Event security
ASIS International and the Security Industry Association (SIA) have closed out a successful second annual Security LeadHER conference, a unique event dedicated to advancing, connecting and empowering women in the security profession. The sold-out event took place June 24-25, 2024, in Phoenix, Arizona, bringing together more than 400 security professionals from seven countries. Security LeadHER 2024 builds on the tremendous success of last year’s inaugural event, gathering attendees o...
Thales announced the release of the 2024 Thales Cloud Security Study, its annual assessment of the latest cloud security threats, trends and emerging risks based on a survey of nearly 3000 IT and security professionals across 18 countries in 37 industries. As the use of the cloud continues to be strategically vital to many organisations, cloud resources have become the biggest targets for cyber-attacks, with SaaS applications (31%), Cloud Storage (30%) and Cloud Management Infrastructure (...
dormakaba has earned prominent recognition for its sustainability management and is listed as one of the 500 'World’s Most Sustainable Companies 2024' by TIME magazine. The ranking has been developed for the first time by TIME in partnership with Statista with the aim to recognise corporate responsibility and advance sustainable practices. "We have worked diligently to establish a pioneering sustainability program in our industry, and we are delighted to have been recognised by TIME magaz...
Cyberbit, a pioneer in hyper-realistic cybersecurity skill development and readiness, announced its win for Best Enterprise Security Solution at SC Awards Europe. This recognition underscores Cyberbit's commitment to addressing the global shortage of cybersecurity talent. Its innovative platform empowers organisations to significantly enhance the performance of their cyber defense teams. This translates directly to improved organisational preparedness and a stronger ability to effectively respo...
Senior representatives from the UK’s fire and security sectors gathered on Wednesday night at the Coventry Building Society Arena for the glittering Fire & Security Matters (FSM) Awards. Hosted by respected industry publications Fire Safety Matters and Security Matters, the FSM Awards celebrate innovation and the highest standards of excellence in the fire and security sectors. NSI commends all the winners and finalists, including the 15 NSI-approved companies that were shortlisted w...
The full-day expo is headed to New Jersey and expects up to 5,000 attendees and hundreds of exhibitors, with the Bridge Cable team as some of those attendees. The full team of Bridge Cable is set to attend the ADI Expo 2024, as it makes a stop in Cherry Hill, New Jersey on Tuesday, August 27th, 2024. ADI Expo The annual event exhibits manufacturers like Honeywell, Resideo, Telguard, Turing, DSC, Yale, and more. Attendees will be spending the day learning the latest trends within telecom...
News
OPTEX, the pioneering global sensor manufacturer, will be showcasing its latest solutions in advanced intrusion detection technology for the African market at Securex South Africa 2024. For commercial and residential sites, OPTEX’s range of external and internal sensor range will feature on the stand. The new indoor sensor FlipX features a pyroelectric sensor that adapts to the human shape to provide highly accurate detection performance. Thanks to its innovative lens that can rotate through 180°, the sensors can be utilised to protect both narrow and long spaces, and wide, open areas, providing the power and intelligence of two sensors in one. EchoPoint™ and Fibre Defender Fibre-optic intrusion detection sensor for medium to large retail and vital infrastructure sites For long-range, commercial applications included within the OPTEX portfolio of fibre optic-based detectors are the EchoPoint™ and Fibre Defender. EchoPoint™ Distributed Acoustic Sensors (DAS) provide point detection of ±6 m in a range of up to 100 km, making them the ideal solution for protecting high-security sites such as critical infrastructure facilities, solar farms, mines, and airports. Fiber Defender is a four-zone, fibre-optic intrusion detection sensor for medium to large commercial and critical infrastructure sites with perimeters of up to 5 km. The series utilises an algorithm, monitoring environmental conditions and noise which dynamically adjusts the signal helping to reject unwanted alarms from wind and traffic. Layer of security intelligence OPTEX’s high-security portfolio also includes its award-winning REDSCAN LiDAR range OPTEX’s high-security portfolio also includes its award-winning REDSCAN LiDAR range. The sensors can be mounted horizontally to create high-resolution virtual laser planes to protect roofs and skylights, or vertically helping to create virtual perimeters, protect narrow spaces and high-value targets. The latest in the series, REDSCAN mini-Pro, will also be exhibited, highlighting its extra layer of security intelligence with its built-in IR camera for visual verification. Latest detection solutions “As Africa’s pioneering security trade exhibition, Securex provides the best setting for us to demonstrate our latest detection solutions for our customers and partners in South Africa,” says Scott Wilson, Divisional Manager for Africa at OPTEX. “Our live demonstrations throughout the event will provide the perfect opportunity to showcase our latest solutions in the intrusion detection space to a different audience.”
G2E Asia and the Asian IR Expo – the key marketplace for the gaming, entertainment and integrated resorts sectors – hosted at The Venetian Macao, officially open their doors, expecting to welcome more than 8,000 industry professionals from 80 countries and regions. The joint event commences with a keynote address by Bill Miller, President and CEO of the American Gaming Association, followed by an opening ceremony featuring prominent industry pioneers. The day will also include a G2E Asia 15th anniversary reception in the late afternoon and an exclusive President’s Reception. Featuring emerging brands From June 4-6, the display will showcase more than 100 exhibitors, displaying cutting-edge products From June 4-6, the exhibition will showcase more than 100 exhibitors, displaying cutting-edge products, solutions, and technologies for the gaming, entertainment, and integrated resorts industries, alongside a technology zone and stage featuring emerging brands. The first two days of the event offer tech talks on current challenges, with day one spotlighting hospitality, customer relationship management and identity management and day two focusing on security solutions. Key highlights Complementing the exhibition are two concurrently run conference programs, led by a distinguished lineup of thought pioneers. Key highlights include: Day One – An in-depth look at the financial outlook for Asian gaming markets, two panels dedicated to emerging markets, and a spotlight on Thailand and the Middle East. Day Two – Exploring strategies around technology and innovations for gaming and the third edition of the Asia Pacific Responsible Gaming Forum. Day Three – IAGA Best Practices Institute, featuring regulatory updates and understanding growing cross-border player acquisition risks. Featured speakers for day one include Praveen Choudhary, Managing Director, Morgan Stanley Asia Limited; Angela HanLee, APAC Gaming & Leisure Senior Analyst, Bloomberg Intelligence; Evan Spytma, CEO, Hotel Stotsenberg; Ioannis Kontoulas, Board Member, Hellenic Gaming Commission; Angus Chan, Associate Director of Research, UBS AG; Daniel Li, Advisor, Cambodia Commercial Gambling Management Commission; Udorn Olsson, Chairman, Phoenix Aviation (Thailand) Co Ltd; Daniel Cheng, Industry Analyst and Author; and Fredric E. Gushin, Managing Director, Spectrum Gaming Group. Asian IR Summit overview Day One – Integrated Resort Focus: Uncover regional market insights, latest trends, and strategies to navigate the disruptive business environment and elevate tourism. Envision a future where tourism stands as a vibrant destination, while exploring the transformative potential of AI in Integrated Resorts. Day Two – Art Integration: In collaboration with ArtBiz Asia, we will delve into the profound impact of art on integrated resorts and other related industries, providing a platform for forward-thinking artists and industry leaders to exchange ideas. Together, we will explore the implementation and integration of art & lifestyle, art & tech, art & hospitality experiences, art education as well as local art & cultural ecosystem. Day Three – Sports and Entertainment: Unlock sports tourism's full potential and strategies, athlete IP value, and study the secrets of transforming cities into well-known sports hubs. Besides, the forum will uncover the artistry behind successful performing arts & entertainment programs in Macao and their tactical execution. Featured speakers for day one Featured speakers for day one include Maria Helena de Senna Fernandes, Director of Macau Government Tourism Office; Albert Yip, Director General, Sanya Tourism Board; Fred Sheu, National Technology Officer, Microsoft Hong Kong; Fian Leung, Head of Accommodation Business, HK & Macau, Trip.com Group; Prof Davis Fong, Director of Institute for the Study of Commercial Gaming, Professor of Integrated Resort and Tourism Management, University of Macau; Alvin Zou, Vice President, Asia Pacific Business Group, SenseTime and Cindy Ngan, Partner in the Climate & Sustainability Practice, PwC Hong Kong and more.
Speakers at the 10th ETSI/IQC Quantum Safe Cryptography Conference have called on organisations to prepare their cybersecurity infrastructures to address the challenges of a post-quantum world. Organised by ETSI and the Institute for Quantum Computing, this year’s conference was hosted from 14-16 May by the Centre for Quantum Technologies (CQT), National University of Singapore (NUS), in partnership with the Infocomm Media Development Authority (IMDA) and the Cyber Security Agency (CSA) of Singapore. The event attracted an impressive 235 onsite delegates from 27 countries, reflecting fast-growing interest worldwide in the critical importance of quantum-safe cryptography in cybersecurity strategies. Quantum threats and risk management Addressing business, industry, government and research communities with a stake in cryptographic standardisation, the three-day event provided a platform for knowledge exchange and collaboration as organisations transition their cyber infrastructures and business practices to ensure security in the imminent quantum era. The three-day event provided a forum for facts talk and union as organisations The executive track on the conference’s opening day (14 May) outlined the current state of quantum threats and quantum risk management. Delegates were welcomed by Chuen Hong Lew, Chief Executive of the Infocomm Media Development Authority (IMDA) of Singapore, who stressed the importance of harnessing the opportunities of quantum computing for the greater good, while ensuring that the digital infrastructure remains secure and quantum-safe. Worldwide practical deployments Other keynote speeches by Artur Ekert, Professorial Fellow in Quantum Physics and Cryptography at the University of Oxford and the National University of Singapore, and Michele Mosca, co-founder and Professor of the Institute for Quantum Computing at the University of Waterloo and Programme Committee Chair for the conference, explored how quantum computers are poised to disrupt the current technology landscape. Panel discussions – including a dedicated session on the financial sector’s specific requirements – explored approaches being taken by businesses and governments to manage the quantum risk to information assets, cyber systems and business continuity, now and in the future. The conference’s technical track (15-16 May) provided a deep dive into cryptographic technologies being developed through various initiatives worldwide to ensure the security of networks and connected devices in a post-quantum era. Sessions focused on topics including current standardisation initiatives and worldwide practical deployments of both post-quantum cryptography and quantum key distribution, as well as migration strategies to quantum-secure ecosystems. The need for standardisation in a post-quantum world Advances in quantum computing pose a challenge to the vigil of many universal cryptographic algorithms Advances in quantum computing present a major challenge to the security of many ubiquitous cryptographic algorithms. Preparation for a transition to quantum secure technologies is increasing, with a corresponding acceleration in efforts to standardise tools to mitigate quantum threats. With the availability of the first quantum-safe cryptographic standards for general use anticipated in the summer of 2024, working groups at ETSI are actively exploring how they will fit into existing protocols, applications, and public-key infrastructures. “In recent years we have seen significant progress in solving the challenges of building real quantum computers” comments ETSI Director-General Luis Jorge Romero who welcomed delegates to the first day of the conference. “When ETSI held the first QSC conference in 2013, there were no standards available for quantum-safe cryptography. Standardisation provides a powerful platform to consolidate fragmented global research efforts in the development of quantum-safe algorithms and associated business practices that will protect the Internet and everyone who relies on it.” Integrity and confidentiality of information “Quantum computers are poised to disrupt the technology landscape” states Michele Mosca, co-founder of the Institute for Quantum Computing at the University of Waterloo. “Building on ten years of continuous dialogue at a global level, this week’s conference highlights the necessity for business pioneers worldwide to prepare for the quantum era by focusing on ‘resilience by design’ of their critical cyber systems, and the integrity and confidentiality of information assets.” "The 10th ETSI/IQC Quantum-Safe Cryptography Conference has highlighted the need for global coordination and sharing on best practices as the world begins an unprecedented overhaul of the crypto foundations of our communication systems,” indicates Alexander Ling, CQT Principal Investigator, NUS. “Hosting this year's conference in Singapore has brought the world's pioneering experts on the matter to our region, and I'm really happy to see all the conversations that are starting new connections and partnerships."
Elmo Motion Control, a global technology major in motion control solutions, will present its latest innovations at SPS Italia 2024, in Hall 5, Booth #F-043. SPS (Smart Production Solutions) Italia will take place from May 28 to 30, 2024, at the Parma Fairgrounds in Parma, Italy. For 12 years, SPS Italia has been a collective point of reference for the Italian manufacturing sector. Platinum line of servo drives Elmo is proudly showcasing the Platinum line of servo drives, including Full Certified Functional Safety, and the recently launched Platinum Bassoon, this line's first AC power drive. The Platinum Bassoon supports up to 10 Amps at 230 Volts and has up to 3.25 KW of continuous power. The drive is compatible with brushless, DC brush, linear motors, or voice coil. New multi-axis servo drives product line Visitors can witness products in action with two different types of machines: a telescope and a life science robot Experience the future of motion control at the booth with a firsthand look at the new multi-axis servo drives product line with Full Functional Safety and next-generation motion controller with artificial intelligence readiness. Visitors can also witness products in action with two different types of machines: a telescope and a life science robot, both by esteemed customers, Planewave Instruments and Peak Robotics. Compact-in-size servo drives Rami Chanan, Elmo VP of Sales & Marketing, stated, "We are excited to bring the latest Elmo solutions to SPS Italia to show how we broaden machine functionality with our compact-in-size but extraordinary-in-power servo drives." Rami Chanan adds, "The motion control solutions that Elmo provides for any application are yet again being demonstrated, as we are privileged to have two customer products at the booth, reinforcing our commitment to showing the endless motion possibilities Elmo offers." Full Certified Functional Safety Learn more about Full Certified Functional Safety in an exclusive workshop at the show. Mr. Simone Pedrazzi, an Elmo Sales Application Engineer, will present the collaborative advancements between humans and machines on May 28, 2024, from 13:00 to 13:45 in the Arena Tech in Hall 7.
G2E Asia and the Asian IR Expo are set to return to Macau on June 4-6, 2024 with a lineup of esteemed keynote speakers throughout the week, including: Day One: Bill Miller, President and CEO of the American Gaming Association | Maria Helena de Senna Fernandes, Director of Macao Government Tourism Office Day Two: Leong Wai Man, President of the Cultural Affairs Bureau of the Macao SAR Government Day Three: Alejandro H. Tengco, Chairman and Chief Executive Officer of the Philippine Amusement and Gaming Corporation (PAGCOR) G2E Asia and the Asian IR Expo highlights Among the exhibition, highlights will be pioneering brands in slots, table gaming, and electronic gaming machines Anticipated throughout the industry, the collaboration between G2E Asia and the Asian IR Expo will highlight more than 100 exhibitors, two specialised zones, and two three-day individual conference programmes featuring renowned speakers and tailored networking events. It is set to welcome more than 8,000 visitors from 80 countries and regions. Among the exhibition, highlights will be pioneering brands in slots, table gaming, and electronic gaming machines, as well as specialised zones dedicated to technology, sports, and entertainment reflecting current industry trends. Tech Talk Forum sessions The technology zone will offer innovative solutions across departments to address the diverse needs of organisations of all sizes including two days of expert-led Tech Talk Forum sessions covering hospitality, CRM, identity management, and security while the sports and entertainment zone will host exhibitors from influencer and celebrity agencies, event and entertainment firms, sports consultancies, sports marketing agencies and more. In honour of its 15th anniversary, G2E Asia will kick off with an exclusive reception, followed by custom-tailored networking sessions throughout the event.
Allied Universal, the world’s pioneering security and facility services company, is proud to announce it was named a finalist for the 2023 Downtown Orlando Partnership (DOP) Golden Brick Awards. The Golden Brick Awards are commissioned by the DOP and recognise the people, projects and initiatives that support downtown Orlando business, tourism and the local community. Safety and well-being Allied Universal team works with the local police and fire units to ensure the safety and well-being Allied Universal supports the City of Orlando Downtown Ambassador program by providing enhanced hospitality and security with the presence of dedicated representatives to ensure positive downtown experiences. The Allied Universal team works with the local police and fire departments to ensure the safety and well-being of those visiting Orlando, as well as interacting directly with the area’s unhoused population to help them obtain the care and services they need. 2023 DOP Golden Brick Awards “Allied Universal is honoured to have been named a finalist for the 2023 DOP Golden Brick Awards,” said Eric Glasgow, regional vice president for Allied Universal in Florida. “Our team is proud to safeguard the public and service the unique needs of the downtown Orlando community through the Ambassador Program. We remain committed to working closely with the DOP and continuing to make a difference in the lives of those working and living in the downtown community.”
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern programme Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern programme, welcoming 120 interns into various departments for a full semester. The programme helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organisations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centres as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centres as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realise the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasise data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organisation. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
Technology is driving new opportunities in the security industry. Innovation trends include artificial intelligence (AI), edge-based systems, mobile systems, a greater focus on software, and efforts to simplify operation of security systems, even as capabilities become more complex. ISC West 2022 reflected these changing trends. “In addition to emphasising technology innovation, ISC West also reflected an industry that is resilient, dedicated and passionate,” said Mary Beth Shaughnessy, the Event Director of ISC Security Events. ISC West 2022 “Almost 12,000 dealers, installers, integrators, end users and consultants reconnected at ISC West 2022, and there were nearly 20,000 total industry professionals in attendance (including manufacturers),” adds Mary Beth Shaughnessy. The 550 exhibitors and brands on display reflected an industry that has come through the COVID-19 pandemic in better shape than ever, poised for even greater success in the years ahead. Turning video and access control into knowledge Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time Motorola Solutions emphasized several themes that were heard repeatedly throughout the show. “One trend is fulfilling the need to turn video and access control into sources of knowledge, inside the enterprise,” said John Kedzierzski, Motorola Solutions’ Senior Vice President of Video Security and Access Control. Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time, while monitoring access control yields the equivalent of an operating system inside a building. Using the Cloud offers consumer ease-of-use to systems The second trend listed by Motorola Solutions is working to bring the consumer ease-of-use experience into enterprise security solution applications. Professional security systems were previously complicated to buy, install, manage and upgrade. However, using the Cloud, even distributed enterprises can bring consumer ease-of-use to systems, from improving the out-of-box installation experience to boosting the ability to manage the system. Transition to ‘mobile first’ interfaces The third trend emphasised by Motorola Solutions is transition to ‘mobile first’ interfaces, reflecting the need for busy security executives to be on-the-go, but with full access to their systems, without being chained to their desks. Since the last springtime ISC West show in 2019, Motorola Solutions has grown rapidly, both organically and through acquisition of IndigoVision, Pelco, Openpath, Envysion, and Ava Security. Cloud-based Orchestrate system Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code In addition, the company is making it easier to integrate video and access control systems with Motorola’s radio systems, typically carried by security guards. The cloud-based Orchestrate system translates ‘events’ from access control and video, to trigger notifications on a mobile radio. Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code. Simplifying implementation of AI Artificial Intelligence (AI) has traditionally been associated with the use of large servers or even intelligence in the Cloud. Several exhibitors at ISC West helped to change that misconception. For example, Oosto offers a simpler and more economical approach. They supply edge appliances for AI. The purpose-built Vision AI appliance, a small box, puts intelligence at the ‘near edge’, by connecting to up to five cameras. Easy and dependable ‘failover’ ensures redundancy without a big investment, and the system can work with any IP camera, including an end user’s installed base of cameras. Oosto’s TCO (total cost of ownership) calculator Oosto’s TCO (total cost of ownership) calculator spells out how much a customer can save versus using a big server, including lower costs such and power and cooling. AI was probably the biggest buzzword at ISC West, but there was also emphasis on the practical results of applying AI to physical security. Artificial Intelligence (AI) - the biggest buzzword at ISC West I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users" “What surprises me (at the show) is that there is a lot of generic marketing of AI, but we are trying to step back from our analytics and look at applications that serve certain end-users,” said Jeff Corrall, Vice President - Product Management at March Networks, adding “As an industry, we are still at the stage of AI as a buzzword.” Jeff Corrall further said, “I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users. We have to live with the buzzwords, but what we really want is to apply them. That creates a stickiness with the end-user — when high technology is making a difference.” March Networks Labs address specific end-user problems and then apply their systems to provide a solution. Jeff Corrall adds, “A lot of AI is responding to what the customer is asking for, and we are stepping back and making sure the end-user will use it on a consistent basis.” ‘Edge versus cloud’ was a common theme at ISC West Edge versus Cloud ‘Edge versus cloud’ was a common theme at ISC West, pondering where in a system the ‘intelligence’, such as AI and machine learning, as well as other functionality, should reside. Among the companies addressing the quandary was Axis Communications, which focused on the issue using a racing theme at their presentation to the industry press. The winner of the ‘race?’ - The combination of both approaches working together as a team, of course. AXIS Speed Monitor on exhibit One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP Axis Communications also highlighted the deep learning analytics of the ARPEC 8 camera chip (introduced during the COVID-19 pandemic), which will be deployed across their camera line. One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP (Axis Camera Application Platform), the capability to load ‘apps’ onto camera chips at the edge. They also introduced the D4100-E Network strobe siren (a smart edge device), the Audio Manager Pro (a cloud-based software system enabling zoning and callouts for specific areas in a building), the W101 body worn cameras with GPS capabilities, and a Barcode Reader for doorstop applications (another ACAP app). ‘App Store’ approach to expanding applications Azena is at the centre of expanding applications at the edge, promoting new applications through an ‘App Store’ approach that sells software apps that can be loaded onto cameras that are equipped with Azena’s operating system. In the last couple of years, the company (formerly known as Security and Safety Things) has expanded its offerings. There are currently 108 apps in the store from 30 to 40 app developers. There are 14 camera models (from six manufacturers) that are commercially available and run their operating system. The newest camera is a fisheye model from Vivotek. “What we have seen is that a lot of the use cases are pretty unique,” said Fabio Marti, Vice President - Marketing for Azena. Two examples are an application that monitors a flame to ensure it is burning cleanly (no smoke). Another system monitors nets covering fish farms to avoid birds getting tangled up in the nets. Fabio Marti said “A challenge is to find new business avenues for integrators. Everybody is not eager to look beyond their comfort zone.” Focusing on software to ensure user experience Software systems are one of the major focal points for innovation in security systems Software systems are one of the major focal points for innovation in security systems and Verkada is focusing on how software innovation can improve systems. “For decades, innovation was on the hardware front,” said Filip Kaliszan, Verkada’s Founder and Chief Executive Officer (CEO), adding “We saw an opportunity for more innovation on the software side. The customer experience revolves around software.” Ensuring an end-to-end experience “We want to guarantee an end-to-end experience,” adds Filip Kaliszan. As a new company with a ‘hybrid cloud’ approach, Verkada focused on appealing to end users to convince them of the value proposition. Once an end user was convinced, Verkada brought in an integrator partner to deliver the solution. In effect, Verkada finds demand and brings that demand to the integrator. Software-centric operation of a modern building Verkada is broadly focused on ‘software-centric operation of a modern building.’ After starting out in video, Verkada has since expanded into systems for access control, alarm systems, and other categories. They use a combination of third-party hardware and equipment that is custom designed to work seamlessly with their software systems. Verkada’s end goal is to put the various systems together into a platform. They will continue building each product category, which will eventually be unified into ‘the operating system for the building of the future.’
Case studies
The desire to improve the quality and efficiency of the technologies for post-match press conferences has seen an increasing number of sporting arenas investing in their press facilities. The recently completed new stadium in the city of Tizi Ouzou, Algeria, is a venue that has made this a priority right from the start, with the installation of a CCS 1000 D Digital Discussion System and an Integrus Wireless Language Distribution System from Bosch Building Technologies. UEFA equipment standards The 50,000-seat stadium is the new home of Algeria’s most successful football club, JS Kabylie, and has been built to exacting UEFA standards. This included all the press and broadcast infrastructure and meant that a high-quality press conference solution was demanded from the outset. Partnership with Atempo for audio solutions The company understands exactly what is required to meet the intricacies of UEFA standards New Stadium of Tizi Ouzou called on Turkish Bosch partner Atempo to design the solution for the press conference room, along with the rest of the audio systems for the venue. The company has worked on a variety of stadium projects and understands exactly what is required to meet the intricacies of UEFA standards, while also allowing a venue the flexibility to host non-sporting events. Customised conference technology for flexible deployment CCS 1000 D Digital Discussion System The stadium required a press conference solution that would offer high-quality sound and the flexibility to meet changing needs all with a modern and stylish design. The CCS 1000 D Digital Discussion System met these needs thanks to its compact size, easy set-up, and user-friendly operation, together with advanced features and versatility. Designed especially for quick, plug-and-play installation, it is a dedicated solution for small to medium-sized meeting areas, making it a perfect fit for the press conference room. Integrus Wireless Language Distribution System The solution met all the requirements of the stadium officials for a portable solution The Integrus Wireless Language Distribution System completes the installation, featuring 50 pocket receivers for the press representatives for simultaneous translation into eight languages. The solution met all requirements of the stadium officials for a portable solution that could be used in different configurations according to the needs of stadium officials. Clear and intelligible audio experience “The Bosch conference system presents a solution that fits exactly the requirements in the press areas of stadiums,” states Erhan Yılmaz, Technical Manager at Atempo. Erhan Yılmaz adds, “Bosch's high-quality microphone technology ensures a clear and intelligible audio experience. The Bosch conference system can adapt quickly to different events and needs. With its stylish and modern design, it adds prestige to the press area. Bosch's quality products ensure trouble-free and flawless press conferences.”
Protecting booths at trade shows is a challenge. After all, exhibitors want a constant stream of high traffic, especially from people they are meeting for the first time. It’s why they attend such large-scale fairs. Relying on exhibition-provided security is sadly not enough. Individual stands need their protection for areas where valuable equipment, product samples, or confidential commercial documents are kept. Innovative, modern solution Barcelona-based ExpoFactory specialises in the design and building of award-winning exhibition stands for the MICE, retail, and habitats/architecture sectors. They understand that booth security is integral to customers’ needs and that keeping booths safe is not easy. They hoped to identify an innovative, modern solution that would be more flexible and convenient than mechanical lock-and-key security. Factors to consider Firstly, easy installation, to ensure that fitting locks did not slow down their build process Two more factors were critical in their choice. Firstly, easy installation, to ensure that fitting locks did not slow down their build process. Secondly, and equally important: The ability to easily reset and reuse devices. ExpoFactory needs locks that can be trusted to last. Everyone has their PIN — no one carries keys To replace manual, mechanical keys and cylinders, they chose Code Handle Door, a digital PIN door lock housed within an elegant handle. So far, 60 devices have been equipped. With a Code Handle, all that’s needed to unlock is a secure 4- to 6-digit PIN. There’s no key to use, lose, or track, and no worries that it’s been copied. Code Handle “Code Handle has a stylish design, easy installation, and eliminates the need for physical keys,” says Adelfio Marino, Logistics Centre Manager at ExpoFactory. Installation is fast: the Code Handle fits over a standard cylinder and is fixed in place by two screws. Batteries slot inside for a minimal footprint. There’s no wiring or software to worry about. When the event is finished, it’s simple to reset the device ready to incorporate in another trade show stand. Upgrades booth security With Code Handle, the team leader chooses up to 9 different PINs for authorised staff Code Handle instantly upgrades booth security. It makes sure only the right people have access, not just anyone who happens upon the key. With no keys to track, organising stand security is easier, too. Everyone on the stand works faster because they don’t wait for a keyholder to appear. With Code Handle, the team leader chooses up to 9 different PINs for authorised staff (and cancels them anytime). Tailor-made digital solution It’s also a convenient digital solution tailor-made for busy trade shows: “Everything was easy and effective,” said Adelfio Marino, adding “And it makes our final product of higher quality. The customer prefers it.” With its unique combination of durability, stylish design, and ease of use, the Code Handle digital lock has already been deployed to separate public and private spaces in all kinds of settings from clinics and pharmacies to shops and home offices.
Metrasens, a provider of advanced detection systems for security and safety applications announced its collaboration with Moore Public Schools (MPS), Oklahoma's fourth-largest public school district. Together, they aim to bolster safety measures across the district by deploying Metrasens Ultra detection systems, ensuring a secure environment for extracurricular events at 35 campus sites and various large venues. Safety and security Committed to maintaining the highest safety and security standards, MPS consistently evaluates and updates its protocols. The district, known for its proactive approach, embraces new initiatives and technologies to enhance existing security measures. Building on a successful pilot of Metrasens Ultra detectors in the previous academic year, MPS officially integrated them at the start of the 2023-2024 school year. Metrasens detection systems The decision to choose Metrasens was influenced by the unmatched reliability and durability In alignment with their ongoing commitment to safety, several schools within the district have already incorporated Metrasens detection systems. The decision to choose Metrasens was influenced by the unmatched reliability and durability of its detectors, which seamlessly align with the district's overarching safety goals, whether implemented district-wide or at individual campuses. Following a rigorous evaluation process of various detector options, Metrasens stood out with its comprehensive product offerings and exceptional service. The company provided on-location assistance and training, earning high praise from the district. Reliable solutions Dustin Horstkoetter, MPS Safety, and Security Director, expressed his satisfaction, stating, "The reliability and quality of Metrasens solutions are incomparable." "We appreciate the partnership we have with Metrasens and the client care and technical support they can provide a district of our size." State-of-the-art sensor technology Metrasens Ultra utilises state-of-the-art sensor technology to swiftly and accurately identify potential threats, including concealed weapons. Its unique flexibility for both indoor and outdoor use, coupled with portability that allows easy movement within and between facilities without physical contact, set it apart from competitors. MPS criteria We are thrilled to play an integral part in helping MPS achieve its objective of accurately identifying prohibited threat items" Metrasens Ultra met key MPS criteria, including non-threatening design, portability, flexibility, ease of use, battery power option, weather resistance, zonal indication, and accuracy. "We are thrilled to play an integral part in helping MPS achieve their objective to accurately identify prohibited threat items before entry into their venues," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. Safe and positive experience "MPS is utilising the Metrasens Ultra to screen patrons before entering middle school and high school events, including football and basketball games, cheerleading competitions, graduations, and school board meetings." "We remain committed to supporting all of their security initiatives to ensure a safe and positive experience for all participants in these venues."
From sporting events and shows to parties and concerts, whatever happens at the Rudolf Weber-Arena in Oberhausen, Germany, up to 12,700 spectators can be on hand to cheer on their idols. The venue is extremely popular with spectators and event organisers alike, not only because of the great variety of events on offer but also because of its size and central location in the Ruhr area. Bosch upgrade To ensure that event-goers continue to benefit from the highest standards of safety and security, the arena's technology was recently updated with a team of experts from Bosch Building Technologies playing a key role. The project involved upgrading the fire alarm, intrusion detection, public address, and voice alarm solution that Bosch originally installed when the arena was built in 1996. What’s more, this time round, the venue operators also opted to install a networked video security and access control solution from Bosch. Intelligent monitoring with high-performance cameras The new video solution can monitor all areas of the multi-purpose arena, both inside and outside The new video solution can monitor all areas of the multi-purpose arena, both inside and outside. These areas are monitored by over 30 IP cameras, including high-performance HD dome cameras that can be remotely controlled. 4K cameras are pointing at the entrances to certain areas, and public circulation areas are also monitored. Several cameras are equipped with intelligent video analysis technology that makes it easy to immediately spot unusual details, such as an unattended rucksack. What’s more, a forensic search function can be used to analyse the video data retrospectively, so that video evidence can be found more quickly for the police, for example. Video security “The introduction of this video security system was really important to us,” says Mirco Markfort, General Manager of the Rudolf Weber-Arena. "Before we had this technology to provide us with a complete and dependable overview, we had to rely solely on feedback from our security staff in and around the arena. Now, we can work directly from the control centre." More straightforward operations with new digital processes To control the access of suppliers and day visitors through the backstage entrance, Bosch implemented a state-of-the-art visitor management system. Visitors are registered using a tablet, after which staff automatically issue access badges. This solution also makes it possible to keep track of who is on the premises at any given time. If the building needs to be evacuated, it can be verified that everyone has left the arena. Easy-to-use management system By clicking on individual cameras on the plan, for example, staff can call up the relevant video feed Fire alarm, voice alarm, video security, intrusion detection, and access control are all integrated into one easy-to-use management system from Bosch. As a result, control centre staff can operate and manage all safety and security systems easily and comprehensively from a single workstation. A floor plan of the building, showing all levels, is displayed on the screen. By clicking on individual cameras on the plan, for example, staff can call up the relevant video feed. Technical support with round-the-clock service from Bosch Those responsible for the arena in Oberhausen also rely on Bosch when it comes to servicing and maintaining the overall solution. As an event venue, which is at its busiest in the evenings and weekends, the arena relies on the 24/7 availability of the service team, which can be on-site quickly if required or access the systems remotely without delay.
i-PRO Co., Ltd., a pioneer in professional security solutions for surveillance and public safety, announced that the Grimaldi Forum Monaco (GFM) has chosen i-PRO multi-sensor and Fisheye security cameras with advanced AI-based analytics to enhance visitor safety, protect priceless artworks, and ensure a seamless and secure experience during high-profile events. Grimaldi Forum Located in the city-state of Monaco, the Grimaldi Forum, serves as a prominent venue for conferences, conventions, cultural events, and world-class art exhibitions. With a commitment to visitor safety and the preservation of priceless artworks, this state-of-the-art facility hosts over 100 diverse events annually, attracting more than 250,000 people a year. In the summer of 2023, the Grimaldi Forum showcased the prestigious "Monet in Full Light" exhibition, welcoming 120,000 visitors in two months and featuring nearly 100 of Claude Monet's masterpieces, including rare and previously unseen works. Advanced AI-based analytics When the Forum re-opened its doors to the public after a shutdown period due to COVID When faced with the challenge of enhancing security infrastructure while supporting organisational processes, Philippe Martin, Director of Safety, Fire, and Risk Prevention at the Grimaldi Forum Monaco, turned to Monaco-based system integrator MES I2S Security to install over 100 i-PRO cameras, including fisheye and multi-sensors with advanced AI-based analytics. “When the Forum re-opened its doors to the public after a shutdown period due to COVID, we were looking for a solution that would help us manage the number and flow of visitors while ensuring the security of the premises. At the time, we were also planning for the much-anticipated Monet exhibition, so we wanted to find the best possible technology to protect these unique masterpieces without interfering with the visitor experience or compromising with the venue’s aesthetic values,” says Philippe Martin, Director of Safety, Fire and Risk Prevention at the Grimaldi Forum Monaco. Wide-range coverage without blind spots Combining exceptional imaging performance with wide-area surveillance and IR LED lighting, i-PRO’s multi-sensor cameras allow the Grimaldi Forum security teams to monitor the activity across a large room while also enabling them to focus with great precision on a precise area of interest, at any time of day or night. Grimaldi Forum was able to considerably reduce the number of cameras required, thereby saving money. “If it wasn’t for the wide range of coverage offered by i-PRO’s multi-sensor cameras, we would have had to add another 77 cameras,” said Martin. "Not only do they offer wider coverage capabilities with a larger tilt range than other multi-sensor cameras on the market, but they are small and discreet so they can blend into the design of our beautiful facility.” Protecting valuable artworks AI-based object detection minimises false alarms due to changes in light or passing shadows Grimaldi Forum implemented i-PRO’s Scene Change Detection, an AI-based analytic application that alerts security teams to anomalies within the camera’s field of view. This technology safeguards artworks by identifying unusual behaviour or unauthorised proximity to valuable pieces. The Scene Change Detection app is operated simultaneously with other apps such as AI Video Motion Detection (VMD) of objects, allowing the security team to conduct multiple detections with one camera. i-PRO’s AI VMD can send security guards an alarm when an intruder enters a specified area or if that person loiters in an area where they are not supposed to be. It can also trigger an alarm if a specific threshold is crossed. AI-based object detection minimises false alarms due to changes of light or passing shadows. Real-time, proactive monitoring Using the i-PRO Active Guard plug-in, the Grimaldi Forum security team can quickly conduct real-time searches during an incident or deep forensic analysis post-event. They no longer have to spend time looking at multiple screens for persons of interest or watch hours of recorded video to search for important events. Operators can identify specific attributes in their watch lists (for instance “male wearing a red shirt and blue pants”), and the plug-in will send them a real-time alarm whenever a match is identified, a feature that is unique to i-PRO. This enhances real-time situational awareness and enables proactive security. The same process can be set up for fast data mining of events during forensic investigations. The same process can be set up for fast data mining of events during forensic investigations Managing Occupancy and Visitor Flow i-PRO fisheye cameras were strategically positioned at entrances and major axes to monitor large areas. The advanced AI analytics in these cameras enable Grimaldi Forum to detect congestion, manage visitor traffic flow, and count the number of people in specific areas. Heat maps provide statistical insights into traffic flow. Deployment of i-PRO's security systems Philippe Martin expressed his satisfaction with the implemented technology: “The technology we have implemented has precisely met the objectives we set at the beginning of this project,” says Martin. “But the human aspect cannot be understated; the teams at i-PRO, and MES i2S have been amazing to work with.” The successful deployment of i-PRO's security systems has not only ensured visitor safety during high-profile events like the Monet exhibition but has also strengthened the Grimaldi Forum Monaco’s security posture to handle a variety of upcoming events and support future expansion plans.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Round table discussion
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?