Electronic security systems
Charterhouse Capital Partners, one of the longest-established private equity firms operating in Europe, announces that it has agreed to acquire ESTYA, formerly ERIS. Charterhouse will invest in partnership with ESTYA’s management, who are reinvesting in the company, and alongside Chequers Capital, who will remain a significant shareholder following an initial investment in 2021. The transaction is subject to customary regulatory approval. Electronic safety and security systems ESTYA is...
Safetrust, a pioneer in secure identity solutions, has received a strategic investment from dormakaba, a global access solutions provider. As Safetrust continues to outpace the security industry growth by supporting some of the world’s largest organisations, this collaboration expands the market reach of its innovative access and identity solutions while accelerating progress in post-quantum-ready (PQR) security. Transforming security with data intelligence Safetrust transforms security...
Skills for Security has continued its collaboration with WorldSkills UK for the 2025 season, announcing the Electronic Security and Fire competitions will be merged into a single category. This strategic move aims to enhance the competition’s impact, broadening the scope for participants to demonstrate expertise in both electronic security and fire safety systems. By integrating these two crucial areas, the competition better mirrors the evolving demands, ensuring future professionals are...
LiDAR, which stands for Light Detection and Ranging, is a technology pervading many different industries. One of the biggest examples is driverless cars. LiDAR can help a vehicle understand and respond to the changing environment around it. An increasing number of car manufacturers are introducing LiDAR-based systems, such as Volvo's EX90 fully electric SUV, to help keep the vehicle a safe distance from other traffic and obstacles in the road ahead. Bathymetric surveys The technology h...
Video security systems have become a critical asset across industries, with pioneers confident in their systems’ resilience against cyber threats. Research from Hanwha Vision Europe shows that more than nine in 10 security and IT managers in the UK, France, Germany, Spain, and Italy believe their video systems are well-protected. Security practices Overall, confidence is high across different organisation sizes, countries, and sectors. In Italy, confidence reaches 97%, while Spain...
Aesthetic options, in addition to robust security features, are increasingly important to architectural door openings. Adams Rite delivers, expanding its finish offerings for the 8800 Series Starwheel Rim Exit Devices to include Black Suede Powder (BSP). 8800 Rim Exit Devices Adams Rite 8800 Rim Exit Devices offers reliable security, durable construction, and streamlined design for narrow stile aluminum doors. Its unique Starwheel bolt interlocks door to frame to provide enhanced...
News
Iris ID, a global pioneer in iris recognition technology since 1997 has secured a significant new partnership with the Texas Department of Public Safety (TDPS), to add over two hundred more Iris ID iCAM TD100A units to their Livescan systems. This further cements the growing popularity and efficacy of iris recognition technology for law enforcement, criminal justice agencies, and their partners. As a biometric, iris recognition is deemed the most accurate modality over either fingerprint or facial recognition, and is second only to DNA. Iris ID iCAM TD100A units The TDPS is responsible for protecting its 30 million residents, the states’ critical infrastructures, and over 1,254 miles of international border with Mexico. The threats that the DPS monitors require constant vigilance and the most up-to-date and efficient technologies. Faced with limited resources and a growing criminal contingent, this technology is poised to assist law enforcement and state agencies with protecting citizens and property, while providing local and state law enforcement and criminal justice agencies with around-the-clock access to mission-critical information systems, like the Next Generation Identification Iris Service (NGI). 1-N identification This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification In 2014, Iris ID began the (NGI), a pilot program with Border Patrol and the FBI, which gave law enforcement and government agencies access to the largest repository of iris biometric data associated with fingerprint and face images. This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification - speeding the intake and matching process of detainees. NGI platform In 2020, the FBI officially rolled out the NGI platform. Since 2020, the repository has been growing at a rate of 100k+ new identities monthly. There are currently about 675 law enforcement locations in the US contributing to NGI Iris Service from 250 agencies and we expect to see that number continue to grow. Department of Homeland Security (DHS), Border Patrol has over 2000 workstations installed enrolling to NGI every day. Iris recognition As a tool to aid law enforcement and criminal justice agencies, iris recognition is useful in scenarios that require fast, accurate, and non-contact identification. Use cases include intake and release, work release, transportation, mobile identification, border security, and investigative searches.
Codelocks is taking its free expert training on the road early in 2025, starting in Rugby, Warwickshire, on Thursday, 13th February. The training session is on Mastering Electronic Lock Installation for Timber Fire Doors and features the practical installation of Codelocks’ CL5010 Lock and FireKit in the Master Locksmith’s Association's superb training lab. Latest developments in CE Marking Attendees will also receive valuable updates on the latest developments in CE Marking and FireKits as well as insight into Codelocks’ Mechanical and Electronic Ranges. Codelocks ‘On the Road Locks' training has been running across the UK for over two years. The tailored, hands-on, practical troubleshooting sessions have been very well received by distributors, locksmiths and installers. Importance of installing electronic locks Michelle Saunders, Sales Manager, at Codelocks explains, “Our first On the Road Locks training of 2025 is a very timely session on the importance of installing electronic locks on timber fire doors. Fire safety is a major concern and it’s vital that electronic locks are installed correctly to protect people and prevent the spread of fire." "Our free training courses are always very popular, especially the practical sessions and the fact that our experts are on hand to answer any questions about Codelocks’ ranges.”
ASSA ABLOY has acquired Uhlmann & Zacher GmbH (Uhlmann & Zacher), a German supplier of access control handles and knobs and corresponding software. "I am very pleased to welcome Uhlmann & Zacher to ASSA ABLOY. This acquisition delivers on our strategy to add complementary products and solutions to our core business,” says Nico Delvaux, President and CEO of ASSA ABLOY. Electronic locking systems "We are thrilled to welcome Uhlmann & Zacher to ASSA ABLOY. With over 30 years of expertise and a strong reputation for innovation in electronic locking systems, it is a perfect addition to our portfolio,” says Neil Vann, Executive Vice President of ASSA ABLOY and Head of the EMEIA Division. "This acquisition enhances our ability to serve customers in Germany and internationally. Together, we look forward to driving even greater value for our customers." Uhlmann & Zacher Uhlmann & Zacher was established in 1990 and has some 110 employees. The main office and factory are located in Waldbüttelbrunn, Bavaria, Germany. Sales for 2024 amounted to about MEUR 21 (approx. MSEK 240) with a good EBIT margin. The acquisition will be accretive to EPS from the start.
HES has introduced new monitoring capabilities to its 9800 Series of high-security, surface-mounted electric strikes with the addition of LBM (latch bolt monitoring) and LBSM (latch bolt and strike monitoring) options. This latest addition brings new, premium capabilities to the product series, including the ability to monitor latch, strike, and door position and provide real-time status notifications on whether openings are securely closed or open, the strike is locked and the latch is correctly affixed. LBM and LBSM options Security personnel receives instant notifications on unauthorised access attempts or product malfunctions to maintain uptime proactively. The outdoor-rated 9800 with LBM and LBSM options can be integrated with existing access control systems for data and reporting on the current integrity of the opening, enhancing overall security and perimeter door reliability. Applications The 9800 is part of HES’s feature-rich 9000 family of electric strikes, a complete, premium line of no-cut solutions for applications with rim exit or tubular vertical rod exit devices. The 9800 is the only electric strike designed to work specifically with the Adams Rite 8800 Rim Exit Device whose unique Starwheel bolt interlocks the door to frame for enhanced strength and to prevent jamb spread.
Advanced Data Risk Management (ADRM), a provider of data-driven risk management solutions, proudly announces the launch of the innovative DEFENDER Managed Services Platform. The patented DEFENDER platform is currently in use across ADRM’s managed services client sites, improving, overseeing, and maintaining the reliability of their security systems. DEFENDER platform As a managed services provider, ADRM is entrusted with the critical task of managing and optimizing the IT infrastructure, software systems, and edge devices for a variety of clients on a global scale. The DEFENDER platform excels in the managed services sector by ensuring the seamless operation of integrated electronic security systems, including video management, access control, intrusion detection, key control, and visitor management systems. Proactive management This platform provides a comprehensive view of the security environment’s performance and health DEFENDER marks a significant advancement in the managed services space. This platform provides a comprehensive view of the security environment’s performance and health, delivering real-time events, metrics, and alerts. This functionality allows for proactive management of system components, predicts issues, mitigates risk, and significantly enhances the robustness and resiliency of networks and systems. Streamlined access The platform also manages abstract components, such as system licenses, support agreements, software packages, inventory, maintenance tasks, projects, proposals, meeting notes, and support tickets, facilitating streamlined access to pivotal information for both the ADRM Team and clients. DEFENDER also tracks installation projects and scores vendor, software, and product performance worldwide! Valuable insights Dan O’Neill, President and CEO of ADRM, stated, “DEFENDER is a significant differentiator for ADRM in the managed services space." "This powerful platform provides valuable insights into the health of our client’s environment and equips users to take proactive measures to ensure all systems and components are optimized." Matt Isgur He is supported by ADRM’s diverse team who are experts in IT, systems engineering, security operations DEFENDER’s chief architect is Matt Isgur, who was responsible for Massachusetts Institute of Technology’s electronic security systems for 15 years. He is supported by ADRM’s diverse team who are experts in IT, systems engineering, security operations, emergency management, system integration and managed services. An essential hub Matt Isgur, ADRM CTO, reflecting on his past role as an end-user, notes, "Managing data from various sources can be a significant challenge." "It is essential to transform complexity into clear, actionable insights, and this is where DEFENDER excels, by utilizing proprietary algorithms to spot trends and address system health proactively. DEFENDER is more than a monitoring tool; it is an essential hub for all components of a security infrastructure." Peak performance In an era where system integrity is of utmost importance, the DEFENDER Managed Services Platform by ADRM emerges as a forward-thinking solution, ensuring the resilience and protection of essential systems across vast global networks. It offers a unified perspective on system health, alerts, and monthly reports, ensuring the peak performance of clients’ security systems.
dormakaba announces that it is expecting to report a significant increase in reported operating profit (EBIT, Earnings before interest and taxes) and net profit for the first half-year 2024/25 for the period ending 31 December 2024 relative to the period ending 31 December 2023. Net sales and adjusted EBITDA margin are expected to be in line with 2024/25 full-year guidance. Profit hike The significant increase in reported operating profit and net profit is attributable to lower restructuring costs and goodwill amortisation as well as the sale of a site in Montreal. Financial results for the first half-year as of 31 December 2024 will be reported on 25 February 2025 after approval by the Board of Directors.
Iris ID, a global pioneer in iris recognition technology since 1997 has secured a significant new partnership with the Texas Department of Public Safety (TDPS), to add over two hundred more Iris ID iCAM TD100A units to their Livescan systems. This further cements the growing popularity and efficacy of iris recognition technology for law enforcement, criminal justice agencies, and their partners. As a biometric, iris recognition is deemed the most accurate modality over either fingerprint or facial recognition, and is second only to DNA. Iris ID iCAM TD100A units The TDPS is responsible for protecting its 30 million residents, the states’ critical infrastructures, and over 1,254 miles of international border with Mexico. The threats that the DPS monitors require constant vigilance and the most up-to-date and efficient technologies. Faced with limited resources and a growing criminal contingent, this technology is poised to assist law enforcement and state agencies with protecting citizens and property, while providing local and state law enforcement and criminal justice agencies with around-the-clock access to mission-critical information systems, like the Next Generation Identification Iris Service (NGI). 1-N identification This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification In 2014, Iris ID began the (NGI), a pilot program with Border Patrol and the FBI, which gave law enforcement and government agencies access to the largest repository of iris biometric data associated with fingerprint and face images. This repository is indispensable, as it provides an iris-only search capability that provides 1-N identification - speeding the intake and matching process of detainees. NGI platform In 2020, the FBI officially rolled out the NGI platform. Since 2020, the repository has been growing at a rate of 100k+ new identities monthly. There are currently about 675 law enforcement locations in the US contributing to NGI Iris Service from 250 agencies and we expect to see that number continue to grow. Department of Homeland Security (DHS), Border Patrol has over 2000 workstations installed enrolling to NGI every day. Iris recognition As a tool to aid law enforcement and criminal justice agencies, iris recognition is useful in scenarios that require fast, accurate, and non-contact identification. Use cases include intake and release, work release, transportation, mobile identification, border security, and investigative searches.
Codelocks is taking its free expert training on the road early in 2025, starting in Rugby, Warwickshire, on Thursday, 13th February. The training session is on Mastering Electronic Lock Installation for Timber Fire Doors and features the practical installation of Codelocks’ CL5010 Lock and FireKit in the Master Locksmith’s Association's superb training lab. Latest developments in CE Marking Attendees will also receive valuable updates on the latest developments in CE Marking and FireKits as well as insight into Codelocks’ Mechanical and Electronic Ranges. Codelocks ‘On the Road Locks' training has been running across the UK for over two years. The tailored, hands-on, practical troubleshooting sessions have been very well received by distributors, locksmiths and installers. Importance of installing electronic locks Michelle Saunders, Sales Manager, at Codelocks explains, “Our first On the Road Locks training of 2025 is a very timely session on the importance of installing electronic locks on timber fire doors. Fire safety is a major concern and it’s vital that electronic locks are installed correctly to protect people and prevent the spread of fire." "Our free training courses are always very popular, especially the practical sessions and the fact that our experts are on hand to answer any questions about Codelocks’ ranges.”
ASSA ABLOY has acquired Uhlmann & Zacher GmbH (Uhlmann & Zacher), a German supplier of access control handles and knobs and corresponding software. "I am very pleased to welcome Uhlmann & Zacher to ASSA ABLOY. This acquisition delivers on our strategy to add complementary products and solutions to our core business,” says Nico Delvaux, President and CEO of ASSA ABLOY. Electronic locking systems "We are thrilled to welcome Uhlmann & Zacher to ASSA ABLOY. With over 30 years of expertise and a strong reputation for innovation in electronic locking systems, it is a perfect addition to our portfolio,” says Neil Vann, Executive Vice President of ASSA ABLOY and Head of the EMEIA Division. "This acquisition enhances our ability to serve customers in Germany and internationally. Together, we look forward to driving even greater value for our customers." Uhlmann & Zacher Uhlmann & Zacher was established in 1990 and has some 110 employees. The main office and factory are located in Waldbüttelbrunn, Bavaria, Germany. Sales for 2024 amounted to about MEUR 21 (approx. MSEK 240) with a good EBIT margin. The acquisition will be accretive to EPS from the start.
HES has introduced new monitoring capabilities to its 9800 Series of high-security, surface-mounted electric strikes with the addition of LBM (latch bolt monitoring) and LBSM (latch bolt and strike monitoring) options. This latest addition brings new, premium capabilities to the product series, including the ability to monitor latch, strike, and door position and provide real-time status notifications on whether openings are securely closed or open, the strike is locked and the latch is correctly affixed. LBM and LBSM options Security personnel receives instant notifications on unauthorised access attempts or product malfunctions to maintain uptime proactively. The outdoor-rated 9800 with LBM and LBSM options can be integrated with existing access control systems for data and reporting on the current integrity of the opening, enhancing overall security and perimeter door reliability. Applications The 9800 is part of HES’s feature-rich 9000 family of electric strikes, a complete, premium line of no-cut solutions for applications with rim exit or tubular vertical rod exit devices. The 9800 is the only electric strike designed to work specifically with the Adams Rite 8800 Rim Exit Device whose unique Starwheel bolt interlocks the door to frame for enhanced strength and to prevent jamb spread.
Advanced Data Risk Management (ADRM), a provider of data-driven risk management solutions, proudly announces the launch of the innovative DEFENDER Managed Services Platform. The patented DEFENDER platform is currently in use across ADRM’s managed services client sites, improving, overseeing, and maintaining the reliability of their security systems. DEFENDER platform As a managed services provider, ADRM is entrusted with the critical task of managing and optimizing the IT infrastructure, software systems, and edge devices for a variety of clients on a global scale. The DEFENDER platform excels in the managed services sector by ensuring the seamless operation of integrated electronic security systems, including video management, access control, intrusion detection, key control, and visitor management systems. Proactive management This platform provides a comprehensive view of the security environment’s performance and health DEFENDER marks a significant advancement in the managed services space. This platform provides a comprehensive view of the security environment’s performance and health, delivering real-time events, metrics, and alerts. This functionality allows for proactive management of system components, predicts issues, mitigates risk, and significantly enhances the robustness and resiliency of networks and systems. Streamlined access The platform also manages abstract components, such as system licenses, support agreements, software packages, inventory, maintenance tasks, projects, proposals, meeting notes, and support tickets, facilitating streamlined access to pivotal information for both the ADRM Team and clients. DEFENDER also tracks installation projects and scores vendor, software, and product performance worldwide! Valuable insights Dan O’Neill, President and CEO of ADRM, stated, “DEFENDER is a significant differentiator for ADRM in the managed services space." "This powerful platform provides valuable insights into the health of our client’s environment and equips users to take proactive measures to ensure all systems and components are optimized." Matt Isgur He is supported by ADRM’s diverse team who are experts in IT, systems engineering, security operations DEFENDER’s chief architect is Matt Isgur, who was responsible for Massachusetts Institute of Technology’s electronic security systems for 15 years. He is supported by ADRM’s diverse team who are experts in IT, systems engineering, security operations, emergency management, system integration and managed services. An essential hub Matt Isgur, ADRM CTO, reflecting on his past role as an end-user, notes, "Managing data from various sources can be a significant challenge." "It is essential to transform complexity into clear, actionable insights, and this is where DEFENDER excels, by utilizing proprietary algorithms to spot trends and address system health proactively. DEFENDER is more than a monitoring tool; it is an essential hub for all components of a security infrastructure." Peak performance In an era where system integrity is of utmost importance, the DEFENDER Managed Services Platform by ADRM emerges as a forward-thinking solution, ensuring the resilience and protection of essential systems across vast global networks. It offers a unified perspective on system health, alerts, and monthly reports, ensuring the peak performance of clients’ security systems.
dormakaba announces that it is expecting to report a significant increase in reported operating profit (EBIT, Earnings before interest and taxes) and net profit for the first half-year 2024/25 for the period ending 31 December 2024 relative to the period ending 31 December 2023. Net sales and adjusted EBITDA margin are expected to be in line with 2024/25 full-year guidance. Profit hike The significant increase in reported operating profit and net profit is attributable to lower restructuring costs and goodwill amortisation as well as the sale of a site in Montreal. Financial results for the first half-year as of 31 December 2024 will be reported on 25 February 2025 after approval by the Board of Directors.


Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
A prestigious sports club recognised for its premium offerings and high-end facilities caters to a distinguished clientele, including business pioneers, corporate professionals, and other elite members. Committed to maintaining its reputation, the organisation continually strives to enhance security and streamline operations, ensuring an exceptional experience for its members. Face recognition-based approach Confronted with rising security concerns and operational bottlenecks, the sports club sought a sophisticated solution to integrate physical access control with its existing membership management system. The preference was for a face recognition-based approach that would automate access based on subscription validity, improve process efficiency, and elevate member experience. Matrix provided a solution that centralised membership management, automated access procedures, and delivered real-time insights. Challenges Security Vulnerabilities: The club faced increasing challenges related to unauthorised access and potential security threats. Ensuring that only legitimate members could enter the premises was a critical requirement, leading to a preference for advanced face recognition-based access control. Operational Inefficiencies: Manual verification of subscription statuses created significant delays, particularly for the finance team, which had to cross-check member records frequently. The process was error-prone, creating workflow bottlenecks and hampering productivity. Enhancing Member Experience: Delays due to manual verification detracted from the overall member experience. The club aimed to improve efficiency in facility access to ensure that members enjoyed a seamless and trouble-free experience. Matrix solution Matrix implemented a robust face recognition-based access control system that seamlessly integrated with the club's membership management software. The solution offered the following capabilities: Centralised Management: All member information, including access rights and subscription details, was consolidated within a single platform, enabling centralised oversight. This allowed for real-time updates and streamlined control over member access. Automated Access Control: The system automatically authenticated members based on their subscription status, allowing only those with valid memberships to access the facilities. This automation eliminated the need for manual checks, greatly enhancing operational efficiency. Real-Time Monitoring and Reporting: With real-time access monitoring, staff could immediately respond to unauthorised access attempts. Detailed reports on access trends and member behavior supported informed decision-making and further optimisation of services. Deployment scenario Results Heightened Security: The implementation of high-speed face recognition-based access control significantly improved security by effectively blocking unauthorised access and mitigating the risk of breaches. Members felt reassured by the enhanced safety measures. Optimised Operations: Automating access control eliminated manual subscription verification, allowing the finance team to focus on more value-added tasks. The streamlined process improved the accuracy and speed of operations. Superior Member Experience: Members experienced faster and more efficient facility access, boosting overall satisfaction and engagement with the club. Actionable Data Insights: The system provided detailed data on member activity, allowing the organisation to make data-driven improvements to its offerings and facilities. Products deployed COSEC ARGO FACE: Facial Recognition Access Control System with EM Proximity Card Compatibility COSEC PANEL200P: Centralised Access Controller Hub COSEC PLATFORM: Software Platform Licence COSEC PLT: Platform Licence for 17,000 Users COSEC FR: Facial Recognition Licence for 17,000 Users COSEC ACM: Access Control Licence for 17,000 Users Matrix’s solution effectively addressed the sports club’s security concerns, streamlined operational processes, and enhanced the member experience, setting a benchmark for access control in the industry.
Client, a prominent regional R&D institution under MeitY, plays a crucial role in advancing India's technological landscape. With a focus on IT, electronics, and related sectors, the organisation leads in cutting-edge research, driving innovation to meet global trends and market needs. As a key player in high-end R&D, they have been pivotal in propelling India’s IT revolution, consistently expanding their expertise in emerging technologies. They utilise their knowledge and creativity to develop IT solutions across various industries, working closely with MeitY, funding agencies, partners, and key stakeholders. Requirements The project involved managing a defined volume of emergency calls per hour by directing those made to 112 to agents handling state-specific emergency services. Matrix's role was to deliver a VoIP PRI gateway solution that provided VoIP capabilities to a third-party server. Crucially, these functionalities needed to be implemented across various locations. The client’s needs can be outlined as follows: Manage a minimum of 50,000 calls: The system must be equipped to handle at least 50,000 emergency calls every hour. Direct calls to state-specific agents: When the global emergency number 112 is dialled, calls should be directed to agents overseeing emergency services for the respective states. Integrate with third-party systems: The agents will work on a third-party server, which must be seamlessly connected to the Matrix GENX system via SIP trunking. Solution In collaboration with Consulttech, Matrix developed a solution that significantly enhanced the organisation's operations by optimising call routeing. The core of the solution involved offering a VoIP PRI gateway, enabling seamless PRI to VoIP conversion. The essential features of this solution are as follows: Multi-location setup: The system covers various locations, each outfitted with a Matrix GENX system that connects to the ISP's PRI lines. PRI to VoIP conversion: At every site, Matrix GENX converts incoming calls from PRI lines into VoIP (Voice over Internet Protocol). Emergency call routeing: When a user dials 112, the call is routed through the ISP’s PRI lines to the Matrix Gateways, where the media is converted from PRI to VoIP and passed to the Automatic Call Distributor (ACD) server. Centralised ACD server: All VoIP calls are funneled into a central ACD server for efficient distribution. Agent call distribution: The ACD server directs the incoming calls to available agents who are ready to respond. Scalable solution: Up to 28 locations can be connected to the central ACD server, allowing the system to handle a high volume of calls simultaneously. Results The solution enabled the organisation to connect various locations into one unified communication system through the use of a VoIP PRI gateway. This improved the system's ability to manage thousands of calls per hour while significantly reducing call drops. The specifics of the solution are as follows: Multi-site implementation: The project was deployed across multiple locations in cities throughout Kerala, establishing a seamless communication network. Increased call handling capacity: Each site is capable of managing between 26,000 to 30,000 calls per hour. Significant decrease in call drops: The system efficiently handled large call volumes, resulting in almost no dropped calls. Matrix’s VoIP PRI gateway allowed the organisation to integrate multiple locations across the state into a unified communication system. With the ability to manage high call volumes, the solution significantly minimised call drops.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl, adding “The whole world goes in and out. Security is very important.” Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Access rights management Digital devices and low-impact skills were needed to assure compliance with origin protection Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. Digital access for a famous heritage building Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers, such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. He adds, “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” New master key system With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access. “The situation before the new master key system was installed was problematic,” says Robert Graßl, adding “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
Genetec Inc., the global pioneer in enterprise physical security software, announced that Brigham Young University's (BYU) has optimised its security operations with the Genetec™ Operations Center work management system. Located on a 560-acre campus in Provo, Utah, BYU is home to nearly 34,000 students and over 5,000 faculty and staff. Enhancing campus security A robust security team of officers, supervisors, trained students, and staff ensures campus safety The university’s robust security program includes 25 sworn officers, 15 security supervisors, and up to 400 student employees trained through its Security Academy. To better coordinate multiple departments and manage a broad range of responsibilities, BYU sought a solution that would unify operations and improve efficiency. Simplifying operations The Genetec Operations Center is integrated with BYU’s existing Security Center platform, enabling the university to consolidate tasks like dispatching, work ticketing, and activity tracking into a single system. This streamlined approach replaces disconnected tools and manual processes, helping teams collaborate more effectively and maintain clear visibility of their operations. With Operations Center, BYU has automated several key processes. For example, routine tasks such as nightly code checks across campus divisions, equipment inspections, and building audits are now scheduled and managed automatically. This reduces the workload on dispatchers, minimises the potential for errors, and ensures tasks are completed consistently. The mobile app also enhances situational awareness for field officers, providing real-time updates on assignments and facilitating compliance with operational procedures. Flexible and customisable workflows Operations Center ensures tasks are completed efficiently while reducing the learning curve The flexible design of Operations Center allows BYU to customise workflows and reports to suit specific departmental requirements. From tracking officer locations to managing inventory and generating incident documentation, the platform adapts to support the diverse needs of the university’s security teams. The system has also streamlined onboarding processes for new staff and student employees. By offering intuitive tools and tailored workflows, Operations Center ensures tasks are completed efficiently while reducing the learning curve for new team members. Enhancing collaboration and efficiency The implementation of Operations Center has significantly improved BYU's ability to coordinate security efforts, enhance communication, streamline data sharing, and centralise documentation and auditing processes. Automation of routine processes, such as inspections and daily reporting, reduces manual effort, freeing teams to focus on higher-priority responsibilities. "First-time users of Operations Center immediately see how it benefits their organisation—no extensive training required. It delivers quick and accurate results. Without Genetec, I can't imagine how we’d manage all this information,” says Chris Autry, Managing Director of BYU Police and BYU Security.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Aperio visitor access system Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key card and issue a replacement. Real-time and future-proofed Security staff at The Camp ensure only authorised users enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because (access) rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto, adding “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Aperio product ecosystem’s performance Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery-powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
A prestigious sports club recognised for its premium offerings and high-end facilities caters to a distinguished clientele, including business pioneers, corporate professionals, and other elite members. Committed to maintaining its reputation, the organisation continually strives to enhance security and streamline operations, ensuring an exceptional experience for its members. Face recognition-based approach Confronted with rising security concerns and operational bottlenecks, the sports club sought a sophisticated solution to integrate physical access control with its existing membership management system. The preference was for a face recognition-based approach that would automate access based on subscription validity, improve process efficiency, and elevate member experience. Matrix provided a solution that centralised membership management, automated access procedures, and delivered real-time insights. Challenges Security Vulnerabilities: The club faced increasing challenges related to unauthorised access and potential security threats. Ensuring that only legitimate members could enter the premises was a critical requirement, leading to a preference for advanced face recognition-based access control. Operational Inefficiencies: Manual verification of subscription statuses created significant delays, particularly for the finance team, which had to cross-check member records frequently. The process was error-prone, creating workflow bottlenecks and hampering productivity. Enhancing Member Experience: Delays due to manual verification detracted from the overall member experience. The club aimed to improve efficiency in facility access to ensure that members enjoyed a seamless and trouble-free experience. Matrix solution Matrix implemented a robust face recognition-based access control system that seamlessly integrated with the club's membership management software. The solution offered the following capabilities: Centralised Management: All member information, including access rights and subscription details, was consolidated within a single platform, enabling centralised oversight. This allowed for real-time updates and streamlined control over member access. Automated Access Control: The system automatically authenticated members based on their subscription status, allowing only those with valid memberships to access the facilities. This automation eliminated the need for manual checks, greatly enhancing operational efficiency. Real-Time Monitoring and Reporting: With real-time access monitoring, staff could immediately respond to unauthorised access attempts. Detailed reports on access trends and member behavior supported informed decision-making and further optimisation of services. Deployment scenario Results Heightened Security: The implementation of high-speed face recognition-based access control significantly improved security by effectively blocking unauthorised access and mitigating the risk of breaches. Members felt reassured by the enhanced safety measures. Optimised Operations: Automating access control eliminated manual subscription verification, allowing the finance team to focus on more value-added tasks. The streamlined process improved the accuracy and speed of operations. Superior Member Experience: Members experienced faster and more efficient facility access, boosting overall satisfaction and engagement with the club. Actionable Data Insights: The system provided detailed data on member activity, allowing the organisation to make data-driven improvements to its offerings and facilities. Products deployed COSEC ARGO FACE: Facial Recognition Access Control System with EM Proximity Card Compatibility COSEC PANEL200P: Centralised Access Controller Hub COSEC PLATFORM: Software Platform Licence COSEC PLT: Platform Licence for 17,000 Users COSEC FR: Facial Recognition Licence for 17,000 Users COSEC ACM: Access Control Licence for 17,000 Users Matrix’s solution effectively addressed the sports club’s security concerns, streamlined operational processes, and enhanced the member experience, setting a benchmark for access control in the industry.
Client, a prominent regional R&D institution under MeitY, plays a crucial role in advancing India's technological landscape. With a focus on IT, electronics, and related sectors, the organisation leads in cutting-edge research, driving innovation to meet global trends and market needs. As a key player in high-end R&D, they have been pivotal in propelling India’s IT revolution, consistently expanding their expertise in emerging technologies. They utilise their knowledge and creativity to develop IT solutions across various industries, working closely with MeitY, funding agencies, partners, and key stakeholders. Requirements The project involved managing a defined volume of emergency calls per hour by directing those made to 112 to agents handling state-specific emergency services. Matrix's role was to deliver a VoIP PRI gateway solution that provided VoIP capabilities to a third-party server. Crucially, these functionalities needed to be implemented across various locations. The client’s needs can be outlined as follows: Manage a minimum of 50,000 calls: The system must be equipped to handle at least 50,000 emergency calls every hour. Direct calls to state-specific agents: When the global emergency number 112 is dialled, calls should be directed to agents overseeing emergency services for the respective states. Integrate with third-party systems: The agents will work on a third-party server, which must be seamlessly connected to the Matrix GENX system via SIP trunking. Solution In collaboration with Consulttech, Matrix developed a solution that significantly enhanced the organisation's operations by optimising call routeing. The core of the solution involved offering a VoIP PRI gateway, enabling seamless PRI to VoIP conversion. The essential features of this solution are as follows: Multi-location setup: The system covers various locations, each outfitted with a Matrix GENX system that connects to the ISP's PRI lines. PRI to VoIP conversion: At every site, Matrix GENX converts incoming calls from PRI lines into VoIP (Voice over Internet Protocol). Emergency call routeing: When a user dials 112, the call is routed through the ISP’s PRI lines to the Matrix Gateways, where the media is converted from PRI to VoIP and passed to the Automatic Call Distributor (ACD) server. Centralised ACD server: All VoIP calls are funneled into a central ACD server for efficient distribution. Agent call distribution: The ACD server directs the incoming calls to available agents who are ready to respond. Scalable solution: Up to 28 locations can be connected to the central ACD server, allowing the system to handle a high volume of calls simultaneously. Results The solution enabled the organisation to connect various locations into one unified communication system through the use of a VoIP PRI gateway. This improved the system's ability to manage thousands of calls per hour while significantly reducing call drops. The specifics of the solution are as follows: Multi-site implementation: The project was deployed across multiple locations in cities throughout Kerala, establishing a seamless communication network. Increased call handling capacity: Each site is capable of managing between 26,000 to 30,000 calls per hour. Significant decrease in call drops: The system efficiently handled large call volumes, resulting in almost no dropped calls. Matrix’s VoIP PRI gateway allowed the organisation to integrate multiple locations across the state into a unified communication system. With the ability to manage high call volumes, the solution significantly minimised call drops.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl, adding “The whole world goes in and out. Security is very important.” Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Access rights management Digital devices and low-impact skills were needed to assure compliance with origin protection Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. Digital access for a famous heritage building Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers, such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. He adds, “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” New master key system With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access. “The situation before the new master key system was installed was problematic,” says Robert Graßl, adding “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
Genetec Inc., the global pioneer in enterprise physical security software, announced that Brigham Young University's (BYU) has optimised its security operations with the Genetec™ Operations Center work management system. Located on a 560-acre campus in Provo, Utah, BYU is home to nearly 34,000 students and over 5,000 faculty and staff. Enhancing campus security A robust security team of officers, supervisors, trained students, and staff ensures campus safety The university’s robust security program includes 25 sworn officers, 15 security supervisors, and up to 400 student employees trained through its Security Academy. To better coordinate multiple departments and manage a broad range of responsibilities, BYU sought a solution that would unify operations and improve efficiency. Simplifying operations The Genetec Operations Center is integrated with BYU’s existing Security Center platform, enabling the university to consolidate tasks like dispatching, work ticketing, and activity tracking into a single system. This streamlined approach replaces disconnected tools and manual processes, helping teams collaborate more effectively and maintain clear visibility of their operations. With Operations Center, BYU has automated several key processes. For example, routine tasks such as nightly code checks across campus divisions, equipment inspections, and building audits are now scheduled and managed automatically. This reduces the workload on dispatchers, minimises the potential for errors, and ensures tasks are completed consistently. The mobile app also enhances situational awareness for field officers, providing real-time updates on assignments and facilitating compliance with operational procedures. Flexible and customisable workflows Operations Center ensures tasks are completed efficiently while reducing the learning curve The flexible design of Operations Center allows BYU to customise workflows and reports to suit specific departmental requirements. From tracking officer locations to managing inventory and generating incident documentation, the platform adapts to support the diverse needs of the university’s security teams. The system has also streamlined onboarding processes for new staff and student employees. By offering intuitive tools and tailored workflows, Operations Center ensures tasks are completed efficiently while reducing the learning curve for new team members. Enhancing collaboration and efficiency The implementation of Operations Center has significantly improved BYU's ability to coordinate security efforts, enhance communication, streamline data sharing, and centralise documentation and auditing processes. Automation of routine processes, such as inspections and daily reporting, reduces manual effort, freeing teams to focus on higher-priority responsibilities. "First-time users of Operations Center immediately see how it benefits their organisation—no extensive training required. It delivers quick and accurate results. Without Genetec, I can't imagine how we’d manage all this information,” says Chris Autry, Managing Director of BYU Police and BYU Security.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Aperio visitor access system Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key card and issue a replacement. Real-time and future-proofed Security staff at The Camp ensure only authorised users enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because (access) rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto, adding “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Aperio product ecosystem’s performance Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery-powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”


Round table discussion
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
Products


White papers

Creating a secure and positive healthcare experience
Download
11 advantages of a combined system for access control and intrusion
Download
Integrated access control: reap the benefits of connected security
Download
Choosing the right storage technology for video surveillance
Download
The inevitability of The Cloud
Download
5 reasons to integrate mobile technology into your security solution
Download
11 considerations for embedded system RFID readers
Download
3 reasons to migrate to a new access control system
Download
Honeywell GARD USB threat report 2024
Download
The real cost of an outdated Video Security System
Download
A step-by-step checklist for choosing an intercom system
Download
Understanding key control systems and best practices
Download
Modernizing facilities management
Download
A more secure alternative to 125 kHz proximity cards
Download
The benefits of Edge AI + Cloud for security systems
Download
Creating a secure and positive healthcare experience
Download
11 advantages of a combined system for access control and intrusion
Download
Integrated access control: reap the benefits of connected security
Download
Choosing the right storage technology for video surveillance
Download
The inevitability of The Cloud
Download
5 reasons to integrate mobile technology into your security solution
Download
11 considerations for embedded system RFID readers
Download
3 reasons to migrate to a new access control system
Download
Honeywell GARD USB threat report 2024
Download
The real cost of an outdated Video Security System
Download
A step-by-step checklist for choosing an intercom system
Download
Understanding key control systems and best practices
Download
Modernizing facilities management
Download
A more secure alternative to 125 kHz proximity cards
Download
The benefits of Edge AI + Cloud for security systems
Download
Creating a secure and positive healthcare experience
Download

Videos
Electronic security systems: Manufacturers & Suppliers
- Software House Electronic security systems
- CyberLock Electronic security systems
- ACT Electronic security systems
- Alpro Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- ASSA ABLOY Electronic security systems
- HID Electronic security systems
- Hikvision Electronic security systems
- Morse Watchmans Electronic security systems
- Dahua Technology Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- AMAG Electronic security systems
- Sargent Electronic security systems
- Corbin Russwin Electronic security systems
- EVVA Electronic security systems
- Climax Technology Electronic security systems
- Baxall Electronic security systems

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download