Facial recognition systems
With new life-saving drugs being created every day, the pharmaceutical industry is directly involved in saving human lives across the world. With how important the work of this sector is, it becomes more important to leverage physical access control for the pharmaceutical sector. This helps to protect intellectual property and physical as well as human assets. Top concerns about security The top concerns about security in pharmaceutical industries include the safety of materials The top conc...
Sentinel Photonics, a pioneering UK-based designer and manufacturer of advanced laser detection and protection systems, announces European expansion with two new strategic partnerships in Romania and the Benelux region. The collaborations strengthen the company’s presence in key European defence and security markets. LASERD® detection systems Sentinel Photonics has appointed StarC4SYS as its official sales partner in Romania Sentinel Photonics has appointed StarC4SYS ...
Themed “Airport Operations for Tomorrow”, inter airport Southeast Asia 2025 (IASEA) curated a lineup of conference sessions and the latest innovations to drive conversations on what a sustainable tomorrow looks like for Asia’s airport operations and ground handling industry. From 25-27 March 2025, the 8th edition of IASEA is expected to gather over 4,000 attendees, 150 notable global brands and some 50 industry experts as speakers at the iconic Marina Bay Sands, Singapore. IA...
iDenfy, a global RegTech solutions provider, announced a new partnership with Highvibes, a pioneering 360° media company specialising in music distribution, publishing, and record label services. By integrating iDenfy’s ID verification software, Highvibes aims to scale faster while creating a strong first impression from the initial account opening and verification step. iDenfy’s solution will now handle this process, saving time and costs for the music industry player. Digital...
iDenfy, a pioneer in identity verification and regulatory compliance technology, partnered with Secret View, a Netherlands-based pioneering feedback service provider in the retail and hospitality sectors. iDenfy’s Know Your Customer (KYC) software platform and custom-tailored data collection and verification flows will help Secret View verify community members and comply with the latest regulations, such as the GDPR and DAC7 requirements for online marketplaces. Data protection st...
North American Video (NAV), the security systems integrator with more casino installations and gaming partners across the U.S. than any other systems integration firm, retains its exclusive Surveillance Technical Integration Sponsorship for the 2025 World Game Protection Conference (WGPC), taking place March 11-13 at the Rio Las Vegas. This marks NAV’s fifth consecutive year as the exclusive sponsor, demonstrating its ongoing commitment to deliver superior system solutions for the ga...
News
Last week in New Delhi, the Future Crime Summit 2025, India's largest gathering on cyber innovations and synthetic threats, brought together over 1,000 experts, law enforcement officials, and defence pioneers to discuss the growing challenges posed by cybercrime and the latest AI-driven solutions. Key topics included AI-enabled attacks, ransomware, crypto fraud, blockchain vulnerabilities, and the risks of quantum computing. The founder of the Future Crime event, Professor Dr. Triveni Singh, also attended the summit. Evolving cyber threats Iqbal Hassan, Deputy Director General at the Ministry of Electronics and IT and Founder of the Future Crime Research Foundation (FCRF), provided insightful inputs on how the government is taking concrete steps to counter cyberattacks. He highlighted ongoing policy measures designed to strengthen law enforcement agencies (LEAs) in their fight against evolving cyber threats. Adoption of AI and machine learning Hassan emphasised the government’s duty to bolstering cybersecurity infrastructure “The collaboration between government agencies, law enforcement, and technology providers is crucial in addressing the evolving landscape of cyber threats,” he stated. Hassan also emphasised the government’s commitment to bolstering cybersecurity infrastructure and promoting the adoption of AI and machine learning in forensic investigations. Role of facial recognition technology In the same panel discussion, experts talked about the role of facial recognition technology in law enforcement. Amita Singh, Managing Director of ATAS One Pte Ltd. and Partner at Corsight AI, emphasised the crucial role of AI and machine learning in modern crime prevention. However, she also stressed that awareness and education remain the most powerful tools in countering cyber threats. “While artificial intelligence, machine learning, and other emerging technologies play a very important role, individuals and citizens must adopt the most crucial tool—being aware and spreading awareness,” she stated. Corsight AI’s facial recognition The Future Crime Summit 2025 honoured various law enforcement agencies for their efforts in combating cybercrime Singh also highlighted that combating cyber threats is not an isolated effort. “Countering cyberattacks requires a unified approach, involving law enforcement agencies, the academic community, disruptive technologies, and companies like us working together to make a collective impact.” Highlighting the investigative challenges posed by cybercrime, Singh noted that verifying identities remains a major hurdle. “While digital forensics helps analyse data, Corsight AI’s facial recognition provides tangible, real-world evidence by identifying individuals in surveillance footage—even in poor lighting or when they attempt to obscure their features.” Role of AI in modern investigations Amit Sharma, a cybersecurity specialist attending the summit, echoed the sentiment, emphasising the role of AI in modern investigations. “With criminals employing sophisticated digital tactics, facial recognition combined with AI-driven analytics is a game-changer for law enforcement agencies,” he remarked. The Future Crime Summit 2025 also honoured various law enforcement agencies for their efforts in combating cybercrime. Among the awardees was Uttar Pradesh Police, recognised for its extensive cyber patrolling during Kumbh Mela 2025, along with Kerala Police, Haryana Police, and Indore Police, acknowledged for their contributions in cyber forensics, financial fraud investigations, and digital surveillance. Transformative impact of AI and machine learning The summit underscored the growing intersection between cybersecurity, AI, and law enforcement Ms. Singh further discussed the transformative impact of AI and machine learning in forensic investigations. “AI-driven tools are streamlining forensic analysis, significantly reducing the time required to identify suspects,” she said. The summit underscored the growing intersection between cybersecurity, AI, and law enforcement, reinforcing the need for continuous innovation to counter cyber threats. International publications on cybersecurity As part of the event, SSP Mohd Yaseen Kichloo, IPS, CICE Jammu and Kashmir, was honoured with a prestigious national award for his contributions to cyber policing. A decorated officer, Kichloo has previously received the President’s Medal, DGP Medal, and FICCI Smart Policing Award (2017) for Governance, as well as the 2022 National Police Award for Cyber Security. His expertise extends to authorship, having penned two books and numerous national and international publications on cybersecurity.
Verkada, a pioneer in cloud-based physical security, announced a wide range of updates to its Command platform that will make it even easier for its customers around the world to keep their people and places safe. To strengthen and enhance the entry experience, Verkada has deepened the integration of Verkada Guest and Verkada Access Control. Now, its customers can grant guests temporary, customisable visitor access credentials. Verkada's roll call reports Each credential is unique, time-bound, and exactly matched to the visitor's needs The moment a visitor checks in with Verkada Guest, organisations can provision a temporary access badge with custom permissions, or they can send a door unlock link that enables a visitor to open authorised doors directly from their phones. Each credential is unique, time-bound, and exactly matched to the visitor's needs. Guests are also now fully integrated with Verkada's roll call reports. Verkada customers can manage all occupants – both employees and guests – in emergency situations from a single tool. Improvements to access control solution Verkada also announced several step-change improvements to its access control solution for large-scale deployments, including support for third-party OSDP door readers and two new APIs that automate access control operations: programmatic updates to door schedules and the ability to update the doors, schedule, or groups components of an access level from third-party software, eliminating the need to make these changes manually in Command. Verkada's platform controls access "Today, Verkada's platform controls access for more than 3.7 million users and checks in more than 1.5 million visitors every month," said Brandon Davito, Senior Vice President of Product and Operations at Verkada. "We know that security starts at the door, so we've made significant investments in our platform that will both strengthen and simplify the entry experience for our customers – especially for organisations managing access in enterprise environments." Range of additional product and platform updates Verkada also announced a range of additional product and platform updates, including: Broadened video search tools. With History Player Search, Verkada customers can now access a comprehensive overview of all sightings of an individual with a single click – another way to streamline and optimise investigations. Verkada also reimagined the search interface in Command to give security teams an even more granular list of search attributes – from makes and models of vehicles to bumper stickers and even vehicle body damage – to surface people and vehicles of interest in even less time. Continued commitment to interoperability. Verkada's Command Connector is now officially recognised as an Open Network Video Interface Forum (ONVIF) Profile S conformant client. In addition, Command Connector can now also ingest feeds from RTSP-compatible cameras that are not ONVIF Profile S conformant, bringing the number of compatible video security camera models to more than one thousand. This will ensure that even more organisations can bring legacy, non-Verkada cameras into its cloud platform in minutes as they migrate to Verkada's Command platform. Even more flexible security deployments. Verkada's new WiFi Gateway will enable customers to deploy a range of Verkada devices anywhere with power and Wi-Fi, making installation simple in hard-to-wire locations like parking lots, fence lines, and school grounds. Enhanced privacy features. Building on Verkada's robust privacy features and permissions, its new Person of Interest Only Face Search limits the application of facial recognition technology to only images matching a pre-defined user list of Persons of Interest (POI). When enabled, all other facial recognition detections not in the POI list will not be stored. Streamlined management for organisations operating at scale. Verkada introduced new user and licence management tools to empower large, multi-site enterprises to more efficiently streamline and delegate operations. With the User Directories feature, organisations can now create regional boundaries for users and permissions that mirror their organisational structure, allowing local IT teams to manage their specific user base while central IT teams maintain oversight. Expanded line of next-generation Dome cameras. Verkada's 5MP CD43 and CD53 dome cameras include advanced image sensors with enhanced low-light viewing capability and expanded IR range for precise nighttime monitoring, as well as onboard storage of up to 365 days' retention and nearly 3x optical zoom capabilities for the CD53.
Matrix, a pioneering OEM in Security and Telecom solutions, is excited to announce its participation in the 12th edition of IBEX India 2025, scheduled for February 13-14 at Jio World Convention Centre, BKC, Mumbai. IBEX INDIA is a premier trade fair and conference connecting the BFSI Tech and Fintech sectors with cutting-edge banking technologies, where Matrix will showcase its advanced security solutions tailored for the banking sector, ensuring robust surveillance and access control for a secure banking environment. BFSI Sector at IBEX India 2025 Matrix is bringing its enterprise-grade IP Video Surveillance Solutions to IBEX India 2025, designed to meet the evolving security needs of the Banking and Fintech sector. These solutions empower financial institutions with advanced, cyber-secured surveillance, ensuring data integrity and operational resilience. Cyber-Secured Surveillance for BFSI: Matrix network cameras and VMS offer robust data protection with global cybersecurity compliance (OWASP-aligned), securing sensitive financial assets while ensuring trust and regulatory adherence. AI-Driven Analytics for Financial Security: Advanced video analytics, including intrusion detection, motion detection, and facial recognition, help banks and fintech firms mitigate security risks proactively. Centralized Security Management for BFSI: Real-time, remote monitoring with instant alerts via SMS, email, or WhatsApp ensures continuous vigilance and swift incident response for banking environments. Visit Matrix at IBEX India 2025 to explore how its scalable, BFSI-focused surveillance solutions enhance security, compliance, and operational efficiency for modern financial institutions. Advanced access control solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025, tailored to meet the stringent security and access management needs of banks, financial institutions, and fintech enterprises. Designed for scalability, compliance, and operational efficiency, these solutions provide seamless security while ensuring controlled access across multiple locations. Centralized Multi-Branch Access Management: Matrix enables banks and financial institutions to centrally manage access across multiple branches, corporate offices, and data centres, ensuring uniform security policies and streamlined administration. Elevator Access Control for High-Security Zones: Secure critical areas like executive floors, treasury rooms, and data centres with floor-wise access control, preventing unauthorised entry and enhancing operational security. Smart Visitor Management for Financial Institutions: Strengthen security with pre-registered visitor approvals, live tracking, and seamless check-ins, ensuring controlled access to sensitive banking areas while enhancing visitor experience. Visit Matrix at IBEX India 2025 to explore how its next-gen Access Control Solutions help banks and fintech enterprises achieve uncompromised security, regulatory compliance, and seamless access management. Intelligent time-attendance solutions for IBEX India 2025 Matrix is set to showcase its advanced Time-Attendance Solutions at IBEX India 2025, designed to enhance workforce efficiency, compliance, and operational accuracy for banks, financial institutions, and fintech enterprises. These solutions provide seamless automation and real-time insights, ensuring optimised workforce management in highly regulated environments. Precision-driven Workforce Management for Financial Institutions: Automate job processing and workforce tracking, ensuring accurate resource allocation and operational efficiency across multiple banking branches and corporate offices. Field Visit Management for BFSI Teams: Enable real-time tracking and reporting of field officers and relationship managers, enhancing accountability and productivity across distributed banking operations. Flexible & Secure Attendance Management: Empower employees with self-service portals for attendance, shift management, and leave tracking, ensuring seamless workforce operations while maintaining compliance with industry regulations. Visit Matrix at IBEX India 2025 to discover how its future-ready Time-Attendance Solutions help banks and fintech institutions achieve operational excellence, compliance, and workforce efficiency in a rapidly evolving financial landscape. Why visit Matrix at IBEX India 2025? Explore how Matrix is revolutionising security and workforce management for banks, financial institutions, and fintech enterprises with its cyber-secured IP Video Surveillance, advanced Access Control, and intelligent Time-Attendance solutions. At IBEX India 2025, experience live product demonstrations and interactive sessions, showcasing how Matrix’s solutions seamlessly integrate into banking and fintech infrastructures, ensuring regulatory compliance, operational efficiency, and data security. Gain first-hand insights into scalable and enterprise-grade security systems, designed to safeguard financial institutions, optimise workforce management, and enhance secure access to critical areas. Visit the Matrix booth to discover how cutting-edge technologies can help banks and fintech companies streamline security operations, mitigate risks, and drive growth in a rapidly evolving financial landscape.
Telaeris, Inc., a worldwide major company in handheld security and emergency mustering solutions, proudly announces that its XPressEntry XPID200 series handheld badge and biometric readers have received RCM (Regulatory Compliance Mark) certification for Australia. This certification ensures that XPressEntry meets the Australian Communications and Media Authority (ACMA) regulatory standards for radiocommunications, electromagnetic compatibility (EMC), and electrical safety. RCM certification - a key milestone for Telaeris The certification ensures that XPressEntry XPID200 readers adhere to the stringent compliance The RCM certification is a significant milestone for Telaeris, reinforcing its commitment to providing secure, reliable, and compliant handheld, mobile access control solutions for global markets. The certification ensures that XPressEntry XPID200 readers adhere to the stringent compliance requirements outlined under Australia’s Radiocommunications Equipment (General) Rules 2021 and the Radiocommunications Labelling (Electromagnetic Compatibility) Notice 2017. Expanding presence in Australia “Achieving RCM certification marks an important step in expanding our presence in Australia. With this approval, Australian and New Zealand businesses can confidently deploy XPressEntry handheld readers for secure access control and emergency mustering, ensuring compliance with local regulatory requirements,” said Dr. David Carta, the Chief Executive Officer (CEO) of Telaeris. He adds, “Our mission is to deliver innovative solutions that enhance security, safety, and operational efficiency, and this certification validates our commitment to excellence.” XPressEntry handheld readers XPressEntry handheld readers validate permissions and authenticate credentials against the identity information on record in the access control system database on-the-go from anywhere, record entries and exits where door readers are not practical or available, maintaining the latest facility occupancy information, challenge credentials within high security areas, quickly muster employees during a real emergency evacuation, and much more. Telaeris remains committed to expanding its global reach by ensuring its products meet local regulatory and compliance standards. The RCM certification further establishes XPressEntry as a trusted solution for organisations in Australia and New Zealand seeking advanced security and mustering capabilities. Major in access control integrations Physical security and safety professionals in 40+ countries around the world trust XPressEntry. XPressEntry handheld readers proudly lead the industry with the most access control integrations and lead the industry with the broadest support for badge technologies plus biometrics including facial recognition.
The MX2457 camera by XIMEA sets new standards in industrial imaging. A key highlight is the integration of Sony’s latest IMX811 medium format sensor with an impressive 245.7 MP resolution, making it perfect for tasks like surface inspection, texture capture, and detailed 3D modeling. MX2457 camera by XIMEA The MX2457 camera’s PCIe interface enables high-bandwidth, real-time data transfer The MX2457 camera’s PCIe interface enables high-bandwidth, real-time data transfer – ideal for high frame rates and low latency. Its detachable sensor head provides flexibility for tight spaces, reduces heat buildup, and improves image quality by minimising noise. As part of XIMEA’s xiX-XL camera family, the MX2457 combines high resolution, flexibility, and robustness. An interesting case of use is aerial mapping, capturing high-resolution images valuable for cartography, agriculture, and urban planning. Advantages of aerial mapping with the MX2457: Detailed maps: High resolution for precise models Accurate measurements: Combines aerial images with GPS data Efficiency: Quickly captures large areas Further areas of application: Machine vision: Inspection of products, quality control Medical technology: microscopy, endoscopy Scientific research: material analysis, biology Security technology: surveillance, facial recognition
With its latest update, Regula Document Reader SDK, a comprehensive software solution for identity document verification, ensures 100% support for the new ISO/IEC 39794-5 standard regulating the methods of facial data storage and verification in e-passport chips. According to the ICAO guidelines, all document readers and verification systems must be compatible with the new standard by 2026, with passport issuers required to fully adopt the new format by 2030. ISO/IEC 19794-5:2005 standard The ISO/IEC 39794-5 standard introduces an enhanced framework for facial image data, significantly improving interoperability, processing speed, and recognition accuracy across different identity verification (IDV) systems worldwide. Unlike the previous ISO/IEC 19794-5:2005 standard, which primarily stored a basic facial image, the new format records additional metadata, including detailed facial landmarks, precise eye and hair colour, and other biometric attributes. Why this matters The richer set of pre-stored reference points eliminates the need for separate face detection The richer set of pre-stored reference points eliminates the need for separate face detection and feature extraction during verification. Instead of calculating key facial points from scratch, IDV systems can use the pre-recorded metadata, accelerating processing times and ensuring consistent, high-quality recognition results—regardless of the local algorithm used for comparison. This standardisation guarantees that a person’s face in their passport will be consistently and accurately verified across different countries, improving global interoperability. Framework for future extensions Apart from that, the ISO/IEC 39794-5 standard implements a flexible framework for future extensions. This means that as new attributes or enhancements are introduced in the future, all systems supporting this standard will remain fully functional without requiring urgent updates—unlike the current situation, where all IDV systems would need to be updated to accommodate new data formats. Regula’s long-standing expertise Regula’s expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation Although the current ISO/IEC 19794-5:2005 will remain valid, the industry has started the transition period, and businesses worldwide should be ready to process the new format data before 2026. Regula’s long-standing expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation to the new standard even prior to its coming into force. Identity verification systems The company’s participation in the recent testing event in Australia demonstrated its ability to correctly extract, interpret, and verify biometric facial data encoded according to ISO/IEC 39794-5. This means that identity verification systems using Regula’s software are future-proofed against compatibility issues that could arise as countries transition to the new format. Transition to the new standard Regula's IDV software is compatible with document readers on the market and can be easily used In addition, the new standard will require organisations from banks to border control to update their passport readers with software that fits this standard. Regula's IDV software is compatible with most document readers on the market and can be easily used with any device model. This implies a seamless transition to the new standard without replacing existing hardware, ensuring a cost-effective and hassle-free upgrade. Efficiency in biometric verification “The shift to ISO/IEC 39794-5 is a major step forward in improving compatibility and efficiency in biometric verification. With more detailed metadata now embedded in e-passports, identity verification systems can achieve faster processing and more accurate recognition results." "Our expertise in RFID chip processing ensures that Regula’s technology is already fully equipped to support this transition, providing organisations with seamless, future-proof solutions that help them stay in line with regulatory changes,” says Ihar Kliashchou, Chief Technology Officer at Regula.
Last week in New Delhi, the Future Crime Summit 2025, India's largest gathering on cyber innovations and synthetic threats, brought together over 1,000 experts, law enforcement officials, and defence pioneers to discuss the growing challenges posed by cybercrime and the latest AI-driven solutions. Key topics included AI-enabled attacks, ransomware, crypto fraud, blockchain vulnerabilities, and the risks of quantum computing. The founder of the Future Crime event, Professor Dr. Triveni Singh, also attended the summit. Evolving cyber threats Iqbal Hassan, Deputy Director General at the Ministry of Electronics and IT and Founder of the Future Crime Research Foundation (FCRF), provided insightful inputs on how the government is taking concrete steps to counter cyberattacks. He highlighted ongoing policy measures designed to strengthen law enforcement agencies (LEAs) in their fight against evolving cyber threats. Adoption of AI and machine learning Hassan emphasised the government’s duty to bolstering cybersecurity infrastructure “The collaboration between government agencies, law enforcement, and technology providers is crucial in addressing the evolving landscape of cyber threats,” he stated. Hassan also emphasised the government’s commitment to bolstering cybersecurity infrastructure and promoting the adoption of AI and machine learning in forensic investigations. Role of facial recognition technology In the same panel discussion, experts talked about the role of facial recognition technology in law enforcement. Amita Singh, Managing Director of ATAS One Pte Ltd. and Partner at Corsight AI, emphasised the crucial role of AI and machine learning in modern crime prevention. However, she also stressed that awareness and education remain the most powerful tools in countering cyber threats. “While artificial intelligence, machine learning, and other emerging technologies play a very important role, individuals and citizens must adopt the most crucial tool—being aware and spreading awareness,” she stated. Corsight AI’s facial recognition The Future Crime Summit 2025 honoured various law enforcement agencies for their efforts in combating cybercrime Singh also highlighted that combating cyber threats is not an isolated effort. “Countering cyberattacks requires a unified approach, involving law enforcement agencies, the academic community, disruptive technologies, and companies like us working together to make a collective impact.” Highlighting the investigative challenges posed by cybercrime, Singh noted that verifying identities remains a major hurdle. “While digital forensics helps analyse data, Corsight AI’s facial recognition provides tangible, real-world evidence by identifying individuals in surveillance footage—even in poor lighting or when they attempt to obscure their features.” Role of AI in modern investigations Amit Sharma, a cybersecurity specialist attending the summit, echoed the sentiment, emphasising the role of AI in modern investigations. “With criminals employing sophisticated digital tactics, facial recognition combined with AI-driven analytics is a game-changer for law enforcement agencies,” he remarked. The Future Crime Summit 2025 also honoured various law enforcement agencies for their efforts in combating cybercrime. Among the awardees was Uttar Pradesh Police, recognised for its extensive cyber patrolling during Kumbh Mela 2025, along with Kerala Police, Haryana Police, and Indore Police, acknowledged for their contributions in cyber forensics, financial fraud investigations, and digital surveillance. Transformative impact of AI and machine learning The summit underscored the growing intersection between cybersecurity, AI, and law enforcement Ms. Singh further discussed the transformative impact of AI and machine learning in forensic investigations. “AI-driven tools are streamlining forensic analysis, significantly reducing the time required to identify suspects,” she said. The summit underscored the growing intersection between cybersecurity, AI, and law enforcement, reinforcing the need for continuous innovation to counter cyber threats. International publications on cybersecurity As part of the event, SSP Mohd Yaseen Kichloo, IPS, CICE Jammu and Kashmir, was honoured with a prestigious national award for his contributions to cyber policing. A decorated officer, Kichloo has previously received the President’s Medal, DGP Medal, and FICCI Smart Policing Award (2017) for Governance, as well as the 2022 National Police Award for Cyber Security. His expertise extends to authorship, having penned two books and numerous national and international publications on cybersecurity.
Verkada, a pioneer in cloud-based physical security, announced a wide range of updates to its Command platform that will make it even easier for its customers around the world to keep their people and places safe. To strengthen and enhance the entry experience, Verkada has deepened the integration of Verkada Guest and Verkada Access Control. Now, its customers can grant guests temporary, customisable visitor access credentials. Verkada's roll call reports Each credential is unique, time-bound, and exactly matched to the visitor's needs The moment a visitor checks in with Verkada Guest, organisations can provision a temporary access badge with custom permissions, or they can send a door unlock link that enables a visitor to open authorised doors directly from their phones. Each credential is unique, time-bound, and exactly matched to the visitor's needs. Guests are also now fully integrated with Verkada's roll call reports. Verkada customers can manage all occupants – both employees and guests – in emergency situations from a single tool. Improvements to access control solution Verkada also announced several step-change improvements to its access control solution for large-scale deployments, including support for third-party OSDP door readers and two new APIs that automate access control operations: programmatic updates to door schedules and the ability to update the doors, schedule, or groups components of an access level from third-party software, eliminating the need to make these changes manually in Command. Verkada's platform controls access "Today, Verkada's platform controls access for more than 3.7 million users and checks in more than 1.5 million visitors every month," said Brandon Davito, Senior Vice President of Product and Operations at Verkada. "We know that security starts at the door, so we've made significant investments in our platform that will both strengthen and simplify the entry experience for our customers – especially for organisations managing access in enterprise environments." Range of additional product and platform updates Verkada also announced a range of additional product and platform updates, including: Broadened video search tools. With History Player Search, Verkada customers can now access a comprehensive overview of all sightings of an individual with a single click – another way to streamline and optimise investigations. Verkada also reimagined the search interface in Command to give security teams an even more granular list of search attributes – from makes and models of vehicles to bumper stickers and even vehicle body damage – to surface people and vehicles of interest in even less time. Continued commitment to interoperability. Verkada's Command Connector is now officially recognised as an Open Network Video Interface Forum (ONVIF) Profile S conformant client. In addition, Command Connector can now also ingest feeds from RTSP-compatible cameras that are not ONVIF Profile S conformant, bringing the number of compatible video security camera models to more than one thousand. This will ensure that even more organisations can bring legacy, non-Verkada cameras into its cloud platform in minutes as they migrate to Verkada's Command platform. Even more flexible security deployments. Verkada's new WiFi Gateway will enable customers to deploy a range of Verkada devices anywhere with power and Wi-Fi, making installation simple in hard-to-wire locations like parking lots, fence lines, and school grounds. Enhanced privacy features. Building on Verkada's robust privacy features and permissions, its new Person of Interest Only Face Search limits the application of facial recognition technology to only images matching a pre-defined user list of Persons of Interest (POI). When enabled, all other facial recognition detections not in the POI list will not be stored. Streamlined management for organisations operating at scale. Verkada introduced new user and licence management tools to empower large, multi-site enterprises to more efficiently streamline and delegate operations. With the User Directories feature, organisations can now create regional boundaries for users and permissions that mirror their organisational structure, allowing local IT teams to manage their specific user base while central IT teams maintain oversight. Expanded line of next-generation Dome cameras. Verkada's 5MP CD43 and CD53 dome cameras include advanced image sensors with enhanced low-light viewing capability and expanded IR range for precise nighttime monitoring, as well as onboard storage of up to 365 days' retention and nearly 3x optical zoom capabilities for the CD53.
Matrix, a pioneering OEM in Security and Telecom solutions, is excited to announce its participation in the 12th edition of IBEX India 2025, scheduled for February 13-14 at Jio World Convention Centre, BKC, Mumbai. IBEX INDIA is a premier trade fair and conference connecting the BFSI Tech and Fintech sectors with cutting-edge banking technologies, where Matrix will showcase its advanced security solutions tailored for the banking sector, ensuring robust surveillance and access control for a secure banking environment. BFSI Sector at IBEX India 2025 Matrix is bringing its enterprise-grade IP Video Surveillance Solutions to IBEX India 2025, designed to meet the evolving security needs of the Banking and Fintech sector. These solutions empower financial institutions with advanced, cyber-secured surveillance, ensuring data integrity and operational resilience. Cyber-Secured Surveillance for BFSI: Matrix network cameras and VMS offer robust data protection with global cybersecurity compliance (OWASP-aligned), securing sensitive financial assets while ensuring trust and regulatory adherence. AI-Driven Analytics for Financial Security: Advanced video analytics, including intrusion detection, motion detection, and facial recognition, help banks and fintech firms mitigate security risks proactively. Centralized Security Management for BFSI: Real-time, remote monitoring with instant alerts via SMS, email, or WhatsApp ensures continuous vigilance and swift incident response for banking environments. Visit Matrix at IBEX India 2025 to explore how its scalable, BFSI-focused surveillance solutions enhance security, compliance, and operational efficiency for modern financial institutions. Advanced access control solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025 Matrix is set to showcase its enterprise-grade Access Control Solutions at IBEX India 2025, tailored to meet the stringent security and access management needs of banks, financial institutions, and fintech enterprises. Designed for scalability, compliance, and operational efficiency, these solutions provide seamless security while ensuring controlled access across multiple locations. Centralized Multi-Branch Access Management: Matrix enables banks and financial institutions to centrally manage access across multiple branches, corporate offices, and data centres, ensuring uniform security policies and streamlined administration. Elevator Access Control for High-Security Zones: Secure critical areas like executive floors, treasury rooms, and data centres with floor-wise access control, preventing unauthorised entry and enhancing operational security. Smart Visitor Management for Financial Institutions: Strengthen security with pre-registered visitor approvals, live tracking, and seamless check-ins, ensuring controlled access to sensitive banking areas while enhancing visitor experience. Visit Matrix at IBEX India 2025 to explore how its next-gen Access Control Solutions help banks and fintech enterprises achieve uncompromised security, regulatory compliance, and seamless access management. Intelligent time-attendance solutions for IBEX India 2025 Matrix is set to showcase its advanced Time-Attendance Solutions at IBEX India 2025, designed to enhance workforce efficiency, compliance, and operational accuracy for banks, financial institutions, and fintech enterprises. These solutions provide seamless automation and real-time insights, ensuring optimised workforce management in highly regulated environments. Precision-driven Workforce Management for Financial Institutions: Automate job processing and workforce tracking, ensuring accurate resource allocation and operational efficiency across multiple banking branches and corporate offices. Field Visit Management for BFSI Teams: Enable real-time tracking and reporting of field officers and relationship managers, enhancing accountability and productivity across distributed banking operations. Flexible & Secure Attendance Management: Empower employees with self-service portals for attendance, shift management, and leave tracking, ensuring seamless workforce operations while maintaining compliance with industry regulations. Visit Matrix at IBEX India 2025 to discover how its future-ready Time-Attendance Solutions help banks and fintech institutions achieve operational excellence, compliance, and workforce efficiency in a rapidly evolving financial landscape. Why visit Matrix at IBEX India 2025? Explore how Matrix is revolutionising security and workforce management for banks, financial institutions, and fintech enterprises with its cyber-secured IP Video Surveillance, advanced Access Control, and intelligent Time-Attendance solutions. At IBEX India 2025, experience live product demonstrations and interactive sessions, showcasing how Matrix’s solutions seamlessly integrate into banking and fintech infrastructures, ensuring regulatory compliance, operational efficiency, and data security. Gain first-hand insights into scalable and enterprise-grade security systems, designed to safeguard financial institutions, optimise workforce management, and enhance secure access to critical areas. Visit the Matrix booth to discover how cutting-edge technologies can help banks and fintech companies streamline security operations, mitigate risks, and drive growth in a rapidly evolving financial landscape.
Telaeris, Inc., a worldwide major company in handheld security and emergency mustering solutions, proudly announces that its XPressEntry XPID200 series handheld badge and biometric readers have received RCM (Regulatory Compliance Mark) certification for Australia. This certification ensures that XPressEntry meets the Australian Communications and Media Authority (ACMA) regulatory standards for radiocommunications, electromagnetic compatibility (EMC), and electrical safety. RCM certification - a key milestone for Telaeris The certification ensures that XPressEntry XPID200 readers adhere to the stringent compliance The RCM certification is a significant milestone for Telaeris, reinforcing its commitment to providing secure, reliable, and compliant handheld, mobile access control solutions for global markets. The certification ensures that XPressEntry XPID200 readers adhere to the stringent compliance requirements outlined under Australia’s Radiocommunications Equipment (General) Rules 2021 and the Radiocommunications Labelling (Electromagnetic Compatibility) Notice 2017. Expanding presence in Australia “Achieving RCM certification marks an important step in expanding our presence in Australia. With this approval, Australian and New Zealand businesses can confidently deploy XPressEntry handheld readers for secure access control and emergency mustering, ensuring compliance with local regulatory requirements,” said Dr. David Carta, the Chief Executive Officer (CEO) of Telaeris. He adds, “Our mission is to deliver innovative solutions that enhance security, safety, and operational efficiency, and this certification validates our commitment to excellence.” XPressEntry handheld readers XPressEntry handheld readers validate permissions and authenticate credentials against the identity information on record in the access control system database on-the-go from anywhere, record entries and exits where door readers are not practical or available, maintaining the latest facility occupancy information, challenge credentials within high security areas, quickly muster employees during a real emergency evacuation, and much more. Telaeris remains committed to expanding its global reach by ensuring its products meet local regulatory and compliance standards. The RCM certification further establishes XPressEntry as a trusted solution for organisations in Australia and New Zealand seeking advanced security and mustering capabilities. Major in access control integrations Physical security and safety professionals in 40+ countries around the world trust XPressEntry. XPressEntry handheld readers proudly lead the industry with the most access control integrations and lead the industry with the broadest support for badge technologies plus biometrics including facial recognition.
The MX2457 camera by XIMEA sets new standards in industrial imaging. A key highlight is the integration of Sony’s latest IMX811 medium format sensor with an impressive 245.7 MP resolution, making it perfect for tasks like surface inspection, texture capture, and detailed 3D modeling. MX2457 camera by XIMEA The MX2457 camera’s PCIe interface enables high-bandwidth, real-time data transfer The MX2457 camera’s PCIe interface enables high-bandwidth, real-time data transfer – ideal for high frame rates and low latency. Its detachable sensor head provides flexibility for tight spaces, reduces heat buildup, and improves image quality by minimising noise. As part of XIMEA’s xiX-XL camera family, the MX2457 combines high resolution, flexibility, and robustness. An interesting case of use is aerial mapping, capturing high-resolution images valuable for cartography, agriculture, and urban planning. Advantages of aerial mapping with the MX2457: Detailed maps: High resolution for precise models Accurate measurements: Combines aerial images with GPS data Efficiency: Quickly captures large areas Further areas of application: Machine vision: Inspection of products, quality control Medical technology: microscopy, endoscopy Scientific research: material analysis, biology Security technology: surveillance, facial recognition
With its latest update, Regula Document Reader SDK, a comprehensive software solution for identity document verification, ensures 100% support for the new ISO/IEC 39794-5 standard regulating the methods of facial data storage and verification in e-passport chips. According to the ICAO guidelines, all document readers and verification systems must be compatible with the new standard by 2026, with passport issuers required to fully adopt the new format by 2030. ISO/IEC 19794-5:2005 standard The ISO/IEC 39794-5 standard introduces an enhanced framework for facial image data, significantly improving interoperability, processing speed, and recognition accuracy across different identity verification (IDV) systems worldwide. Unlike the previous ISO/IEC 19794-5:2005 standard, which primarily stored a basic facial image, the new format records additional metadata, including detailed facial landmarks, precise eye and hair colour, and other biometric attributes. Why this matters The richer set of pre-stored reference points eliminates the need for separate face detection The richer set of pre-stored reference points eliminates the need for separate face detection and feature extraction during verification. Instead of calculating key facial points from scratch, IDV systems can use the pre-recorded metadata, accelerating processing times and ensuring consistent, high-quality recognition results—regardless of the local algorithm used for comparison. This standardisation guarantees that a person’s face in their passport will be consistently and accurately verified across different countries, improving global interoperability. Framework for future extensions Apart from that, the ISO/IEC 39794-5 standard implements a flexible framework for future extensions. This means that as new attributes or enhancements are introduced in the future, all systems supporting this standard will remain fully functional without requiring urgent updates—unlike the current situation, where all IDV systems would need to be updated to accommodate new data formats. Regula’s long-standing expertise Regula’s expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation Although the current ISO/IEC 19794-5:2005 will remain valid, the industry has started the transition period, and businesses worldwide should be ready to process the new format data before 2026. Regula’s long-standing expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation to the new standard even prior to its coming into force. Identity verification systems The company’s participation in the recent testing event in Australia demonstrated its ability to correctly extract, interpret, and verify biometric facial data encoded according to ISO/IEC 39794-5. This means that identity verification systems using Regula’s software are future-proofed against compatibility issues that could arise as countries transition to the new format. Transition to the new standard Regula's IDV software is compatible with document readers on the market and can be easily used In addition, the new standard will require organisations from banks to border control to update their passport readers with software that fits this standard. Regula's IDV software is compatible with most document readers on the market and can be easily used with any device model. This implies a seamless transition to the new standard without replacing existing hardware, ensuring a cost-effective and hassle-free upgrade. Efficiency in biometric verification “The shift to ISO/IEC 39794-5 is a major step forward in improving compatibility and efficiency in biometric verification. With more detailed metadata now embedded in e-passports, identity verification systems can achieve faster processing and more accurate recognition results." "Our expertise in RFID chip processing ensures that Regula’s technology is already fully equipped to support this transition, providing organisations with seamless, future-proof solutions that help them stay in line with regulatory changes,” says Ihar Kliashchou, Chief Technology Officer at Regula.


Expert commentary
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even 'mac addresses' or a person of interest's gait, now all make up the technology toolbox of forward-thinking organisations' security policy. However, humans remain the weakest link in any security chain, and the only way to correct this is to eliminate the human burden, argues Richard Hilson, head of sales for security access management specialist, Parking Facilities. Here, he examines the pitfalls in relying upon human intervention in critical national infrastructure (CNI) settings, and the future of biometrics to keep assets, information and personnel safe. Recent Verizon report 74 percent of corps are saying that insider threats are becoming more of a concern for them As with any workplace initiative, be it a simple recycling policy or a corporate password protection directive, technology is only as good as those who implement or operate it. Whilst technology can be fallible and gremlins do arise, it’s never as flawed as us mere humans with our unreliable ‘on/off’ switch. Likewise, we carry the ability to reason, to override procedures, or ignore policy, should we wish. Or as it happens, just make mistakes. In fact, according to a recent Verizon report, two out of three insider attacks happen as a result of negligence, and 74 percent of organisations are saying that insider threats are becoming more of a concern for them. Fundamental security practices Security breaches aren’t limited to external threats either, whether intentionally or not, they can come from within. Humans can, and do, ‘go rogue’, whether that’s pre-meditated criminal or malicious intent, or just by taking shortcuts. While data breaches court most news headlines in this digital era, some of the most significant security risks are those posed when employees neglect fundamental security practices such as sharing passwords or access cards. Employee negligence and insider threats Insider negligence remains one of the pioneering causes of security breaches Insider negligence remains one of the pioneering causes of security breaches. Employees who share passwords or access cards may do so out of convenience, ignorance, or a misplaced sense of trust. Unfortunately, this creates vulnerabilities that are left open to exploitation. When multiple employees share credentials, it becomes difficult to trace actions to a single individual. This lack of accountability can complicate incident investigations and allows malicious activities to go undetected. Emergency services resources Furthermore, the sharing of passwords or access cards means inaccurate accounting of personnel, and in the event of an evacuation or major incident, central IT systems will hold misleading information of employees’ locations which could have a huge impact upon safety and potentially emergency services resources. Employees with malicious intent can exploit shared credentials to carry out unauthorised activities while shifting blame to others, increasing the risk of deliberate sabotage or theft of sensitive data. Even when there is no malicious intent, employees who share access credentials risk unintentionally exposing them to unauthorised individuals, such as contractors, visitors, or external attackers. What happens when employees compromise security? Access cards are designed to limit entry to restricted physical locations. When shared, unauthorised personnel could enter secure areas such as control rooms, rail lines, large construction sites, data centres, power plants or indeed any site meant to be kept secure. This creates opportunities for sabotage, theft, or corporate espionage. Sensitive data held within critical sites, such as blueprints, system controls, and customer records Likewise, shared passwords can lead to unauthorised entry into IT systems, allowing hackers to install malware, ransomware, or spyware. For example, a cybercriminal gaining access to an energy grid system could shut down power to entire regions, causing chaos to millions of people, and disrupting essential services. And not all data breaches are caused by online hackers gaining entry through unsecure firewalls. Sensitive information held within critical sites, such as blueprints, system controls, and customer records, becomes vulnerable when access credentials are shared too, and the disclosure of such information can have a serious impact upon a company’s bottom line, operations, and ultimately its reputation. Eliminating the human burden One way to prevent human error, or to thwart malpractice is to reduce the burden upon employees to be compliant, and eliminate our flaws by using technology that requires no intervention, decision-making or reason. Facial recognition is widely used in the civil world now, despite the concerns of various lobbyists. Used correctly it is not a ‘catch all’, but an instant recognition of persons of interest cross referenced against a database of known suspects. Our car parks are governed by automatic number plate recognition (ANPR) to gain access in and out, while border controls are using advanced biometrics for everything from facial and fingerprint recognition, through to recognition of human characteristics and gait, for both entry and to apprehend. The UK Home Office is even accelerating its transition to digital border management, using biometric technology to improve efficiencies, safety, and to track and capture known or illegal persons. What of the CNI sites? But what of the corporate world? What of the CNI sites, our airports, our national construction developments such as HS2 or our high-rise office spaces? We always ask this very question, and also ‘can you afford a security breach’ in whatever environment you’re in? Because the smart, cloud-based technology being used by governments, law enforcement authorities and Border Force have cascaded down through the civil and corporate worlds. Immediate safety and security Security-conscious corps are diligently removing human error, by eliminating the human burden Security-conscious organisations are now diligently removing human error, by eliminating the human burden. With cloud-managed software not only are access points managed through biometric integration, but it also overcomes the issues mentioned earlier around accountability - in that the cloud will always register who has passed through an access point, or out of it. This is critical for both immediate safety and security but also for matters arising from a crisis, or emergency situation. It’s also less admin-heavy, more cost-effective and can manage and store employee records, including background checks. Employee or contractor data is encrypted, their information is safe, their interactions are secure, and businesses are protected. Implement robust access management systems Simple acts of negligence, such as sharing passwords or access cards, can open the door to catastrophic consequences, operational disruption, financial loss, and even, in the case of CNI, national security risks. To mitigate this, organisations can do worse than to implement robust access management systems, and in doing so, release employees from having to be accountable for ensuring the security of the sites in which they work. As artificial intelligence evolves, I see even more robust biometrics coming to the fore, until such time we work and live in environments that are controlled without us even knowing security checkpoints are all around us, and access management happening at every step. It will become as ‘every day’ as an automatic door allowing entry into our local supermarket - but we’re not quite there yet.
As urban populations grow and security challenges evolve, Californian cities have increasingly turned to advanced surveillance systems to enhance public safety. Surveillance infrastructure Between 2022 and 2024, these cities have made significant strides in upgrading their surveillance infrastructure, driven by concerns over crime, public safety, and the need for more sophisticated emergency response systems. This article explores how California's urban areas are improving surveillance technologies and practices, with a focus on citywide initiatives, partnerships with technology firms, and the integration of AI-driven systems. Introduction of smart city surveillance The push toward smart city technology has reshaped the security landscape in California The push toward smart city technology has reshaped the security landscape in California. With the state being home to some of the world's most innovative technology firms, cities such as Los Angeles (LA), San Francisco, and San Diego are leveraging this expertise to develop and implement advanced surveillance systems. Citywide surveillance initiatives Since 2022, the state has seen an increase in citywide surveillance initiatives aimed at addressing rising crime rates, enhancing traffic management, and improving emergency response. These systems include AI-enhanced video analytics, high-definition cameras, and real-time monitoring centers, helping law enforcement track and respond to incidents more efficiently. Key surveillance developments across Californian cities 1. Los Angeles: AI and Facial Recognition Integration Los Angeles has led the way in deploying state-of-the-art surveillance systems, particularly in high-crime areas and transportation hubs. In 2023, the Los Angeles Police Department (LAPD) expanded its use of artificial intelligence (AI) in crime prevention. The department integrated AI-enhanced video analytics with its existing network of over 30,000 surveillance cameras throughout the city, a move designed to improve real-time crime detection and automate the identification of suspicious activity. Privacy law compliance The city government has enacted measures to restrict the application of facial recognition to high-priority cases Facial recognition technology has also been a controversial but increasingly used tool in the city’s surveillance strategy. While privacy concerns remain, LA has implemented strict regulations to ensure that this technology is used in compliance with privacy laws. In response to public concerns, the city government has enacted measures to restrict the application of facial recognition to high-priority cases such as locating missing persons or identifying known offenders. According to a 2023 Los Angeles Times report, these technologies have helped reduce violent crime in areas where the systems are deployed, with a notable 15% reduction in crime rates in Downtown LA. 2. San Francisco: Data-Driven Crime Prevention San Francisco, a tech hub, has similarly embraced advanced surveillance systems, with a focus on predictive policing. The city's law enforcement agencies have adopted data-driven approaches that rely on vast amounts of data collected through surveillance cameras and other sensors placed around the city. Pilot programme In 2022, the San Francisco Police Department (SFPD) introduced a pilot programme that integrated predictive analytics with its citywide surveillance system. By analysing patterns of criminal activity, the system can forecast potential hotspots and allocate resources more effectively. Although controversial due to concerns over profiling and civil liberties, the system has been credited with helping police prevent several large-scale crimes. Transparency in the use of surveillance data Measures include annual audits and public reporting, ensuring that the system adheres to standards Moreover, the city has implemented stringent oversight measures to ensure transparency in the use of surveillance data. This includes annual audits and public reporting, ensuring that the system adheres to legal and ethical standards. A 2023 report from The San Francisco Chronicle indicated that this initiative has led to a 10% improvement in response times to major incidents, particularly in high-density areas like the Financial District. 3. San Diego: Smart Traffic and Public Safety Surveillance San Diego has also taken significant steps to upgrade its urban surveillance capabilities. One of the key focuses of the city has been integrating surveillance systems into its transportation infrastructure. The city’s Smart Streetlights programme, which began as a traffic monitoring initiative, was expanded in 2022 to include surveillance capabilities aimed at improving public safety. Smart Streetlights programme Under this programme, thousands of streetlights equipped with cameras and sensors have been installed throughout San Diego. These lights not only monitor traffic conditions but also detect suspicious activities, accidents, and emergencies. The data collected is transmitted in real-time to the city’s public safety command center, where law enforcement can respond to incidents more quickly. A 2023 evaluation by the San Diego Union-Tribune revealed that the Smart Streetlights programme had helped reduce traffic-related accidents by 12% and had become a vital tool in aiding crime investigations. Cybersecurity measures All data collected through its surveillance network is secure from potential breaches or unauthorised access Additionally, San Diego has focused on enhancing its cybersecurity measures to protect the integrity of its surveillance data. The city government partnered with local cybersecurity firms to ensure that all data collected through its surveillance network is secure from potential breaches or unauthorised access. Key technologies driving city surveillance in California The success of these surveillance initiatives can be attributed to the rapid advancement of several key technologies, which have transformed traditional security systems into sophisticated, AI-driven solutions. 1. AI-Powered Video Analytics AI-powered video analytics is at the forefront of city surveillance efforts in California. This technology enables the automatic detection of unusual patterns or activities, significantly enhancing the ability of law enforcement agencies to identify potential threats in real time. AI systems can analyse vast amounts of video footage quickly, reducing the need for manual monitoring. 2. Facial Recognition Technology Despite its controversial nature, facial recognition technology has been adopted in several Californian cities for high-priority security applications. While cities like San Francisco have restricted its use, other cities such as Los Angeles have integrated it into their surveillance networks under strict legal frameworks. 3. Predictive Analytics This technology allows police departments to focus their resources more effectively by identifying potential hotspots Predictive analytics, used prominently in San Francisco, relies on data collected from various surveillance systems to predict potential criminal activity. This technology allows police departments to focus their resources more effectively by identifying potential hotspots based on past crime patterns. 4. Smart Sensors and IoT Integration Cities like San Diego have embraced the Internet of Things (IoT) by embedding smart sensors into urban infrastructure. These sensors, connected to central monitoring systems, help cities track everything from traffic conditions to air quality. They also play a crucial role in public safety by identifying anomalies and triggering alerts for law enforcement. Challenges and controversies While the benefits of enhanced surveillance are clear, Californian cities face several challenges in the implementation of these technologies. 1. Privacy Concerns The increased use of surveillance technologies, particularly AI and facial recognition, has raised significant privacy concerns. Advocacy groups have called for stricter regulations to prevent misuse and protect individual privacy rights. In response, cities like San Francisco and Los Angeles have implemented oversight committees and enacted laws to govern the use of these technologies. 2. Data Security The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity As cities collect vast amounts of surveillance data, ensuring its security is a major challenge. The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity measures. San Diego's partnership with local tech firms to secure its surveillance infrastructure is an example of proactive steps being taken to address this issue. 3. Balancing Surveillance and Civil Liberties Striking a balance between effective surveillance and the protection of civil liberties continues to be a contentious issue. Critics argue that predictive policing and AI-driven surveillance systems can lead to biased decision-making and discriminatory practices. California cities have responded by introducing transparency measures, including public audits and open-data initiatives, to maintain public trust. California Urban Surveillance: A Model Worth Emulating The last couple of years have seen Californian cities making significant progress in upgrading their surveillance and security systems. By integrating AI, predictive analytics, and IoT technologies into their urban infrastructures, cities like Los Angeles, San Francisco, and San Diego are setting new standards for public safety and crime prevention. However, as these technologies continue to evolve, cities must also address the ethical and legal challenges they present, particularly in the areas of privacy and data security. With careful planning and regulation, California’s approach to urban surveillance could serve as a model for other cities worldwide.
Security beat
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and school uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate and school security environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Case studies
The Kent İncek project, a residential complex located in the heart of Ankara, has recently implemented DNAKE's advanced IP intercom solutions to enhance security and convenience for its 198 households in two blocks. Kent Incek offers privilege in its social facilities as well as in its green areas, providing residents with a healthy living environment that includes an indoor swimming pool and fitness centre. The solution DNAKE IP intercom products are designed to meet the evolving needs of modern residential complexes DNAKE IP intercom products are designed to meet the evolving needs of modern residential complexes, providing a range of features that are both practical and user-friendly. At the Kent İncek project, DNAKE's IP intercom solutions have been integrated into the existing security system, allowing for seamless communication between residents and visitors. The intercoms offer crystal-clear audio and video quality, ensuring that every interaction is clear and secure. Door entry methods of the 902D-A9 Installed and ready to upgrade door entry, the 4.3-inch SIP video door phone 902D-A9 offers crisp, clear visuals for video calls and access control. Users can effortlessly navigate through an intuitive interface, facilitating seamless and smart living experiences. The device offers multiple ways to grant access to authorised personnel, making it a versatile and efficient solution for residential properties. One of the primary door entry methods is through video calling, which allows users to remotely communicate with visitors and grant or deny access in real time. One of the primary door entry methods is through video calling, which allows users to remotely communicate with visitors and grant or deny access in real time. This feature ensures that only authorised individuals can enter the premises, adding an extra layer of security to the property. In addition to video calling, the 902D-A9 also supports access control through various authentication methods, such as facial recognition, PIN code, or RFID card. Overall, the door entry methods of the 902D-A9 combine cutting-edge technology with user-friendly design, making it an effective and convenient solution for controlling access to any property. Advanced features and sleek design While the state-of-the-art door station secures the entry of the home, the 7-inch indoor monitor offers an extra layer of safety While the state-of-the-art door station secures the entrance of the home, the seven-inch indoor monitor offers an additional layer of protection. The seven-inch indoor monitor, renowned for its advanced features and sleek design, has been embraced by homeowners seeking to upgrade their security systems. With crystal-clear high-definition resolution and remote access capabilities, this monitor provides comprehensive security and convenient communication for families. Additionally, after connecting the indoor monitor to IP cameras, remote monitoring and control capabilities allow users to stay informed and in control of their home's security. Monitoring and management Another vital component of the door entry system is the master station 902C-A, a command centre placed on the table of the guard room. Elegantly designed and crafted for ease of use, this station sits on the table of the guard room, ready to spring into action at a moment's notice. This advanced device not only streamlines the monitoring and management of the community but also offers a plethora of features that elevate the community's protection to the next level. One of its standout capabilities is its ability to receive calls from both the door station and indoor monitor. Comprehensive coverage and protection In addition to its transmission capability, the master station assigns them to unlock doors remotely With a simple press of a button, the property manager or security person can communicate with visitors or tenants easily. In addition to its communication capability, the master station also empowers them to unlock doors remotely. The master station serves as the central hub for managing alarms and messages. Moreover, this remarkable device's ability to integrate with 16 IP cameras transforms it into a powerful surveillance hub, providing unparalleled situational awareness. With a full view of the community, the property manager can keep tabs on multiple locations simultaneously, ensuring comprehensive coverage and protection. The result "We are thrilled to have our IP intercom products selected for the Kent İncek project," said the spokesperson for DNAKE. "Our solutions are designed to provide the highest level of security and convenience, and we're confident that they will meet the needs of the project's residents." The installation of DNAKE's IP intercom products at the Kent İncek project is a testament to the growing demand for advanced security solutions in Turkey. With DNAKE's IP intercom solutions in place, residents of Kent İncek can rest assured that their security is in good hands. The cutting-edge technology will not only enhance their daily lives but also provide peace of mind, knowing that their homes and families are well protected.
There is an older housing estate located in Nagodziców 6-18, Poland with 3 entrance gates and 105 apartments. The investor wants to retrofit the property to improve the community safety and elevate residents’ smart living experience. One of the main challenges in this retrofit is managing the wiring. How can the project minimise disruption to the building’s occupants and reduce the impact on residents’ daily activities? Additionally, how can the costs be kept down to make the retrofit more economically attractive? The Solution Solution Highlights: No Wiring No Indoor Units Fast, Cost-Saving Retrofits Future-Proof Intercom Solution Solution Benefits: No Indoor Units, Cost-effectiveness: DNAKE cloud-based intercom services eliminate the need for expensive hardware infrastructure and maintenance costs associated with traditional intercom systems. There is no need to invest in indoor units or wiring installations. Instead, residents can pay for a subscription-based service, which is often more affordable and predictable. No Wiring, Ease of Deployment: Setting up DNAKE cloud-based intercom service is relatively easier and quicker, when compared to traditional systems. There’s no need for extensive wiring or complicated installations. Residents can connect to the intercom service using their smartphones, making it more convenient and accessible. Easy and Multiple Access Ways: In addition to facial recognition, PIN code, and IC/ID card, there are also multiple app-based access methods available, including calling & app unlocking, QR code, temp key and Bluetooth. Residence can manage access from anywhere at any time.
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
Sparsh CCTV, a pioneer in electronic surveillance, has partnered with Indian Railways to enhance security and operational efficiency for the newly inaugurated Jammu Railway Division. This collaboration coincides with the inauguration of three new trains and marks a historic milestone in enhancing connectivity between Kashmir and the rest of India. Additionally, Sparsh CCTV played a key role in ensuring comprehensive security during the Maha Kumbh at Prayagraj, safeguarding millions of pilgrims. Sparsh’s comprehensive solutions Sparsh’s comprehensive solutions have been integral to ensuring the success of the Udhampur-Srinagar-Baramulla Rail Link (USBRL), a project of immense strategic and economic significance for India. By enabling seamless rail connectivity in this sensitive region, USBRL underscores the Government of India’s commitment to infrastructure growth and national security. Sparsh’s integrated CCTV solutions Sparsh’s integrated CCTV and video management keys set up a control room to oversee operations Also, during the Maha Kumbh, Sparsh CCTV ensured comprehensive security for millions of pilgrims arriving at Prayagraj’s railway stations. Key highlights include cyber-secured STQC-certified cameras installed across all major stations, end-to-end video management systems for real-time monitoring and efficient crowd control, 360-degree security coverage at Prayagraj (PRYJ), Prayagraj Junction (PYGS), Phaphamau Junction (PFM), and Rambag (PRRB), and crowd management analytics deployed at major locations, ensuring seamless handling of large gatherings. Sparsh’s integrated CCTV and video management solutions established a control room to oversee operations, providing a secure and seamless experience for pilgrims. Challenging railway undertakings Mr. Sanjeev Sehgal, Founder & CEO of Sparsh CCTV, stated, “We are immensely proud to contribute to both the USBRL project and the Maha Kumbh, two monumental initiatives that reflect India’s spirit of progress and unity. By delivering innovative, 100% Made in India solutions, we have reinforced our commitment to safety, quality, and the vision of Atmanirbhar Bharat.” The USBRL project, hailed as one of the most challenging railway undertakings in post-independence India, features engineering marvels such as 38 state-of-the-art tunnels spanning 119 kilometres, 927 bridges covering 13 kilometres, and the iconic Chenab Bridge—the world’s highest arch railway bridge, standing at 359 metres above the riverbed. Advanced AI and SCADA systems Sparsh CCTV has ensured the safety and active efficiency of this task by surveillance technologies Sparsh CCTV has ensured the safety and operational efficiency of this project by deploying advanced surveillance technologies, including fire and smoke detection, abandoned object monitoring, face recognition, and train speed analytics. An integrated Command and Control Centre, equipped with advanced AI, SCADA systems, and an Emergency Calling System, facilitates real-time monitoring of train movements and signalling, ensuring improved safety, efficiency, and operational management. Integrating cutting-edge surveillance Security has been a paramount concern in the Kashmir region, and the USBRL project sets a benchmark for integrating cutting-edge surveillance and operational systems in such a sensitive area. For the first time in India, an entire railway surveillance system has been executed by a single OEM/ manufacturer. Sparsh has deployed a range of solutions, including explosion-proof cameras, stainless steel cameras, advanced video management software, Video Analytics and Integrated Control Command Centre (ICCC), all designed and manufactured in India. This achievement highlights the country’s capability to address complex challenges with indigenous technology. Advanced LiDAR 3D technology The implementation of this surveillance infrastructure has been driven in alliance with key stakeholders The implementation of this surveillance infrastructure has been managed in collaboration with key stakeholders such as RailTel, Konkan Railways, Ircon, and renowned integrators like L&T, TATA, Honeywell and Siemens, PSJV ensuring a world-class safety framework for the project. Sparsh’s solutions have been pivotal in addressing critical challenges, including monitoring overhead cable operations, detecting track obstructions, and integrating advanced LiDAR 3D technology to enhance operational efficiency, enabling seamless functioning even in the region’s rugged and unpredictable terrain. Sparsh CCTV’s advanced surveillance systems With the inauguration of the Jammu Railway Division, the operational readiness of the Vande Bharat Express between Katra and Srinagar signifies the completion of the Kashmir-to-Kanyakumari rail link. This rail journey offers passengers a unique and extraordinary experience, crossing engineering marvels like the Chenab Bridge and the Anji Khad cable-stayed bridge. The successful execution of this monumental project not only strengthens national unity but also ensures a robust security framework in one of India’s most sensitive regions, thanks to Sparsh CCTV’s advanced surveillance systems.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Integration allows for centralised control of intercom and smart home controls via a single panel Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products: 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station C112 One-button SIP Door Station 902C-A Master Station
Gunes Park Evleri is a modern residential community situated in the vibrant city of Istanbul, Turkey. To enhance security and convenience for its residents, the community has implemented the DNAKE IP video intercom system throughout the premises. This state-of-the-art system provides an integrated security solution that allows residents to enjoy a seamless and secure living experience. The solution DNAKE smart intercom system provides residents with easy and flexible access through a variety of methods, including facial recognition, PIN codes, IC/ID cards, Bluetooth, QR codes, temporary keys, and more. This multi-faceted approach ensures unparalleled convenience and peace of mind for users. Each entry point is equipped with the advanced DNAKE S615 Facial Recognition Android Door Station, which guarantees secure access while streamlining entry processes. Smart Pro mobile application A 902C-A master station is commonly installed in every guard room, facilitating real-time communication Residents can grant access to visitors not only through the E216 Linux-based indoor monitor, typically installed in each apartment, but also via the Smart Pro mobile application, which allows for remote access anytime and anywhere, adding an extra layer of flexibility. Additionally, a 902C-A master station is commonly installed in every guard room, facilitating real-time communication. Security personnel can receive instant updates on security events or emergencies, engage in two-way conversations with residents or visitors, and grant access as needed. This interconnected system can link multiple zones, enhancing monitoring capabilities and response times across the property, ultimately bolstering overall safety and security. Coverage: 18 Blocks with 868 Apartments Installed products: S615 4.3" Facial Recognition Android Video Door Station 902C-A Master Station E216 7" Linux-based Indoor Monitor DNAKE Smart Pro APP
The Kent İncek project, a residential complex located in the heart of Ankara, has recently implemented DNAKE's advanced IP intercom solutions to enhance security and convenience for its 198 households in two blocks. Kent Incek offers privilege in its social facilities as well as in its green areas, providing residents with a healthy living environment that includes an indoor swimming pool and fitness centre. The solution DNAKE IP intercom products are designed to meet the evolving needs of modern residential complexes DNAKE IP intercom products are designed to meet the evolving needs of modern residential complexes, providing a range of features that are both practical and user-friendly. At the Kent İncek project, DNAKE's IP intercom solutions have been integrated into the existing security system, allowing for seamless communication between residents and visitors. The intercoms offer crystal-clear audio and video quality, ensuring that every interaction is clear and secure. Door entry methods of the 902D-A9 Installed and ready to upgrade door entry, the 4.3-inch SIP video door phone 902D-A9 offers crisp, clear visuals for video calls and access control. Users can effortlessly navigate through an intuitive interface, facilitating seamless and smart living experiences. The device offers multiple ways to grant access to authorised personnel, making it a versatile and efficient solution for residential properties. One of the primary door entry methods is through video calling, which allows users to remotely communicate with visitors and grant or deny access in real time. One of the primary door entry methods is through video calling, which allows users to remotely communicate with visitors and grant or deny access in real time. This feature ensures that only authorised individuals can enter the premises, adding an extra layer of security to the property. In addition to video calling, the 902D-A9 also supports access control through various authentication methods, such as facial recognition, PIN code, or RFID card. Overall, the door entry methods of the 902D-A9 combine cutting-edge technology with user-friendly design, making it an effective and convenient solution for controlling access to any property. Advanced features and sleek design While the state-of-the-art door station secures the entry of the home, the 7-inch indoor monitor offers an extra layer of safety While the state-of-the-art door station secures the entrance of the home, the seven-inch indoor monitor offers an additional layer of protection. The seven-inch indoor monitor, renowned for its advanced features and sleek design, has been embraced by homeowners seeking to upgrade their security systems. With crystal-clear high-definition resolution and remote access capabilities, this monitor provides comprehensive security and convenient communication for families. Additionally, after connecting the indoor monitor to IP cameras, remote monitoring and control capabilities allow users to stay informed and in control of their home's security. Monitoring and management Another vital component of the door entry system is the master station 902C-A, a command centre placed on the table of the guard room. Elegantly designed and crafted for ease of use, this station sits on the table of the guard room, ready to spring into action at a moment's notice. This advanced device not only streamlines the monitoring and management of the community but also offers a plethora of features that elevate the community's protection to the next level. One of its standout capabilities is its ability to receive calls from both the door station and indoor monitor. Comprehensive coverage and protection In addition to its transmission capability, the master station assigns them to unlock doors remotely With a simple press of a button, the property manager or security person can communicate with visitors or tenants easily. In addition to its communication capability, the master station also empowers them to unlock doors remotely. The master station serves as the central hub for managing alarms and messages. Moreover, this remarkable device's ability to integrate with 16 IP cameras transforms it into a powerful surveillance hub, providing unparalleled situational awareness. With a full view of the community, the property manager can keep tabs on multiple locations simultaneously, ensuring comprehensive coverage and protection. The result "We are thrilled to have our IP intercom products selected for the Kent İncek project," said the spokesperson for DNAKE. "Our solutions are designed to provide the highest level of security and convenience, and we're confident that they will meet the needs of the project's residents." The installation of DNAKE's IP intercom products at the Kent İncek project is a testament to the growing demand for advanced security solutions in Turkey. With DNAKE's IP intercom solutions in place, residents of Kent İncek can rest assured that their security is in good hands. The cutting-edge technology will not only enhance their daily lives but also provide peace of mind, knowing that their homes and families are well protected.
There is an older housing estate located in Nagodziców 6-18, Poland with 3 entrance gates and 105 apartments. The investor wants to retrofit the property to improve the community safety and elevate residents’ smart living experience. One of the main challenges in this retrofit is managing the wiring. How can the project minimise disruption to the building’s occupants and reduce the impact on residents’ daily activities? Additionally, how can the costs be kept down to make the retrofit more economically attractive? The Solution Solution Highlights: No Wiring No Indoor Units Fast, Cost-Saving Retrofits Future-Proof Intercom Solution Solution Benefits: No Indoor Units, Cost-effectiveness: DNAKE cloud-based intercom services eliminate the need for expensive hardware infrastructure and maintenance costs associated with traditional intercom systems. There is no need to invest in indoor units or wiring installations. Instead, residents can pay for a subscription-based service, which is often more affordable and predictable. No Wiring, Ease of Deployment: Setting up DNAKE cloud-based intercom service is relatively easier and quicker, when compared to traditional systems. There’s no need for extensive wiring or complicated installations. Residents can connect to the intercom service using their smartphones, making it more convenient and accessible. Easy and Multiple Access Ways: In addition to facial recognition, PIN code, and IC/ID card, there are also multiple app-based access methods available, including calling & app unlocking, QR code, temp key and Bluetooth. Residence can manage access from anywhere at any time.
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
Sparsh CCTV, a pioneer in electronic surveillance, has partnered with Indian Railways to enhance security and operational efficiency for the newly inaugurated Jammu Railway Division. This collaboration coincides with the inauguration of three new trains and marks a historic milestone in enhancing connectivity between Kashmir and the rest of India. Additionally, Sparsh CCTV played a key role in ensuring comprehensive security during the Maha Kumbh at Prayagraj, safeguarding millions of pilgrims. Sparsh’s comprehensive solutions Sparsh’s comprehensive solutions have been integral to ensuring the success of the Udhampur-Srinagar-Baramulla Rail Link (USBRL), a project of immense strategic and economic significance for India. By enabling seamless rail connectivity in this sensitive region, USBRL underscores the Government of India’s commitment to infrastructure growth and national security. Sparsh’s integrated CCTV solutions Sparsh’s integrated CCTV and video management keys set up a control room to oversee operations Also, during the Maha Kumbh, Sparsh CCTV ensured comprehensive security for millions of pilgrims arriving at Prayagraj’s railway stations. Key highlights include cyber-secured STQC-certified cameras installed across all major stations, end-to-end video management systems for real-time monitoring and efficient crowd control, 360-degree security coverage at Prayagraj (PRYJ), Prayagraj Junction (PYGS), Phaphamau Junction (PFM), and Rambag (PRRB), and crowd management analytics deployed at major locations, ensuring seamless handling of large gatherings. Sparsh’s integrated CCTV and video management solutions established a control room to oversee operations, providing a secure and seamless experience for pilgrims. Challenging railway undertakings Mr. Sanjeev Sehgal, Founder & CEO of Sparsh CCTV, stated, “We are immensely proud to contribute to both the USBRL project and the Maha Kumbh, two monumental initiatives that reflect India’s spirit of progress and unity. By delivering innovative, 100% Made in India solutions, we have reinforced our commitment to safety, quality, and the vision of Atmanirbhar Bharat.” The USBRL project, hailed as one of the most challenging railway undertakings in post-independence India, features engineering marvels such as 38 state-of-the-art tunnels spanning 119 kilometres, 927 bridges covering 13 kilometres, and the iconic Chenab Bridge—the world’s highest arch railway bridge, standing at 359 metres above the riverbed. Advanced AI and SCADA systems Sparsh CCTV has ensured the safety and active efficiency of this task by surveillance technologies Sparsh CCTV has ensured the safety and operational efficiency of this project by deploying advanced surveillance technologies, including fire and smoke detection, abandoned object monitoring, face recognition, and train speed analytics. An integrated Command and Control Centre, equipped with advanced AI, SCADA systems, and an Emergency Calling System, facilitates real-time monitoring of train movements and signalling, ensuring improved safety, efficiency, and operational management. Integrating cutting-edge surveillance Security has been a paramount concern in the Kashmir region, and the USBRL project sets a benchmark for integrating cutting-edge surveillance and operational systems in such a sensitive area. For the first time in India, an entire railway surveillance system has been executed by a single OEM/ manufacturer. Sparsh has deployed a range of solutions, including explosion-proof cameras, stainless steel cameras, advanced video management software, Video Analytics and Integrated Control Command Centre (ICCC), all designed and manufactured in India. This achievement highlights the country’s capability to address complex challenges with indigenous technology. Advanced LiDAR 3D technology The implementation of this surveillance infrastructure has been driven in alliance with key stakeholders The implementation of this surveillance infrastructure has been managed in collaboration with key stakeholders such as RailTel, Konkan Railways, Ircon, and renowned integrators like L&T, TATA, Honeywell and Siemens, PSJV ensuring a world-class safety framework for the project. Sparsh’s solutions have been pivotal in addressing critical challenges, including monitoring overhead cable operations, detecting track obstructions, and integrating advanced LiDAR 3D technology to enhance operational efficiency, enabling seamless functioning even in the region’s rugged and unpredictable terrain. Sparsh CCTV’s advanced surveillance systems With the inauguration of the Jammu Railway Division, the operational readiness of the Vande Bharat Express between Katra and Srinagar signifies the completion of the Kashmir-to-Kanyakumari rail link. This rail journey offers passengers a unique and extraordinary experience, crossing engineering marvels like the Chenab Bridge and the Anji Khad cable-stayed bridge. The successful execution of this monumental project not only strengthens national unity but also ensures a robust security framework in one of India’s most sensitive regions, thanks to Sparsh CCTV’s advanced surveillance systems.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Integration allows for centralised control of intercom and smart home controls via a single panel Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products: 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station C112 One-button SIP Door Station 902C-A Master Station
Gunes Park Evleri is a modern residential community situated in the vibrant city of Istanbul, Turkey. To enhance security and convenience for its residents, the community has implemented the DNAKE IP video intercom system throughout the premises. This state-of-the-art system provides an integrated security solution that allows residents to enjoy a seamless and secure living experience. The solution DNAKE smart intercom system provides residents with easy and flexible access through a variety of methods, including facial recognition, PIN codes, IC/ID cards, Bluetooth, QR codes, temporary keys, and more. This multi-faceted approach ensures unparalleled convenience and peace of mind for users. Each entry point is equipped with the advanced DNAKE S615 Facial Recognition Android Door Station, which guarantees secure access while streamlining entry processes. Smart Pro mobile application A 902C-A master station is commonly installed in every guard room, facilitating real-time communication Residents can grant access to visitors not only through the E216 Linux-based indoor monitor, typically installed in each apartment, but also via the Smart Pro mobile application, which allows for remote access anytime and anywhere, adding an extra layer of flexibility. Additionally, a 902C-A master station is commonly installed in every guard room, facilitating real-time communication. Security personnel can receive instant updates on security events or emergencies, engage in two-way conversations with residents or visitors, and grant access as needed. This interconnected system can link multiple zones, enhancing monitoring capabilities and response times across the property, ultimately bolstering overall safety and security. Coverage: 18 Blocks with 868 Apartments Installed products: S615 4.3" Facial Recognition Android Video Door Station 902C-A Master Station E216 7" Linux-based Indoor Monitor DNAKE Smart Pro APP


Round table discussion
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Security systems are often seen as an investment, but usually not one that pays dividends. However, newer technologies are enabling end users to extend their efforts to cost-justify a security system beyond the mirage of “measuring what didn’t happen.” Nowadays, security systems provide quantifiable benefits that yield a return on customers’ investments. We asked this week’s Expert Panel Roundtable: How can security systems maximize return on investment (ROI)?
Products


White papers

Protecting critical infrastructure through facial recognition
Download
Six things to look for when adding AI cameras to your operation
Download
The security behind financial security
Download
How to overcome the storage challenges of adopting surveillance AI
Download
Integrating IT & physical security teams
Download
Best practices for asset management
Download
AI in security solution
Download
The rise of ethical facial recognition
Download
Protecting critical infrastructure through facial recognition
Download
Six things to look for when adding AI cameras to your operation
Download
The security behind financial security
Download
How to overcome the storage challenges of adopting surveillance AI
Download
Integrating IT & physical security teams
Download
Best practices for asset management
Download
AI in security solution
Download
The rise of ethical facial recognition
Download

Videos
Facial recognition systems: Manufacturers & Suppliers

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download