX Africa 2024. The team messaging and video conferencing server introduces new on-premises AI that operates within a corporate network and enables automatic generation of a meeting protocol, ensuring safe data processing. Artificial Intelligence (AI) Artificial Intelligence (AI) has become an upward trend with expectations to rise to $1.339.1 billion by 2030, at a CAGR of 35.7%. As video collaboration continuously features rapid technology advancements, its development cannot be imagined without the integration of Machine Learning and Artificial Intelligence that significantly enhance video communication experiences and solve most of the typical users’ tasks. TrueConf AI Server Large enterprises, security forces, and government agencies set high requirements for sensitive data protection However, large enterprises, security forces, and government agencies set high requirements for sensitive data protection and full control over the implemented solutions, as they integrate video conferencing and team messaging into the core operations. Responding to these demands, TrueConf developed the TrueConf AI Server which was first presented to the global IT community at GITEX Africa 2024. Key features In addition to the entire range of AI features, such as noise suppression, virtual backgrounds, face tracking, smart meeting assistant, and voice-activated layouts, the server has a built-in algorithm for automatic conference transcription. TrueConf AI Server is deployed on companies' premises and can operate within corporate communications networks of any complexity without an Internet connection. Thus, all meeting minutes are generated and stored within the private network in a closed circuit without third-party access. Automatic conference transcription When scheduling a meeting or during it, an owner or moderator adds a special AI bot to the conference in a few clicks. A smart algorithm automatically starts the recording, captures all the discussion, and transforms speech into a detailed meeting protocol. TrueConf AI Server recognises spoken words cutting off extraneous sounds. This ensures specialised terminology, punctuation, and other conversation nuances are accurately converted into a chat or a timed conference script, organised by speakers. Text and audio The recorded discussion can be easily reviewed using a built-in audio player, empowering users to replay The recorded discussion can be easily reviewed using a built-in audio player, empowering users to replay specific segments by clicking on a phrase or conducting a keyword search. The conference owner can share meeting minutes with colleagues and the protocol can be saved in both text and audio formats for future reference or streamlined archiving. An intellectual search TrueConf will soon introduce an intellectual search that will enable users to find necessary information in the meeting transcript based on meaning, rather than relying solely on exact words. Additionally, the company is already working on the next step, the implementation of AI technologies to create an automatic summary with the most important information based on the meeting results. This innovative feature will make it easier to extract valuable insights from discussions.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Dahua Technology Indonesia has donated a Dahua DeepHub Smart Interactive Board to the Faculty of Economics and Business (FEB) at Universitas Gadjah Mada (UGM), demonstrating the company’s commitment to supporting the advancement of education in Indonesia. The Country Director of Dahua Technology Indonesia, Royce Ouyang, expressed his gratitude for this charitable opportunity during the handover event held at the Alumni Hall of FEB UGM on March 14. Royce Ouyang said, "We are pleased to contribute to the development of education in Indonesia. We hope this 75” Dahua DeepHub Smart Interactive Whiteboard can enhance students' learning experience, enabling them to be more interactive and innovative in class and be in line with the latest developments abroad." Artillery of sophisticated features The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device. Its package includes the smart interactive whiteboard, plug-in USB camera, 11th generation i5 processor 8GB+256GB, activated Windows 11 Pro, as well as a mobile stand and wireless screen sharing cable. This intelligent device is equipped with an artillery of sophisticated features, including a 4K screen, eight quick access buttons, fast charging, fast file sharing, the ability to switch between Android and Windows, a high-resolution camera, wireless screen sharing with various devices, and other advanced functions that enable smoother and more collaborative interaction in the classroom. Dahua DeepHub Smart Interactive Whiteboard The Dean of FEB UGM, Prof. Dr. Didi Achjari, M.Com., Ak., CA, expressed his appreciation for the generous donation, stating that the device will not only bring a more collaborative learning experience for their students, but also support various educational activities, research, and community service at FEB UGM. "We are committed to utilising it as best as possible to improve the quality of education in our environment," he said. "The support of advanced devices such as the Dahua DeepHub Smart Interactive Whiteboard facilitates FEB's academic community in adopting innovative teaching methods. Thus, it can improve student absorption and prepare them to face future challenges," said Gumilang Aryo Sahadewo, SE., M.A., Ph.D., Vice Dean of FEB UGM. He also stated that the use of the Dahua DeepHub Smart Interactive Whiteboard is expected to enhance the interaction between lecturers and students and facilitate collaboration in the learning process. Industrial sector and education In addition, this equipment can also support the development of innovative and technology-oriented curricula. "With this equipment, we hope that FEB UGM can continue to strengthen its existence as a pioneering educational centre that innovates and is competitive," he added. With the donation of Dahua DeepHub Smart Interactive Whiteboard to FEB Universitas Gadjah Mada, Dahua took a positive step towards strengthening the relationship between the industrial sector and education, empowering the youth of now and enabling a smarter society and better living.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed toward this sector, estimated to grow at about 10% per year. There is no doubt that the Middle East has become one of the most important and fastest-growing security markets in the world. While traditional real estate management requires a location-based approach, the digital transformation of the marketplace means that centralised systems management will replace the traditional approach, and that's exactly what Provis is starting to think about. The customer Provis is a property management company based in the United Arab Emirates (UAE) Provis is a property management company based in the United Arab Emirates (UAE). With over 25,000 units under property management, over 28,000 units under Owners’ Association management, and thousands of properties sold and leased. Based on their accumulated in-depth industry knowledge, and technical expertise, it is their commitment to provide sustainable value-added services through the assets of their clients. Integrated service solutions To provide integrated service solutions based on international standards, allowing clients to focus on their core business with peace of mind, thereby setting a new benchmark for integrated real estate service solutions globally. For its owners to centrally manage their users and deliver smarter, easier real estate solutions to their customers, Provis turned to Anviz's integrator partners, PROGRESS SECURITY & SAFETY SYSTEMS and MEDC, for assistance. The challenge The company's business continues to grow and expand across various regions of the country Traditional property management in the UAE local area is inefficient and intensive, property managers need to spend a lot of time and energy to manually deal with those complicated and repetitive work. Conventional management is unable to effectively analyse a large amount of data, making it difficult to provide a basis for decision-making. Impact on user experience The delay and errors of manual processing are the very drawbacks that can be precisely removed in information management. Moreover, as the company's business continues to grow and expand across various regions of the country, the practice of processing information in a decentralised manner by location not only tends to create information silos, making it difficult to integrate and share data but also leads to delays in customer service due to lack of information exchange, thereby affecting user experience and the corporate image. The solution Thinking about the cut-and-dry and providing a heartfelt service Face Deep 3 maximises supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres No matter whether in the youthful campus or orderly government and other places, there will be the movement of people. Quickly and accurately checking people is a basic requirement for front-end devices, and their Face Deep 3 maximises this need. It supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres (6.5 feet) in less than 0.3 seconds, with customised alerts and various reports. The Account Manager of Provis said, "In the past, we always struggled with the data integration of multi-point control. Having used terminal devices and software that were not part of a single system, we found that it had no linkage effect and could not solve the problem of event recording and data sharing. And location-based time and attendance solutions were ineffective in centralising user management." Perspective of the CrossChex system Based on the scenario of property management, the personnel are scanned and inspected by Face Deep 3 and then redirected to the management department through the CrossChex application and CrossChex Cloud Web software to achieve data sharing and transfer. Thus, the workflow of the property personnel is streamlined and standardised. Efficiency and cost management CrossChex system integrates the property work content in an all-round and multi-dimensional way From the perspective of the CrossChex system, it integrates the property work content in an all-round and multi-dimensional way, which makes property management more scientific and orderly, improves management efficiency, and reduces cost. Meanwhile, the CrossChex system adopts a centralised management approach to gather all the information resources on a single platform. It also supports integration with ERP solutions to facilitate integrated management, which can reduce manpower and improve efficiency. The benefits Precision management, digital intelligence service CrossChex Cloud, as a software platform with customised functions based on customer scenarios, combined with Face Deep 3, which is embedded with the most updated technological algorithms, seamlessly handles the data of people's movements and promptly processes the event records to form multi-form visualisation reports. Additionally, it supports business customisation and expansion to meet different business needs. It provides safe and reliable data encryption and rights management to protect user information security. Client’s quote Provis' Project Manager said, "Choosing to use Anviz's time attendance devices and cloud-based platform, allowed us to solve 89% of the repetitive steps for our owners' property management matters, making our brand image more visible."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its solution has been selected by Iowa’s Murray Community School District to identify illegally brandished guns on campus and help protect students and faculty against gun-related violence. Murray Community School District serves 300 students in Murray, Iowa in grades pre-K-12. The district provides an educational environment that challenges the status quo and makes it its mission to clear away any roadblocks that constrain creativity and innovation. New layer of security “While we are a small, rural community, if there is anything we have learned it’s that gun-related violence can happen anywhere,” said Tim Kuehl, superintendent of Murray Community School District. “We are prioritising the safety and security of our students and faculty, and ZeroEyes ensures that our campus is protected from gun-related threats 24/7. We are proud to add this new layer of security to make our community safer.” Existing digital security cameras ZeroEyes' AI gun detection and clever situational grasp software layers onto security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school staff as quickly as three to five seconds from detection. AI gun detection solution “Gun-related violence in school communities is far too common,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Murray Community School District is addressing this problem head-on by adopting our AI gun detection solution. We are grateful to have the opportunity to proactively combat this issue and alert local authorities of a potential threat before it happens.”
An end-to-end IDIS video solution has overcome performance, quality, and affordability challenges that had hampered public space surveillance in Bristol city centre. The upgrade, which tackled a growing list of problems including degraded picture quality, unreliable transmission and data storage, and poor usability, has been completed at Temple Quay and Glass Wharf by KIS Fire & Security. GDPR-compliant video surveillance The successful project is enabling significant operational improvements by the 24/7 security team that manages the site, according to Property Manager, Avison Young. The company reports faster responses to medical incidents and more effective prevention of petty crime and antisocial behaviour, thanks to surveillance coverage without blind spots and the ease with which officers can retrieve and export GDPR-compliant video evidence to support police investigations. Temple Quay and Glass Wharf The original video system at the site was almost twenty years old and proving to be increasingly unreliable Temple Quay and Glass Wharf are part of the Bristol Temple Quarter Enterprise Zone which is home to hundreds of businesses, government offices, serviced offices and co-working spaces, bars, restaurants, and residential properties. The original video system at the site was almost twenty years old and proving to be increasingly unreliable, with underground cabling and equipment prone to flooding and cameras producing increasingly poor-quality images. Challenges faced "The problems were made worse by a cumbersome VMS operating system," says KIS Director - Rob Morgan, adding “The prospect of a complete system upgrade seemed daunting because it would need a complete replacement of the backbone infrastructure, cameras, recorders, etc. and a new VMS management system." He continues, "But we were able to satisfy Avison Young with IDIS technology, showing them a major public space system that we’d recently completed for Bristol Zoological Society.” IDIS Center VMS The new solution, managed by the cost and licence-free IDIS Center VMS, includes NDAA-compliant 8MP IDIS PTZ cameras delivering superior images at up to 31x zoom; vandal-resistant 5MP IR dome cameras; 8-ch 4K recorders supporting UHD display; a specialist network operator’s keyboard; plus, mountings, POE switches, and all other network accessories. The system is easier to use and gives the security team complete area coverage, including full visibility KIS completed the upgrade ahead of schedule in under four months, with rapid installation supported by IDIS plug-and-play DirectIP® technology ensuring instant and seamless functionality of all devices. The system is also easier to use and gives the security team complete area coverage, including full visibility along – and across – a waterway that runs through the site. Instant device functionality “With IDIS, the instant full functionality of all devices means we can be more certain about completion times, even for major public space projects like Temple Quay and Glass Wharf,” says Rob Morgan. He adds, “The system also comes with extended warranties, and failover protection against loss of data in the event of network instability - for public area surveillance this kind of reliability is essential.” Award-winning solution “Following our successful partnership with the award-winning solution for Bristol Zoo, IDIS was delighted to support KIS with this major city centre surveillance project,” says Jamie Barnfield, Senior Sales Director, IDIS Europe. He adds, “Both these projects show video technology at its best, helping to create welcoming public spaces where people can feel safe.”
The Greening Campaign, founded by Terena Plowright, has set its sights on an ambitious goal: to make the entire United Kingdom greener, one community at a time. This initiative seeks to address a pressing concern—the widespread lack of awareness about the importance of energy efficiency within homes. According to Citizen’s Advice, the average UK home loses approximately £350 each year due to poor insulation. This loss escalates to as much as £951 annually for the least efficient homes. These figures show the significant financial impact of energy inefficiency on homeowners across the country. Complicating the situation further is the fact that many of the critical areas where heat loss occurs are invisible to the naked eye. This challenge requires the use of specialised equipment capable of detecting and addressing these elusive energy leaks. Given that the Greening Campaign operates primarily through the efforts of volunteers, the tool needs to be not only effective but also user-friendly. Solution Recognising the need for an accessible tool to identify and demonstrate energy inefficiency, the Greening Campaign selected the FLIR C5 compact thermal camera for its user-friendly design. Terena explained, "When we were looking at the camera, we were thinking about, 'What would people be confident to use?' We chose the FLIR C5 because it resembles a mobile phone." The FLIR C5 cameras were distributed to community members, enabling them to visually detect Colin, a volunteer for the Greening Campaign and a surveyor, shared his excitement about the potential of thermal imaging to reveal numerous solutions to energy loss problems; ‘’It was fascinating to hear how many answers there are to the problems people have of energy loss through losing heat. I, personally, as a surveyor was fascinated to see what results we’d get from using a thermal camera.’’ The FLIR C5 cameras were distributed to community members, enabling them to visually detect where heat was escaping from their homes, thereby making the invisible, visible. Colin gives details on his and the volunteer's first outing with the thermal cameras, ‘’We went out to our first few, very much, as amateurs. We played around with the cameras—it took around half an hour, and that’s all, to understand it.’’ Results Volunteers equipped with thermal cameras have been able to demonstrate the tangible benefits of energy efficiency to homeowners in a visually impactful way. Terena shares the positive effect of making it easier for people to understand and address heat loss issues: "When you’re telling people about energy loss, it’s very difficult to get them to really see that, but when you’ve got it in technicolour, right in front of them, they really understand where that heat loss is. And this is the beauty of these cameras; you can see where roof insulation has even the smallest gaps—it will show through." The campaign has created a ripple effect, with more than 200 wards now fitted to pass on their facts Kirsty, a community member, explains her experience with the initiative: "Everyone was really friendly; we looked at every window and door together, picked out areas that I might not have noticed—it was really beneficial to do. I’m definitely concerned about reducing my carbon footprint." She also highlights some simple answers to heat loss: "Little things like draft excluders—everyone can use those, shutting the curtains early, keeping all the heat in—and it doesn’t have to cost a lot." Moreover, the campaign has created a ripple effect, with more than 200 communities now equipped to pass on their knowledge and experiences to others. This grassroots movement, powered by the dedication of volunteers and the innovative use of FLIR thermal cameras, is creating a patchwork of energy-efficient communities. As Colin put it, "What each of us can do—we're a drop in the ocean, but, actually, all together, we are that ocean; we can make those changes." The success of the Greening Campaign underscores the power of community engagement, accessible technology, and hands-on education in driving significant environmental change. It's a compelling model for how local actions can contribute to global solutions, one community at a time.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Total cost of ownership for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/tco-headersecurity-informed-sizes-920-x-533-px.png)
Total cost of ownership for video surveillance
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![Securing your growth with video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696953044.png)
Securing your growth with video surveillance
Download![Identity and access management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696251563.png)
Identity and access management
Download![3 ways AI can improve safety and reduce compliance costs](https://www.sourcesecurity.com/img/white-papers/612/shutterstock-1694245051-920x533.jpeg)
3 ways AI can improve safety and reduce compliance costs
Download![Healthcare Surveillance: Finding efficiencies from OR to ER and beyond](https://www.sourcesecurity.com/img/white-papers/612/wp-image-920x533.jpeg)
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download![Intelligent video security solutions](https://www.sourcesecurity.com/img/white-papers/612/920x533_1678462513.png)
Intelligent video security solutions
Download![Assessing safety readiness for education campuses](https://www.sourcesecurity.com/img/white-papers/612/education-1-920x533.jpg)
Assessing safety readiness for education campuses
Download![5 must-haves for seamless VMS connectivity](https://www.sourcesecurity.com/img/white-papers/612/pelco-lg-image-920x533.png)
5 must-haves for seamless VMS connectivity
Download![The future of healthcare security is connectivity](https://www.sourcesecurity.com/img/white-papers/612/healthcare-1-920x533.jpg)
The future of healthcare security is connectivity
Download![Improving city mobility using connected video technology](https://www.sourcesecurity.com/img/white-papers/612/safe-city-3-920x533.jpg)
Improving city mobility using connected video technology
Download![Charting the path to safe cities](https://www.sourcesecurity.com/img/white-papers/612/safe-city-2-920x533.jpg)
Charting the path to safe cities
Download![The borderless control room](https://www.sourcesecurity.com/img/white-papers/612/borderless-control-room-920.jpg)
The borderless control room
Download![Delivering a smart, secure and healthy workplace with cloud](https://www.sourcesecurity.com/img/white-papers/612/cloudvue-workplace-security-920.jpg)
Delivering a smart, secure and healthy workplace with cloud
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Digital video surveillance: Manufacturers & Suppliers
- Dahua Technology Digital video surveillance
- Hikvision Digital video surveillance
- Dedicated Micros Digital video surveillance
- LILIN Digital video surveillance
- ADPRO Digital video surveillance
- eneo Digital video surveillance
- Hanwha Vision Digital video surveillance
- Vicon Digital video surveillance
- Bosch Digital video surveillance
- Pelco Digital video surveillance
- Messoa Digital video surveillance
- March Networks Digital video surveillance
- Vanderbilt Digital video surveillance
- TruVision Digital video surveillance
- Geutebruck Digital video surveillance
- Axis Communications Digital video surveillance
- Digital Express Digital video surveillance
- AV Costar Digital video surveillance
- Everfocus Digital video surveillance
- artec Digital video surveillance