Facility security
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more crit...
Hikvision hosted the LED Displays Launch Event 2024, showcasing significant upgrades in R&D and product lineup. This spectacular event impressed the global audience with the coordinated operations of dual manufacturing bases, the debut of its 5th generation LED cabinets, as well as the launch of diverse LED products for outdoor displays, creative displays, modules, and controllers. Foundation of success Widely known for its video security solutions, Hikvision ventured into...
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and digital experiences taking place 23-25 September at the Orange County Convention Centre in Orlando, FL and via the online GSX event platform. "Pioneering this year’s Selection Committee has been a privilege," said Dr. Diana M. Concannon, PsyD, PCI, CTM, 2024 GSX Selection Committee Chair. "Our...
The Cygnus ALERT notification and monitoring platform is a cloud-based solution designed to strengthen site safety. Using Cygnus ALERT, construction professionals and site administrators can receive event, fault, or mesh information in real time, enabling swift responses to on-site situations. Cygnus ALERT Cygnus ALERT is a subscription-based cloud portal solution, accessed through a 2G and 4G cellular hardware module, with easy user management and notifications provided thro...
Codelocks has introduced public functionality to its KL10 KitLock. The mechanical lock now provides multiple users with keyless access to shared storage at public facilities like gyms, sports centres, spas, retail stores, offices, and shared workspaces. KL10 KitLock The KL10, a durable and compact mechanical lock, is designed for easy use and is accessible via a four-digit code. Originally released with Private Function, the new KL10 Public Function allows multiple occupancy facilities to off...
Allied Universal®, the security and facility services company, is proud to announce that employee Frances Ruban received the “Patriot Employer” award from the Office of the Secretary of Defence – Employer Support of the Guard and Reserve (ESGR). The award recognises Frances, who works at the company’s New York City branch office for her support of an employee who is currently serving in the National Guard. Values sacrifice and service “I am proud to rec...
News
Centrios debuts at ISC West and addresses the North American small business market with a new access control platform comprised of an intuitive, secure app, web interface, and purpose-built electronic locks and readers. Additionally, the business Centrios, a brand and platform developed within ASSA ABLOY, leverages ASSA ABLOY’s scale and capacity to innovate with a bold new start-up strategy and digital-first, customer-centric approach. Digital access management “The small business market is about to undergo the type of transformation in digital access management that the residential market experienced between the early 2000s and now,” Bryan Lieberman, General Manager, Centrios, said. “Small business owners are busy entrepreneurs who don’t have time to sort through the complexity of the current landscape of access management options." Making smarter decisions "Our channel partners want to offer these business owners a solution that just works, is easy to sell, is well supported, and helps them grow their businesses." "We listened very carefully to our customers and designed our business structure, the product, user interfaces, support tools, and even our sales strategy to help our customers make smarter decisions about access to their business faster and with confidence. Today, all that hard work comes to fruition with the launch of Centrios at ISC West.” Centrios Centrios is a free system that offers businesses an upgrade path to enhanced features and capacities With Centrios, business operators can quickly and intuitively manage scheduled access and retrieve access reporting for employees and visitors across multiple physical sites from their phones or a PC. Systems users can effortlessly unlock or lock doors with a touch of their phone to a Centrios lock or smart reader. Centrios is a free system that offers businesses an upgrade path to enhanced features and capacities, such as the number of users, door devices, or scheduling capabilities. Free Plan Designed with channel partners and end-users in mind, the Free Plan includes management of up to 5 openings, 24/7 access for up to 10 users, and reporting features. The Select Plan enables up to 20 openings, 100 individuals, and custom scheduling and reporting. Neither plan requires a long-term commitment, and a system can be set up in seconds, 24 hours a day. The Centrios solution also features comprehensive 24/7 North America-based customer support resources and a 2-year electronics warranty. Seamless experience Centrios software and hardware were designed in parallel so the user has the most seamless experience possible. Centrios cylindrical locks are well-suited for exterior or interior openings such as front doors, back doors, storerooms, offices, and bathrooms. The smart reader is optimal for storefronts, employee entrances, gates, or automatic doors where it can be paired with new or legacy third-party electronic access control devices that a business may already have in place. The Centrios locks and smart reader can be installed in minutes and can then be securely paired with the Centrios Mobile App in seconds via BLE. Centrios Partner programme The programme offers partners valuable training content, end-user leads, and the ability to manage their details Centrios also connects end users with locksmiths, integrators, and security professionals through the Centrios Partner programme. This programme offers partners valuable training content, end-user leads, and the ability to manage their details for representation on the Centrios where-to-buy finder. Serving small and growing businesses “Centrios is more than a lock, more than a smart reader, and more than an app,” Lieberman explains. “It’s a business designed from the ground up to serve the access needs of small and growing businesses." "With this as our mission, we provide small businesses greater freedom and more time to focus on the activities that are important to them, especially our channel partners when it comes to growing and diversifying their businesses.” Capitalising on the strengths Commenting on why Centrios would start from the ground up instead of going the acquisition route that ASSA ABLOY has successfully paved with other businesses, Lieberman points to the need for a start-up mentality from a business, technology, and market dynamics standpoint. “We needed to approach this challenge without prior attachments to or biases for ideas, technologies, or strategy. That is what we have done and why Centrios can capitalise on the strengths of ASSA ABLOY but also do things that ASSA ABLOY has never done before.”
Barrier1 Systems, the industry pioneer in perimeter-hardening physical security vehicle barriers, is showcasing an impressive lineup of crash-rated barriers at ISC West 2024 in booth 4109. Attendees can see firsthand the wide product range that includes fixed and retractable bollards, security folding gates, and drop arms that deliver the highest level of physical protection for people, property, and critical assets. Perimeter security and safety “Barrier1 is setting new benchmarks for perimeter security and safety with the industry's largest selection of crash-rated vehicle barrier solutions for mainstream applications,” said Mark Borto, CEO, of Barrier1. “With the frequency of vehicle crashes, and crash-and-grab incidents occurring on almost a daily basis, Barrier1 provides businesses and organisations of all sizes with the cost-effective vehicle barrier solutions they need to help mitigate risks, liabilities, and profit loss with the brute force protection required to best secure their environments.” Solutions at display ISC West attendees can view the following innovative vehicle barrier solutions from Barrier1 in booth #4109: EntraQuick® PU 30 High-Security Folding Gate EntraQuick® PU 30 High-Security Folding Gate is delivered-assembled and can be erected in a day The EntraQuick® PU 30 High-Security Folding Gate is a crash-rated gate tested and certified to stop a 5,070 lb. vehicle traveling at 30 mph. The steel folding gate and its containment system offer maximum protection against impact loads from vehicles up to the size of a pick-up truck, designed to handle heavy traffic for a high-security gate. This makes the EntraQuick® PU 30 gate ideal for high-security areas. Best yet, it’s delivered-assembled and can be erected in a day. This is a great barrier for applications at data centres, oil and gas sites, chemical sites, military/government sites, distribution facilities, and vehicle storage facilities. Avenger M50 Surface Set Drop Arm Barrier The Avenger M50 Surface Set Drop Arm Barrier is an electric, crash-rated beam barrier that stops a 15,000 lb. vehicle traveling up to 50 mph. The unique surface set design allows for a quick setup. It provides the ideal anti-ram vehicle barrier solution necessary for critical infrastructure, including nuclear facilities, oil and gas refineries, and other sites where installing an in-ground foundation may pose challenges. It boasts an electric drop arm spanning 14 to 24 feet, making it adaptable to multiple applications and well-suited for special events and festivals. Nautilus Rise Retractable Bollard The Nautilus Rise Retractable Bollard is an automatic, hydraulic high-security bollard with built-in LED lights, designed in a compact style that doesn’t leave a footprint when it’s not deployed. It’s ideal for applications that require an impenetrable barrier at police stations, military bases, stadiums, data centres, and more. The Nautilus is easy to raise or lower, ensuring immediate access when needed and quick deployment for emergency scenarios. Hercules M30 and M50 Bollards These bollards are well-designed for government facilities, airports, stadiums, and other applications The Hercules M30 and M50 Bollards are fixed bollards crash-rated to stop a 15,000-lb. vehicle traveling at 30 mph (Hercules M30) and 50 mph (Hercules M50). These bollards are well-designed for government facilities, airports, stadiums, and other applications that require robust perimeter protection. It offers a simple installation with no rebar required and options such as traditional, high-security, deep-mount, or shallow bollard mounts. Crash-Rated Vehicle Barrier Systems The dedicated team at Barrier1 Systems is ready to work in partnership, fully committed to identifying the optimal bollard solution tailored to meet the unique design and security needs of each organisation. “Our Crash-Rated Vehicle Barrier Systems provide physical security resellers with a highly proven solution they can leverage to expand their offering of perimeter protection solutions to existing and new customers,” continued Borto. “We welcome the opportunity to meet with physical security dealers during and after ISC West who are looking to grow their businesses with new and profitable revenue streams.”
RecFaces, a facial recognition software developer, announced its debut at Expo Seguridad México 2024, one of the key events in the security industry in Latin America. The exhibition will take place at Centro Citibanamex from April 16 to 18, where RecFaces will demonstrate its innovative Id-Guard solution in collaboration with Milestone, a global pioneer in video management software. Id-Guard The cutting-edge facial recognition software Id-Guard is seamlessly integrated with XProtect VMS and has been certified by Milestone as a technological partner. With the aid of biometric technology, this integration enables users to increase the security of the facility and extend the capabilities of video monitoring systems. Id-Guard is created for use in security and surveillance systems and can manage thousands of real-time video streams at once. It is powered by one of the top five algorithms based on the latest National Institute of Standards and Technology (NIST) results, ensuring unparalleled accuracy and performance. Access Id-Guard at the booth Visitors to the booth will be able to see Id-Guard's features, fully accessible through the XProtect interface The RecFaces team encourages everyone to stop by booth 1326, where the company will provide a unique opportunity to witness the capabilities of Id-Guard in action. Visitors to the booth will be able to see Id-Guard's features, fully accessible through the XProtect interface, allowing them to instantly identify faces in video streams, quickly search the archive, efficiently manage watch lists, and receive prompt notifications. New projects and collaborations “We are pleased to make our debut in the LATAM region. We already have many projects here that we implemented remotely, so we are happy to see all our partners in person,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. "We hope that our physical presence in the region will strengthen cooperation with our current partners here and bring us the opportunity for new projects and collaborations." Expo Seguridad México 2024 Expo Seguridad México 2024 serves as a vital platform for manufacturers, distributors, integrators, and users in the security industry to interact, exchange knowledge, and explore the latest technological advancements. RecFaces is proud to be part of the event, continuing its mission to deliver innovative biometric solutions that address the evolving security needs of organizations worldwide.
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, is showcasing the latest security innovations for small to mid-sized commercial facilities during ISC West. The expo is happening April 10-12 at the Venetian in Las Vegas. At booth 18033, Johnson Controls is displaying the latest solutions for scalable, user-friendly access control and video surveillance for small to mid-size commercial facilities like schools, churches, and retail stores. Hassle-free software and cameras “At the heart of the Johnson Controls strategy is our dedication to deliver straightforward, scalable security solutions,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “For example, this year’s ISC West attendees can see how we're transforming the security industry with integrated, hassle-free software licensing and secure camera deployment solutions crafted to expedite and simplify the installation process, making it more intuitive than ever before.” Intuitive, scalable systems Dealers design scalable solutions that reduce cost, save time, and minimise system complexity for customers Against the rapidly changing security landscape, implementing a video surveillance system that is robust yet easy to use can be a challenge. As a result, many small to mid-size facilities remain unprotected or operate using outdated systems that make them vulnerable to threats. Highly intuitive systems with critical features built in, like cybersecurity and open standards interoperability, enable dealers to design scalable solutions that reduce cost, save time, and minimise system complexity for customers of any size. exacqVision video management software (VMS) The new release of exacqVision video management software (VMS) is performance-matched with network video recorders (NVRs) and the Illustra line of cameras to maximise value and simplify out-of-the-box installation and maintenance. All software is factory-installed on exacqVision recorders and provides free IP channel licences for Illustra Pro & Flex cameras, with automatic cybersecurity hardening as part of the camera discovery and onboarding process. This helps ensure systems can be implemented and running within minutes. Empower access control User-friendly systems that harness the power of connectivity not only protect against potential threats and intrusions Access control is more important than ever before. User-friendly systems that harness the power of connectivity not only protect against potential threats and intrusions but also enhance the experience for authorised building occupants, creating a process that is convenient and positive. Digitally connected platforms such as Kantech streamline monitoring using cloud-based applications that are ready to use right out of the box. Safety and accessibility Access controls can be managed from a workstation or mobile device. Schedules, parameters, and connected devices can be adjusted quickly and easily to ensure safety and accessibility are always a priority. The result is a holistic, enterprise-level viewpoint without unnecessary complexity.
Johnson Controls, the global pioneer for smart, healthy and sustainable buildings, was named the overall pioneer for its smart building management platform in the Smart Building Management Platforms competitive assessment, conducted by ABI Research, a global technology intelligence firm. Researchers assessed the Johnson Controls OpenBlue ecosystem of connected technologies and services, scoring it highest in implementation among nine other platform providers. The findings were reconfirmed in ABI Research’s 55 Technology Pioneers To Watch In 2024 report. OpenBlue platform and related services “Buildings contribute nearly 40% of global emissions and new levels of efficiency and sustainability can only be achieved through digitalisation,” said Johnson Controls' Chief Technology Officer - Vijay Sankaran, adding “This recognition that OpenBlue digital technology and services is the overall market pioneer is a testament to the ongoing dedication and commitment to innovation that we have to creating the smart buildings of the future.” ABI Research compared nine major commercial building platforms capable of digitising, capturing For this competitive assessment, ABI Research compared nine major commercial building platforms capable of digitising, capturing, managing, monitoring, and improving performance across a broad cross-section of commercial building verticals, applications, and portfolios. Researchers scored Johnson Controls overall highest among the other providers based on the company’s commitment to supporting existing and new clients with its highly functional OpenBlue platform and related services. Johnson Controls OpenBlue suite Researchers noted: The clear and long-standing commitment of Johnson Controls to serving the smart building management segment. The comprehensive Johnson Controls OpenBlue suite of offerings will help drive wide-scale smart building management awareness and adoption. The company’s commitment to supporting customers with its highly functional OpenBlue platform and related services. New class of smart buildings OBEM is a suite of software solutions that form a vast building performance management platform “Johnson Controls was the overall pioneering vendor in ABI Research’s market assessment. The Johnson Controls OpenBlue architecture represents a cohesive and comprehensive suite of offerings to accelerate smart building management, build awareness and increase adoption of smart buildings,” said Rithika Thomas, Industry Analyst at ABI Research. Johnson Controls OpenBlue is an industry-pioneering ecosystem of connected technologies, expertise and services. Assessed as part of this research, OpenBlue Enterprise Manager (OBEM) is a suite of software solutions that form a comprehensive building performance management platform to power a new class of smart buildings that are secure, healthy and sustainable. Advanced digital experiences Combining data from across the building’s systems and utility bills, and using advanced digital experiences augmented with AI, OBEM provides more money-saving and emission-reduction actionable insights than possible with isolated, less connected systems, all while balancing occupant comfort. It also helps customers in simplifying carbon disclosure reporting and regulatory compliance with building performance standards. With deployments across the globe-spanning commercial office spaces, healthcare, education, campuses and more, OBEM enables real-time data visibility across assets, people and processes, empowering customers to drive intelligent and proactive operations from a single pane of glass.
Invixium, a global pioneer in biometric access control and workforce management solutions, announces its participation at ISC West 2024. At the show, Invixium will exhibit its full line of NDAA-compliant, made-in-Canada, modern, and rugged biometric solutions that are specifically designed to thrive in the most unclean, hazardous, extreme, and harsh working conditions prevalent in the industrial and critical infrastructure sectors. Addressing security challenges As an integrated biometric solutions provider, Invixium has earned a global reputation for its adeptness in swiftly addressing real-world security and productivity challenges faced by its customers distinguishing itself from other players in the physical access control industry who often engage in product features and data sheet wars. “Approximately, 75% of the working population work in harsh and non-clean industries," said Shiraz Kapadia, CEO & President at Invixium. Biometric products and software Shiraz Kapadia continues, "Our biometric products and software are purposely engineered to operate in such environments where it’s needed the most." “With 35,000 devices deployed across the toughest sites with large workforces, we’re safeguarding refineries, airports, manufacturing plants, data centres, construction sites, and critical infrastructure,” added Kapadia, enforcing the breadth of Invixium’s impact. IXM WEB 3.0 IXM WEB 3.0 adds IXM VISITOR streamlining guest security with fast, paperless registration options Attendees at the show can experience Invixium’s new all-in-one software platform, IXM WEB 3.0. With advanced layered encryption at its core for data protection, it offers a revamped UI/UX, powerful analytics, and enterprise-grade visitor management. In addition to IXM TIME – A comprehensive workforce management module, IXM LINK – Integration to the industry’s best access control software, IXM WEB 3.0 adds IXM VISITOR as part of this platform, streamlining guest security with fast, paperless registration options and a customisable dashboard. TITAN Complementing its top-tier software would be TITAN, the most rugged face recognition access control solution equipped with multi-factor authentication purpose-built for harsh industries, TFACE, a highly versatile and slim dual biometric device for enterprises, and others. Invixium’s software makes it easier for system integrators to implement biometric solutions quickly and accurately; significantly speeding up deployment and setup time. The company has established a long list of integration partners including LenelS2, Genetec, Honeywell, ACRE Security (DNA Fusion, Feenics, and AccessIt!), Galaxy Control Systems, Gallagher, Paxton, Nedap, Siemens, Schneider Electric, and more. Custom-made approach Invixium advocates that a one-size-fits-all approach does not work when it comes to security solutions. Recognising the inherent diversity across industries, Invixium champions a non-traditional, unique, custom-made approach, understanding that the security needs of a convenience store diverge greatly from those of an oil and gas facility. Invixium’s solutions attend to the distinct requirements of critical infrastructure sectors, including oil and gas, data centres, correctional facilities, research labs, pharmaceuticals, airports, higher education, and manufacturing. Within these verticals, safety and security are indisputably a non-negotiable priority. Attendees will be able to engage in live demos and discuss their project requirements with Invixium’s team of biometric experts at booth #23103.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Security beat
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern programme Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern programme, welcoming 120 interns into various departments for a full semester. The programme helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organisations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centres as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centres as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realise the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasise data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organisation. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
As new technologies incorporate artificial intelligence (AI) and overall uses of AI continue to expand, what protections are in place to prevent its misuse? Artificial intelligence, like any technology or security measure, is not inherently bad. It can, however, be used for nefarious purposes and in ways that were never intended or thought of. ‘Responsible AI Policy’ to protect users Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threats As an AI company, Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threats, and to prevent employee and partner misuse of AI-enabled technology, with guard rails in place to hold them accountable, if artificial intelligence is being used nefariously. “Any security or similar company that utilises AI with its products should monitor for potential misuse and implement a similar policy for protection,” contends Mike Dunn, the Chief Technology Officer (CTO) at Prosegur USA. Requirements of Prosegur’s ‘Responsible AI Policy’ include: Human action and oversight - Prosegur heavily monitors their agents using an integrated international security operations centre (iSOC). Floor and shift supervisors ensure that everything is working properly and that incidents are handled. They also ensure employees are logging into AI-enabled cameras and other technologies for the right reason. Transparency - As with any new company-wide policy, Prosegur wants to ensure that every employee learns about the policy and their duties to uphold it. “In doing this, we are making sure that all processes involving AI development are transparent, so any employee can understand and implement the policy into these processes,” says Mike Dunn. Non-discrimination and equity - Prosegur seeks to make sure employees are using AI-enabled technology to look for known criminals, for example, and not profiling or singling people out. Having a policy in place ensures agents are aware. Accountability - The most important part of the policy is to hold people accountable, if AI-enabled technologies are misused. Violation of the policy will result in disciplinary actions, which can range from HR (Human Resources) intervention to possible suspension. For partners, Prosegur would cease and desist using their products immediately upon finding out about any misuse. Leading the charge for ethical AI practices Prosegur is proud to lead the charge for ethical AI practices, by creating this first policy of its kind" “Prosegur is proud to lead the charge for ethical AI practices, by creating this first policy of its kind, and we hope that other security organisations follow suit,” says Mike Dunn. Technology can do wonderful things. In security, technology can help to stop crimes and even to prevent them from happening with deterrents and alarms. Important to take action to stop ‘bad actors’ However, as with any industry or group of people, there will be ‘bad actors.’ Mike Dunn said “It is important to take actions to stop those people, but it is also important not to condemn all technology or practices when this happens.” Even proven, effective technologies can be used for bad (as well as good). An example is TSA Scanners at the airports. They were designed to provide safer air travel, picking up things that normal metal detectors could miss. Misuse of AI technology can cause lot of harm However, it came to light that a few ‘bad actors’ were using this technology and sharing silhouetted nude pictures of passengers. This has since been patched and fixed, but nonetheless, it’s a great example of how misuse can break people’s trust. As a whole, technology can be dangerous. If not used as intended, it can be used to hurt people. The U.S. government has found that China was using facial recognition and demographic analytics to classify and identify people, based on their ethnicity and that technology singled them out for tracking. Important to ensure analytics and AI used as intended As a society, I think it’s important for us to take that first step and self-police any use of these analytics" “As a society, I think it’s important for us to take that first step and self-police any use of these analytics,” said Mike Dunn, adding “At a minimum, (we should) set policies and procedures to make sure these analytics and AI are being used as intended.” As use of artificial intelligence (AI) continues to increase, an industry standard would ensure companies have protections in place for their employees, clients, and partners. Having a policy is the first proactive step in ensuring AI protections. However, companies need to enforce accountability too. Effectively handle security threats and vulnerabilities Mike Dunn continues, “By heavily monitoring for unethical AI practices and enforcing disciplinary actions when needed, companies will be better prepared to handle security threats and vulnerabilities.” At Prosegur, monitoring agents are heavily trained, taught procedures and then closely supervised by several methods. “This is something that should be common practice in the security industry,” says Mike Dunn, adding “We have employed a compliance officer to help us stay ahead of the curve. Fortunately, we have seen many manufacturers and end users adopt this practice as well.” Compliance officers can act faster than new laws enacted Compliance officers can act faster than new laws being enacted, and often will hold their company to higher standards than a minimum threshold. Mike Dunn concludes, “Putting a responsible AI procedure in place is Prosegur’s way of taking on this problem we see in our everyday work.”
Case studies
The client functions as a prominent producer of phosphate fertilisers in Sub-Saharan Africa. They began mining phosphate rock in the early 1960s and started producing phosphoric acid in the late 1980s. Their extensive industrial facility, located in Senegal, includes various sites such as Mining, an Acid Plant, a Fertiliser site, and a power plant. They mainly export their phosphoric acid to India and distribute their fertiliser products within West Africa and globally. Client's requirements The client had a pressing requirement to connect multiple sites and consolidate them using a single communication platform. Additionally, they were in search of a hybrid communication solution that could support both modern and traditional networks. Their needs can be outlined as follows: Hybrid Communication Solution: Deploy a blend of Voice over Internet Protocol (VoIP) and conventional networks to enhance communication efficiency. Multilocation Solution: Create connectivity among various locations and merge them onto a unified platform to streamline communication effectively. Additional Features: Specifically desired functionalities like Call Accounting and Billing to streamline daily administrative duties and operations across multiple sites. Moreover, the integration of a public address system through the CO line at the power plant was crucial to guarantee the prompt communication of vital instructions to workers, whether in routine activities or emergencies. Hybrid communication solution The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks Matrix, collaborating with Bintech, developed a Hybrid Communication solution tailored for this industrial pioneer. The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks preferred by the industry. While there was an opportunity to modernise through VoIP connectivity, analogue terminals were also essential components of the solution. The Matrix solution includes: Two SETU VTEPs and a PRI Gateway extended an IP Connection to the ANANT, a server-based PBX, located at both the MINE and ACID sites. At the MINE, there were five ETERNITY GENX platforms, and at the ACID site, there were two, all connected over LAN to the ANANT. Various analog phones were linked to these GENX platforms, and each GENX platform at the ACID site featured a GSM trunk extension. At the Fertiliser site, the primary ANANT was linked to the WAN. A single GENX platform, connected via LAN, facilitated connections to numerous analog phones on-site. Furthermore, this GENX Platform supported a GSM trunk. At the power plant, an ETERNITY PENX was linked to the WAN, supporting a public address system over CO. Furthermore, 28 analog phones were incorporated into the network at the power plant. At Senchim, a SETU VFXTH, a VoIP-FXS gateway, was linked to the WAN. This gateway provided connectivity to several analog phones as well. Results The Hybrid Communication solution effectively integrated disparate sites onto a common communication platform, utilising both contemporary and conventional networks. Moreover, it enhanced communication through a range of features. The solution delivered: Smooth Multi-site Connectivity: With the support of SETU VTEP, capable of handling up to 2100 IP users, and ANANT, accommodating up to 5000 IP users, seamless connectivity across numerous sites was accomplished. Hybrid Communication Solution: A tailored Matrix solution integrated products capable of harnessing both contemporary and conventional networks. VoIP, GSM, and analog networks were effectively amalgamated to ensure efficient communication among various sites. Contemporary Features: The solution facilitated public address capabilities over CO via ETERNITY PENX at the power plant, allowing for vital information dissemination during emergencies. Integration of Call Accounting software, as requested by the client, was seamlessly integrated into Matrix PBXs. By combining contemporary and conventional networks, the Matrix solution distinguishes itself for its effectiveness, efficiency, distinctiveness, and readiness for the future.
Installers JTI Brandbeveiliging was contracted to help make safety a number-one priority at a pioneering food manufacturer in The Netherlands. They achieved this by choosing Hochiki Europe’s marketing pioneering fire detection system, Latitude, alongside waterproof devices from the ESP range. This comprehensive solution ensures the highest level of fire protection throughout the facility, giving the food manufacturer peace of mind and allowing them to focus on what they do best: producing delicious food. Kervo Kervo is a specialist in the high-quality cultivation and processing of fruit in the Netherlands. Since 1980 morello cherries have been grown in the Vossen family’s orchards in Roggel, The Netherlands. The family was one of the first growers in the region to use mechanical harvesting in the ’80s, fast forward 43 years later and Kervo currently runs operations across Europe and the UK and is proud of its reputation for offering the finest quality fruit to bakeries and fresh food processors. Fire protection systems Complexities of this project was that during food production significant amounts of steam were generated JTI Brandbeveiliging was founded in 2009 and is trusted by its customers for advice, installations, repairs, and maintenance of fire protection systems across the region. The team, led by Luciën van Eldijk was commissioned in 2022 to design and fit the fire safety system that would be integrated into Kervo's new manufacturing plant in Neer. One of the complexities of this project was that during food production, and particularly during the cleaning processes, significant amounts of steam are generated, thus causing false alarms. Latitude fire safety system Lucien explains how he and the team navigated this issue, “In food production sites like this, the machinery needs to remain clean throughout the entire process. This means there is a lot of steam and water present, which, unfortunately, can trigger false alarms." "We needed to install devices that could negate this issue, Hochiki’s waterproof call points, sounders, and sensors were the perfect solution. They worked seamlessly with the Latitude fire safety system from Hochiki.” Fire detection devices and systems Latitude, which is BOSEC-approved, a requirement for fire detection devices and systems in The Netherlands, has a powerful network-wide cause-and-effect capability. The system can support 5000 entries, with up to 20,000 inputs and 20,000 outputs across the network. Benefits of Latitude The new building at Kervo is a huge facility making the Latitude system the best solution The new building at Kervo is a huge facility, at over 40 metres in height it required over 2.5km of cabling and hundreds of fire detection devices to help make the building secure, making the Latitude system the best solution. “Due to the nature of this project, there have been some technical aspects where we have needed to seek advice, but the team at Hochiki has been very helpful in working with us to create the best solution for our customer." Easy to install with high standards "We choose Hochiki products and systems because they are reliable, they are easy to install and, most importantly, meet the high standards and regulations required by the laws of The Netherlands, we would recommend Hochiki products for this reason.” Hochiki’s analogue addressable range (ESP intelligent) together with the Latitude system are EN54 Part 13 certified and with the BOSEC certification also in place, they provide the best complete and compliant fire detection system for businesses across the Belgium region as well as bordering countries such as Luxemburg, the Netherlands, and Germany.
Established in 1952, a cluster of educational institutions situated in Meenambakkam near Chennai, Tamil Nadu, India, holds a prestigious position as one of the nation's oldest and most esteemed establishments. Throughout its history, it has developed primary and secondary schools alongside colleges in Chennai, providing an extensive selection of courses spanning science, arts, commerce, and business management. By 2016, it had transformed into a prominent research and post-graduate institution, featuring specialised research divisions in physics, mathematics, and economics. Business scenario Spread across a vast 40+ acre campus, the educational institutions accommodate over 9000 students and employ a dedicated faculty of more than 350 staff members. With over 100 classrooms, indoor and outdoor stadiums, auditoriums, seminar halls, libraries, labs, and hostel facilities, the infrastructure is extensive. Ensuring premises safety and security Institution identified the need for a comprehensive solution capable of effectively monitoring all areas Given the size of the campus and the significant student population, ensuring the safety and security of the premises became a primary concern. Despite having previously installed a competitor's video surveillance system, the coverage proved inadequate. Consequently, they identified the need for a comprehensive solution capable of effectively monitoring all areas, including schools, colleges, and hostel facilities. Their requirement was not only for thorough coverage but also for the ability to conduct both local and centralised monitoring from a single location. Challenges faced by the institution Securing over 9000 students and staff across the premises presented a significant challenge. A centralised video surveillance solution was needed to monitor both school and college premises from one location. The widespread infrastructure, including classrooms, auditoriums, playgrounds, and hostel premises, made centralised surveillance challenging due to its scattered nature. Previous installations of competitor video surveillance systems failed to provide extensive coverage in all necessary locations on the premises. A large number of cameras and recording servers with higher RAM were required for scalability. Concerns were raised about the reliability of competitor brands' servers, especially those based in China, as they could be vulnerable to hacking attempts, posing a threat to the security of the educational environment. Matrix solution Matrix proposed its professional series of 2MP Dome IP cameras to secure indoor premises such as classrooms, libraries, auditoriums, seminar halls, and administrative offices, ensuring comprehensive coverage. Additionally, 5MP Bullet IP cameras were recommended to safeguard outdoor facilities and infrastructure across the campus. Over 600 cameras were deployed throughout the school and college premises to provide extensive coverage. For recording and viewing the footage, Matrix experts suggested the Matrix ENVR - SATATYA NVR12808XCTS - 128 Channel Enterprise ENVR. Matrix ENVR features an in-built Video Management Software - Matrix SATATYA SAMAS, eliminating the need for separate software installation and providing a user-friendly GUI. Furthermore, Matrix's ENVR is seamlessly integrated with third-party IP Cameras already installed on the premises. Matrix ENVR offers centralised system management with well-defined user roles and rights, along with a distributed architecture enabling centralised configuration, user-based login roles and rights, and an Audit Trail of user activities and IP addresses. Products offered SATATYA MIBR20FL36CWS (470 Nos.): 2MP IR Bullet Camera with 3.6mm Fixed Lens SATATYA MIDR50FL28CWS (142 Nos.): 2MP IR Dome Camera with 2.8mm Fixed Lens SATATYA NVR12808XCTS (5 Nos.): 128 Channel Enterprise NVR with 8 SATA Port SATATYA SAMAS USER10: 10 Concurrent User Licence for Smart Client and Mobile Client Solution benefits Matrix IP Cameras ensured comprehensive coverage across the premises. Matrix ENVRs feature an in-built server and software - Matrix SATATYA SAMAS, eliminating the need for separate software investments and simplifying centralised video surveillance. Users could access any camera installed at any location from any remote location. Matrix Server-grade ENVRs, based in India, offer greater reliability compared to competitors' servers in China, reducing the risk of hacking attempts. With four levels of redundancies, Matrix ENVRs minimise system downtime even in the event of network and power failures.
A well-known fashion label has effectively expanded its presence in various markets by establishing exclusive brand outlets, multi-brand outlets, large format stores, and engaging in e-commerce. With a widespread network comprising more than 200 exclusive brand outlets, 1300 multi-brand outlets, and 60 large format stores, the brand delivers modern clothing with a dedication to delivering top-notch quality at affordable prices. Under the guidance of its dynamic leadership, the brand has emerged as a preferred option for those with a keen sense of fashion, indicating a bright outlook for achieving global recognition in the fashion and lifestyle sector. Client overview The client needed a solution to a very particular issue: the installation of a secure elevator access control system. Wanting limited access to specific floors exclusively for authorised personnel, the client enlisted Matrix's skills to deliver an Elevator Access Control Solution. This solution aimed to guarantee controlled and secure vertical movement within their building, contributing to heightened security measures and improved operational efficiency. Client challenges The client encountered a significant obstacle in controlling access to specific floors through elevator entry, outlined as follows: Elevator Access Control for Restricted Floors To bolster security measures, Matrix was engaged to deploy a reliable elevator access control system The client confronted difficulty in managing its 12-floor facility, which included three floors restricted to its employees. To bolster security measures, Matrix was engaged to deploy a reliable elevator access control system. The implemented solution guaranteed precise authorisation, restricting entry to designated floors and fulfilling the client's requirement for increased security within their premises. Matrix solution Matrix effectively met these requirements by delivering solutions that enhanced the client's security systems. Matrix implemented an elevator access control system to achieve: Matrix installed elevator access control system to accomplish: Elevator Access Control for Exclusive Floors Matrix skillfully tackled the client's challenge involving a 12-floor structure, with three floors designated as restricted areas. Through a customised elevator access control system, Matrix successfully fulfilled the client's objective of providing selective access to VIP individuals for the specified three floors, ensuring improved security and control within the premises. Matrix's Elevator Access Control Solution not only resolved the client's challenges but also significantly enhanced access operations, leading to an overall increase in security throughout the organisation. Efficiency results Matrix not only fulfilled the client's specific needs but also considerably improved the overall efficiency The application of Matrix's Elevator Access Control Solution produced impressive results for the client. The customised system effectively ensured secure and controlled vertical movement within the 12-floor facility, with a particular focus on the three restricted floors. Through the provision of selective access to VIP individuals, Matrix not only fulfilled the client's specific needs but also considerably improved the overall efficiency of security operations. This successful partnership led to the optimisation of the security infrastructure, showcasing Matrix's dedication to providing effective solutions for its clients' distinctive challenges. Products offered COSEC ARC IO800: Input-Output Controller COSEC PATH DCCM: Compact Card-Based Door Controller COSEC CENTRA PLT: Platform-based User Licence COSEC CENTRA ACM: Access Control User Licence
The desire to improve the quality and efficiency of the technologies for post-match press conferences has seen an increasing number of sporting arenas investing in their press facilities. The recently completed new stadium in the city of Tizi Ouzou, Algeria, is a venue that has made this a priority right from the start, with the installation of a CCS 1000 D Digital Discussion System and an Integrus Wireless Language Distribution System from Bosch Building Technologies. UEFA equipment standards The 50,000-seat stadium is the new home of Algeria’s most successful football club, JS Kabylie, and has been built to exacting UEFA standards. This included all the press and broadcast infrastructure and meant that a high-quality press conference solution was demanded from the outset. Partnership with Atempo for audio solutions The company understands exactly what is required to meet the intricacies of UEFA standards New Stadium of Tizi Ouzou called on Turkish Bosch partner Atempo to design the solution for the press conference room, along with the rest of the audio systems for the venue. The company has worked on a variety of stadium projects and understands exactly what is required to meet the intricacies of UEFA standards, while also allowing a venue the flexibility to host non-sporting events. Customised conference technology for flexible deployment CCS 1000 D Digital Discussion System The stadium required a press conference solution that would offer high-quality sound and the flexibility to meet changing needs all with a modern and stylish design. The CCS 1000 D Digital Discussion System met these needs thanks to its compact size, easy set-up, and user-friendly operation, together with advanced features and versatility. Designed especially for quick, plug-and-play installation, it is a dedicated solution for small to medium-sized meeting areas, making it a perfect fit for the press conference room. Integrus Wireless Language Distribution System The solution met all the requirements of the stadium officials for a portable solution The Integrus Wireless Language Distribution System completes the installation, featuring 50 pocket receivers for the press representatives for simultaneous translation into eight languages. The solution met all requirements of the stadium officials for a portable solution that could be used in different configurations according to the needs of stadium officials. Clear and intelligible audio experience “The Bosch conference system presents a solution that fits exactly the requirements in the press areas of stadiums,” states Erhan Yılmaz, Technical Manager at Atempo. Erhan Yılmaz adds, “Bosch's high-quality microphone technology ensures a clear and intelligible audio experience. The Bosch conference system can adapt quickly to different events and needs. With its stylish and modern design, it adds prestige to the press area. Bosch's quality products ensure trouble-free and flawless press conferences.”
In 2023, Tenterden Town Council completed the successful installation of vandal-proof fencing at a recreation ground situated in St Michaels village, in the borough of Ashford, Kent. The new fencing and gates enhance security around the groundskeeping equipment storage building, to provide convenient access and ensure the grounds can be neatly kept for all users of this cherished community space Creating a sanctuary Situated in the idyllic village of St Michaels, a stone’s throw from Tenterden town, the recreation ground serves as a focal point for residents and visitors alike. With amenities including a children’s play area, a skate park, and lush green spaces, it is a popular destination for leisure and recreation. Need for robust security measures To safeguard the well-being of park users and protect against vandalism, Tenterden Town Council enlisted fencing and security specialists, Jacksons Fencing to install robust security measures. After witnessing the premium quality of Jacksons Fencing’s previous installation at the play area in 2013, the council opted for over 80 metres of EuroGuard® Regular fencing, complemented by two 4.9 metre wide EuroGuard Flatform double leaf gates. Beyond the barriers EuroGuard Regular, with its large mesh apertures, ensures good visibility from both sides of the fence Supplied with a galvanised and architectural grade polyester powder-coated finish, the EuroGuard system stands as a stalwart defender against rust and corrosion, ensuring enduring resilience. Yet, its qualities extend beyond durability. EuroGuard Regular, with its large mesh apertures, ensures good visibility from both sides of the fence, crucial for surveillance needs, particularly in areas prone to vandalism. EuroGuard features Moreover, EuroGuard features unique mesh security clips, tightly securing panels to posts with tamper-proof fixings on the secure side of the fence, mitigating the risk of panel removal. This innovative design addresses issues that are commonly associated with mesh fencing, enhancing security and peace of mind for the community. Sustainable and sleek Echoing Tenterden Town Council's commitment to eco-conscious infrastructure, the EuroGuard fencing stands resplendent in its powder-coated black (RAL 9005) finish, marrying sustainability with sophistication. Not merely a barrier, but a beacon of security and style. Each product comes with the assurance of Jacksons Fencing’s 25-year guarantee, symbolising a commitment to quality and trust. Eco-friendly EuroGuard fencing system Commenting on the project, Peter Jackson, Managing Director, of Jacksons Fencing, said, "Security and sustainability are at the heart of our mission at Jacksons Fencing. We're proud to have partnered with Tenterden Town Council once again to enhance the safety and beauty of St. Michaels Recreation Ground." Peter Jackson adds, "Our EuroGuard fencing system not only provides robust protection against vandalism but also contributes to the eco-friendly ethos of the community. Together, we're reinforcing spaces where families can gather, play, and thrive."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
White papers
![Securing care closer to patients](https://www.sourcesecurity.com/img/white-papers/612/920x533_1695745509.png)
Securing care closer to patients
Download![Video technology strategies for hospitals are moving beyond security](https://www.sourcesecurity.com/img/white-papers/612/healthcare-2.jpg)
Video technology strategies for hospitals are moving beyond security
Download![Modernizing facilities management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1669035152.png)
Modernizing facilities management
Download![5 ways to strengthen physical security with an integrated system](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1660648693.jpg)
5 ways to strengthen physical security with an integrated system
Download![How analytics engines mitigate risk, ensure compliance and reduce cost](https://www.sourcesecurity.com/img/white-papers/612/amag-920.jpg)
How analytics engines mitigate risk, ensure compliance and reduce cost
Download![Preparing your organisation with quality situational awareness](https://www.sourcesecurity.com/img/white-papers/612/situational-awareness-achieved-for-your-business-920.jpg)
Preparing your organisation with quality situational awareness
Download![Is your access control as effective as you think?](https://www.sourcesecurity.com/img/white-papers/612/flipped-access-control-glasses-902_1544199340.jpg)
Is your access control as effective as you think?
Download![Is your access control system as secure as you think?](https://www.sourcesecurity.com/img/white-papers/612/HID-asset-7-access-620.jpg)
Is your access control system as secure as you think?
Download![High-Security Electromechanical Locking Solutions For Critical Infrastructure](https://www.sourcesecurity.com/img/white-papers/612/cliq-wp-620x360.jpg)
High-Security Electromechanical Locking Solutions For Critical Infrastructure
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)