GDPR
In today’s fast-evolving aviation landscape, innovation isn’t optional — it’s essential. With passenger traffic in the Asia-Pacific continuing to surge, the region is facing a pivotal moment: adapt with scalable tech, or fall behind. In January 2025 alone, APAC carriers accounted for 56.6% of global passenger traffic growth. Airports are operating at near capacity, with a record-high Passenger Load Factor (PLF) of 82.1%, leading to pronounced congestion at check-in count...
As the world emerges from the pandemic's shadow five years after it spread globally, everything seems to be back on track. Air travel volumes have matched and even surpassed the pre-COVID level. But are they truly “back”? The pandemic did more than just bring masks and border closures. It fundamentally reshaped the world, accelerating digitalisation beyond recognition and irrevocably redefining security paradigms and human behaviour. Heightened security concerns Standard solutions...
Colt Technology Services expanded its product portfolio with the launch of a new Managed Local Area Network (LAN) solution, available now across Colt’s 40+ countries. Ideal for businesses looking for enhanced performance, security, and cost efficiency benefits of a Local Area Network without the complexity and expense of managing it themselves, Colt’s new Managed LAN solution combines powerful digital infrastructure with an effortless service experience. Real-time data sharing Org...
UK Connect, a pioneering connectivity and communications solutions provider, has announced a strategic partnership with BlueFort, the UK's premier independent Security Solutions Partner, to significantly enhance cybersecurity protection for construction industry clients. The new partnership will see UK Connect and BlueFort work together to provide cybersecurity solutions to some of the UK’s biggest construction companies. UK Connect's innovative solutions The groundbreaking partnership...
Milestone Systems is pleased to announce the acquisition of brighter AI, effective April 1, 2025. The Berlin-based technology company, brighter AI, provides anonymisation solutions for video data based on state-of-the-art deep learning technology to protect people’s identities in public. The advances of artificial intelligence raise concerns around data privacy across the world. One of the biggest challenges in developing AI solutions is finding and accessing sufficient data that can be u...
Managing visitor access efficiently has become a critical component of business operations across industries. With increasing security concerns, regulatory compliance, and the need for seamless visitor experiences, organisations must adopt robust visitor management solutions. Traditional methods such as logbooks and manual tracking are no longer sufficient to meet the security and operational demands of 2025. Digital solutions Modern businesses require digital solutions that not only enhance...
News
iDenfy, a global pioneer in identity verification and fraud prevention, announced a new partnership with Coast, an innovative blockchain platform simplifying crypto-to-fiat transactions on PulseChain. This partnership will focus on enhancing security and streamlining KYC/AML compliance processes while boosting the platform’s security and addressing critical challenges in the blockchain ecosystem. Securing decentralised finance This partnership represents a crucial step forward, equipping Coast with advanced tools Global money laundering remains a common issue, with an estimated $2. trillion laundered annually, according to the United Nations. As financial crimes grow, platforms operating at the intersection of blockchain and traditional finance face increasing pressure to meet stringent compliance standards. This partnership represents a crucial step forward, equipping Coast with advanced tools to navigate the complexities of regulatory frameworks while fostering trust and security in the decentralised finance sector. Blockchain security simplified Coast has established itself as a pioneer in blockchain technology and financial services by offering a seamless and compliant gateway for users to interact with PulseChain. The platform's mission is to create user-centric financial solutions tailored for the decentralised future while maintaining the highest standards of security and compliance. To achieve this, Coast has partnered with iDenfy, a company known for its robust identity verification and Anti-Money Laundering (AML) tools that meet global compliance requirements. Secure identity verification Through this collaboration, iDenfy will bring its innovative identity verification solution, ensuring precise and secure onboarding for all users. iDenfy’s technology automatically recognises, verifies, and extracts information from more than 3,000 types of identity documents across more than 200 countries and territories. From passports and ID cards to driving licences and residence permits. The solution also includes the integration of iDenfy’s advanced biometric facial recognition and 3D liveness detection technology to prevent fraudulent activities, such as the use of fake images, face masks, or digital renderings. By creating three-dimensional facial maps, iDenfy provides a secure method for user authentication, ensuring the verification process is both seamless and bulletproof. Scalable fraud prevention Coast can now conduct ongoing monitoring and receive instant notifications of any AML risk hits during the KYC process The partnership offers Coast a scalable system that reduces onboarding time while ensuring full compliance with global AML regulations. This includes screening users against sanctions lists, Politically Exposed Persons (PEPs), watchlists, and adverse media sources. By integrating iDenfy’s technology, Coast can now conduct ongoing monitoring and receive instant notifications of any AML risk hits during the KYC process. iDenfy’s solutions have already transformed Coast’s operations, offering a near-perfect verification success rate of 99.99%. Secure and compliant The high level of accuracy is supported by a team of expert reviewers who oversee all automated ID verifications to eliminate potential system errors, fraud attempts, or failures. In addition to its technological capabilities, iDenfy’s software is fully compliant with GDPR, CCPA, and SOC 2 standards, ensuring that businesses can operate with confidence in its data security and privacy practices. Providing financial security For Coast, the ability to deliver a seamless onboarding experience without compromising security is a top priority. The platform aims to bridge the gap between traditional financial systems and blockchain technology, empowering users to interact with decentralised systems easily and securely. With iDenfy’s solutions, Coast has not only improved its onboarding process but also enhanced user trust by ensuring compliance with the latest global regulations. Before partnering with iDenfy, Coast faced challenges in delivering a fast, user-friendly identity verification process while maintaining robust security standards. Innovation in verification iDenfy’s scalable solutions have resolved these issues, significantly improving operational efficiency and user trust. This partnership aligns perfectly with the mission to create a seamless and inclusive experience for PulseChain. Domantas Ciulde, CEO of iDenfy, said, “Blockchain platforms like Coast are paving the way for the future of finance. Our advanced identity verification and AML screening tools ensure that Coast’s users can confidently engage with PulseChain while maintaining compliance with global regulations. We’re proud to support Coast in creating a secure and innovative platform.” Faster and safer onboarding The integration of iDenfy’s tools has also transformed the user experience for Coast’s clients. The streamlined KYC process is now a simple, three-step procedure that takes less than a minute on average to complete. This efficiency ensures that users can quickly access Coast’s services without unnecessary delays, positioning the platform as a pioneer in user-centric blockchain solutions.
Appdome, the pioneer in protecting mobile businesses, revealed it has been recognized as the market pioneer and high performer in four (4) additional categories for Spring 2025 on G2. The world’s largest and most trusted software marketplace. The four new pioneer categories include Bot Detection & Mitigation, No-Code Dev Platforms, Rapid App Development and Best Relationship for RASP. Standard in security Appdome strengthens its position in mobile app defence, building on its recognition across securityThis extends Appdome’s market pioneership in the emerging mobile app defence market by adding to its prior recognition as a pioneer in Fraud Detection, Mobile Data Security, Best Meets Requirements, Easiest Setup, Easiest to do Business with, Most Likely to Recommend and Users Love Us categories. “We’re the only vendor that offers a true platform and solution capable of addressing the complex defence needs of mobile brands and businesses over time,” said Jamie Bertasi, Chief Customer Officer of Appdome. “Customers choose Appdome to deliver everything they need to defend their mobile business using a single pane of glass and push button ease of deployment across Anti-Fraud, Bot Defence, Mobile Security, and RASP.” AI-powered threat management Appdome’s patented AI-Native Extended Threat Management (XTM) Platform is designed to automate every aspect of mobile application and business defence – leveraging AI and machine learning to code, build, certify, measure, respond, support, and remediate threats and attacks automatically. Appdome’s platform provides on demand mobile business protection and instantaneous incident response at build-time or run-time using a rapidly growing list of 10,000s of dynamic defence plugins created to address 400+ mobile app security, anti-fraud, bot defence, anti-malware, geo compliance, social engineering, deep fake and other attack vectors. Mobile brands and businesses use Appdome as an enterprise-grade and centralised hub to secure mobile applications, revenues, transactions, authentication and users. Redefining mobile threat protection “Appdome’s platform advantage and AI-Native architecture is the reason we win in so many categories,” said Chris Roeckl, Chief Product Officer of Appdome. “Where other vendors can offer mobile brands and businesses static or slowly evolving point products, or try to bolt AI onto legacy offerings, Appdome was built with and for AI at its core.” “Because of this, we can win in Dev, Cyber and Anti-Fraud categories and bring to market an increasing array of defence capabilities in extremely short timeframes. This allows our customers to enjoy cost savings through consolidated threat management across the business quickly and easily.” Seamless security, no coding Appdome’s AI-Native No-Code approach continues to win praise from customers across industriesAppdome’s AI-Native No-Code approach continues to win praise from customers across industries. A healthcare customer highlighted its impact, “Extensive mobile app protections without coding required.” “This has saved our mobile development team many hours and allows them to focus on business functionality instead of having to implement and maintain code for security functionality.” Similarly, an engineering director noted, “A friendly, easy-to-use solution, with no need to add code, and it delivers what it promises.” Compliance made simple Beyond its no-code capabilities, Appdome’s flexibility and ease of use stood out to financial services professionals. One customer shared, “The Appdome platform is easy to use, reliable, and provides several options for adding layers of security to your mobile apps.” Meanwhile, a banking customer emphasised its regulatory value, stating, “Appdome helped us quickly meet the requirements of Central Bank, which prevented us from being penalised and having our image damaged.” Protecting mobile transactions Appdome is recognised again for its outstanding customer support. A software engineering pioneer emphasised this, stating, “Appdome has the best customer support in the industry. Their team is not only highly responsive but also a pleasure to work with.” “Mobile businesses are digital businesses and demand a digital solution to protect revenues, transactions, login and users,” said Brian Reed, SVP Marketing at Appdome. “The attack surface is evolving faster than ever. For mobile businesses, using Appdome’s platform to operationalise cyber and anti-fraud delivery has become a critical asset in combating the fast-rising threat of AI-powered, and AI-enhanced, fraud, scams, bots, and cyberattacks.”
Sumsub, a full-cycle verification platform, is launching its Reusable Digital Identity product suite. It will effectively mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings are set to reduce applicant onboarding times by 50% and boost conversion rates by 30%, on average. Identity multiple services All of the checks required for ensuring a compliant verification must still take place KYC is essential for security, fraud prevention and compliance. However, when users need to verify their identity repeatedly across multiple services – especially when seeking critical access to financial or transportation apps – it creates friction and frustration. This repetitive process often leads to high drop-off rates and less user interest, impacting both user experience and business conversion rates. At the same time, all of the checks required for ensuring a compliant verification must still take place. Sumsub compliance and security Sumsub is processing millions of identity checks weekly, and aggregated data analysis reveals that one in three applicants have verified previously with Sumsub, highlighting the recurring KYC issue. To address this, Sumsub has launched a combined product to help both individuals and firms alike avoid repetitive verification steps while ensuring full compliance and security. Reusable Digital Identity product Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC The Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC. Both of them enable end-users to skip cumbersome verification steps such as document uploads, while at the same time ensuring that all checks required for regulatory adherence for businesses still take place. Sumsub ID enables end-users to securely store and re-use their verified documents for multiple verifications across Sumsub client platforms, whereas Reusable KYC allows companies in the Sumsub ecosystem to agree to share applicants’ data upon receiving their consent. Reusable Digital Identity While each product has a unique approach to the same challenge, both of them further enhance customer experience while ensuring full compliance and adding an extra layer of security. By offering faster and more efficient ways to verify identities, Reusable Digital Identity is designed to help users avoid unnecessary document uploads and repetitive data input procedures–while, at the same time, speeding up applicant onboarding and enhancing conversion rates for companies. Redefining digital ID verification Reusable Digital Identity is designed to help users avoid unnecessary document uploads “With a decade of experience in the market, our vision remains clear – to provide global businesses digital identity checks with the speed and convenience of payments, without sacrificing on compliance and security”, comments Vyacheslav Zholudev, CTO and co-founder of Sumsub. “With Sumsub ID and Reusable KYC, we are redefining digital ID verification by helping businesses improve onboarding efficiency and also giving users full control over their documents and data, respectively. This marks a significant milestone in our mission to make identity verification faster, safer, and more reliable for everyone.” Key benefits of Sumsub Identity products Key benefits of Sumsub Reusable Digital Identity products for businesses are: Higher pass rates: businesses see up to 30% improvement in successful user verifications. Faster KYC processes: Sumsub ID reduces onboarding time by 50%, improving conversion rates. Full Compliance & Security: Both Reusable KYC and Sumsub ID are GDPR-compliant and built to enhance fraud prevention. Main benefits for users are: Seamless verification: individuals can breeze through KYC by re-using their documents from previous verifications with Sumsub. Full privacy and security of personal data stored or shared by third parties for verification purposes. Less time spent on getting access to the platforms and services people use, as both Sumsub ID and Reusable KYC make the onboarding process faster by eliminating redundant document uploads. How Sumsub reusable digital identity product suite works Sumsub ID allows applicants to onboard onto a platform within the Sumsub ecosystem, securely store their verified documents, and reuse them for future verifications across 4000+ companies which also use Sumsub; Reusable KYC enables companies to share users’ personal data with their explicit consent, ensuring quicker onboarding, which benefits companies and individuals alike. Sumsub ID is now available for anyone to sign up and benefit from seamless verification and onboarding across crypto, fintech, banking, e-commerce, traditional finance, security, regtech, and fraud prevention industries.
At The Security Show (TSE), on stand 5/G55, i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, will showcase its brand new U-series range of AI-powered cameras for the first time in the UK. Designed and manufactured in Japan, the U-Series delivers the accuracy of AI-based object detection to entry-level security installations. Benefit from AI-driven analytics U-Series delivers the accuracy of AI-based object detection to entry-level security installations Built on efficient edge-computing architecture, it offers advanced capabilities — including intrusion detection, loitering alerts, direction monitoring, speeding, and line-crossing detection — without compromising on performance or affordability. “After pioneering AI across our higher-end cameras, we’re excited to bring that same edge-based intelligence to the entry-level market,” said Gerard Figols, Chief Operating Officer at i-PRO. “Security organisations of any size can now benefit from AI-driven analytics.” U-series highlights AI Video Motion Detection (AI-VMD) Built-in audio recording Direct-to-cloud VSaaS support FIPS 140-3 Level 3 cybersecurity compliance Future firmware updates The new lineup includes high-resolution imaging options — 2MP, 5MP, and 4K — in dome, box, and bullet formats, delivering enhanced clarity and precision. Built for flexibility, the U-series is an ideal fit for direct-to-cloud VSaaS deployments. With future firmware updates planned, these cameras will continue to evolve, adding new capabilities while maintaining a lightweight, efficient architecture. Adding AI to the U-Series cameras embodies i-PRO’s mission to democratise AI as a standard feature across all its camera lines, delivering real-time alarms, improving response times, strengthening data privacy and reducing bandwidth use. Active guard analytics Visitors are able to see the latest version of its award-winning Active Guard intelligent search application At TSE, visitors will also be able to see the latest version of its award-winning Active Guard intelligent search application. Active Guard ensures that the wealth of metadata (98 unique characteristics from the X and S-series camera line-up) describing the unique attributes of humans and vehicles captured by i-PRO cameras are seamlessly delivered to popular Video Management Systems (VMS) from Milestone, Genetec, and others. This not only allows deep forensic search from edge-based AI analytics but also enables real-time notifications for operators of essential events that require attention. High zoom bullet and corner cameras Shown at TSE for the first time, the new High Zoom Bullet camera includes the longest IR illumination in its class (up to 250m) and unique automated functions that remove the burden from operators when focusing on unique objects of interest. For example, a High-Zoom bullet camera might initially show a wide-angle view of a street by default. When a vehicle is detected at an entrance, the camera can automatically zoom in and capture the licence plate using Vaxtor ALPR analytics (pre-bundled with the camera). This type of automation requires no intervention by the operator, making it a perfect match for safe cities. Open platform–freedom of choice Customers and integrators are never locked into a proprietary approach, and can pick the best analytics The company’s open-platform approach ensures flexibility and scalability for the unique analytics requirements of every installation through the use of third-party tools. Customers and integrators are never locked into a proprietary approach, and can choose the best analytics for the job from the best development partners like Vaxtor, Noema and many more. Cybersecurity and ethical AI Every i-PRO product is designed with cybersecurity and data integrity at its core. While many companies follow FIPS 140-2 standards, the new U-Series goes further, achieving FIPS 140-3 Level 3 compliance. Powered by an NXP EdgeLock secure element, these cameras meet the industry’s highest data security standards. Level 3 certification introduces stricter cryptographic protections, enhanced physical tamper resistance, and safeguards against key extraction and hardware attacks. With secure boot functionality, the U-Series offers robust defense against unauthorised access and cyber threats — even at the entry-level. ISO/IEC 42001 certification for AI i-PRO is the first company in the physical security industry to reach this level of ethical AI governance Recently, the company also announced it is in the final stage of obtaining the ISO/IEC 42001 certification for its Artificial Intelligence (AI) management systems. Once completed, this certification will make i-PRO the first company in the physical security industry to reach this level of ethical AI governance, reinforcing its commitment to transparency, accountability, and security in AI deployment. Innovation driven by independence Since becoming independent from Panasonic, i-PRO has evolved into an agile, customer-first company, bringing to market over 250 new camera models in the last couple of years. “Our independence allows us to stay laser-focused on our customers,” said Jose Riolobos, EMEA President at i-PRO. “By combining more than 60 years of Japanese engineering expertise with a flexible, market-driven approach, we deliver high-end technology built for real-world needs.”
Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS Security achievement Cequence AWS Security Competency attainment highlights the firm's validated expertise across seven types This Cequence AWS Security Competency achievement highlights the company’s validated expertise across seven foundational categories of cybersecurity use cases: Perimeter Protection, Identity and Access Management, Threat Detection and Response, Infrastructure Protection, Data Protection, Compliance and Privacy, and Application Security. Partners that excel across all seven foundational security categories unlock the exclusive opportunity to qualify for the prestigious 8th designation: Core Security Partner. Each foundational category contains multiple cybersecurity capabilities, each with technical and operational requirements. Cybersecurity solutions from AWS Partners In 2022, AWS revamped the AWS Security Competency program to streamline access for customers, ensuring they can confidently adopt cybersecurity solutions from AWS Partners that have been rigorously validated by AWS. AWS security experts annually validate the tools used and operational processes of each AWS Security Competency partner to address specific cloud security challenges aligned to the categories and use cases that they have applied for. Cequence's advanced expertise commitment AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner The AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner to help them achieve their goals for business risk and cloud strategy confidence. Cequence proudly earns the distinguished AWS Security Competency, underscoring its leadership in API security and bot management making it a premier AWS Partner. This achievement highlights Cequence's advanced expertise and unwavering commitment to delivering cutting-edge cybersecurity solutions that meet AWS's rigorous standards for protecting cloud environments. Agility and innovation of AWS “Cequence is excited to achieve AWS Security Competency status,” said Ameya Talwalkar, CEO at Cequence Security. “This milestone reflects our dedication to empowering organisations to secure their API ecosystems." "By harnessing the agility and innovation of AWS, we equip businesses to defend against sophisticated bot attacks and API abuse, allowing them to focus on growth and innovation with confidence. Together with AWS, we provide the expertise needed to navigate the complexities of API security, ensuring that organisations can operate resiliently and securely.” Advanced cybersecurity solutions AWS empowers organisations, from startups to global enterprises, with scalable, flexible, and cost-effective solutions. To ensure seamless integration and deployment of these solutions, AWS established the AWS Competency Program, designed to help customers identify trusted AWS Partners with deep industry expertise. As an AWS Security Competency Partner, Cequence stands at the forefront, delivering advanced cybersecurity solutions tailored to safeguard cloud environments while leveraging the full power of AWS.
Pimloc, a pioneering AI video privacy and analytics company, announced a major upgrade to its Secure Redact platform, introducing advanced Named Entity Recognition (NER) capabilities for automated audio redaction. This enhancement allows organisations to quickly and accurately detect and redact sensitive information from audio recordings, strengthening regulatory compliance and consumer trust. Latest AI-powered upgrade Secure Redact automatically identifies and categorises sensitive information such as names With this latest AI-powered upgrade, Secure Redact automatically identifies and categorises sensitive information such as names, locations, dates, and other personally identifiable information (PII) from audio, allowing users to quickly filter, review, and redact content in just a few clicks. "Audio redaction has long been a time-consuming challenge, but Secure Redact is now making it as seamless and effective as video redaction,” said Simon Randall, CEO of Pimloc. Expectations for data security Randall added: "With privacy regulations tightening and consumer expectations for data security rising, organisations need scalable solutions that don’t disrupt their operations." "This enhancement is a game-changer for industries handling large volumes of sensitive audio data, from recorded insurance claims to law enforcement body cam footage and beyond.” Secure Redact’s new NER capability Secure Redact’s new NER capability makes audio redaction faster and more precise by automatically surfacing key entities and allowing users to filter by category, review detected terms, and redact all instances instantly. Secure Redact’s new NER capability makes audio redaction faster and more precise by automatically This advancement is particularly valuable in industries where audio redaction has historically been a manual and time-consuming process. In insurance, Secure Redact can redact customer details in recorded claims and call centre interactions. For law enforcement and public safety agencies, it can ensure compliance in police body cam footage and emergency call recordings. In healthcare, it can safeguard patient confidentiality in medical recordings and telehealth consultations. Secure Redact for PII redaction "Organisations are handling more sensitive audio and video data than ever, and ensuring privacy compliance can be overwhelming," said Randall. "Our goal with Secure Redact is to provide an all-in-one solution for PII redaction, making it easy to automatically detect and remove sensitive information across both video and audio. This latest enhancement streamlines the process, helping organisations reduce risk and stay compliant – without adding complexity to their workflows.”
iDenfy, a global pioneer in identity verification and fraud prevention, announced a new partnership with Coast, an innovative blockchain platform simplifying crypto-to-fiat transactions on PulseChain. This partnership will focus on enhancing security and streamlining KYC/AML compliance processes while boosting the platform’s security and addressing critical challenges in the blockchain ecosystem. Securing decentralised finance This partnership represents a crucial step forward, equipping Coast with advanced tools Global money laundering remains a common issue, with an estimated $2. trillion laundered annually, according to the United Nations. As financial crimes grow, platforms operating at the intersection of blockchain and traditional finance face increasing pressure to meet stringent compliance standards. This partnership represents a crucial step forward, equipping Coast with advanced tools to navigate the complexities of regulatory frameworks while fostering trust and security in the decentralised finance sector. Blockchain security simplified Coast has established itself as a pioneer in blockchain technology and financial services by offering a seamless and compliant gateway for users to interact with PulseChain. The platform's mission is to create user-centric financial solutions tailored for the decentralised future while maintaining the highest standards of security and compliance. To achieve this, Coast has partnered with iDenfy, a company known for its robust identity verification and Anti-Money Laundering (AML) tools that meet global compliance requirements. Secure identity verification Through this collaboration, iDenfy will bring its innovative identity verification solution, ensuring precise and secure onboarding for all users. iDenfy’s technology automatically recognises, verifies, and extracts information from more than 3,000 types of identity documents across more than 200 countries and territories. From passports and ID cards to driving licences and residence permits. The solution also includes the integration of iDenfy’s advanced biometric facial recognition and 3D liveness detection technology to prevent fraudulent activities, such as the use of fake images, face masks, or digital renderings. By creating three-dimensional facial maps, iDenfy provides a secure method for user authentication, ensuring the verification process is both seamless and bulletproof. Scalable fraud prevention Coast can now conduct ongoing monitoring and receive instant notifications of any AML risk hits during the KYC process The partnership offers Coast a scalable system that reduces onboarding time while ensuring full compliance with global AML regulations. This includes screening users against sanctions lists, Politically Exposed Persons (PEPs), watchlists, and adverse media sources. By integrating iDenfy’s technology, Coast can now conduct ongoing monitoring and receive instant notifications of any AML risk hits during the KYC process. iDenfy’s solutions have already transformed Coast’s operations, offering a near-perfect verification success rate of 99.99%. Secure and compliant The high level of accuracy is supported by a team of expert reviewers who oversee all automated ID verifications to eliminate potential system errors, fraud attempts, or failures. In addition to its technological capabilities, iDenfy’s software is fully compliant with GDPR, CCPA, and SOC 2 standards, ensuring that businesses can operate with confidence in its data security and privacy practices. Providing financial security For Coast, the ability to deliver a seamless onboarding experience without compromising security is a top priority. The platform aims to bridge the gap between traditional financial systems and blockchain technology, empowering users to interact with decentralised systems easily and securely. With iDenfy’s solutions, Coast has not only improved its onboarding process but also enhanced user trust by ensuring compliance with the latest global regulations. Before partnering with iDenfy, Coast faced challenges in delivering a fast, user-friendly identity verification process while maintaining robust security standards. Innovation in verification iDenfy’s scalable solutions have resolved these issues, significantly improving operational efficiency and user trust. This partnership aligns perfectly with the mission to create a seamless and inclusive experience for PulseChain. Domantas Ciulde, CEO of iDenfy, said, “Blockchain platforms like Coast are paving the way for the future of finance. Our advanced identity verification and AML screening tools ensure that Coast’s users can confidently engage with PulseChain while maintaining compliance with global regulations. We’re proud to support Coast in creating a secure and innovative platform.” Faster and safer onboarding The integration of iDenfy’s tools has also transformed the user experience for Coast’s clients. The streamlined KYC process is now a simple, three-step procedure that takes less than a minute on average to complete. This efficiency ensures that users can quickly access Coast’s services without unnecessary delays, positioning the platform as a pioneer in user-centric blockchain solutions.
Appdome, the pioneer in protecting mobile businesses, revealed it has been recognized as the market pioneer and high performer in four (4) additional categories for Spring 2025 on G2. The world’s largest and most trusted software marketplace. The four new pioneer categories include Bot Detection & Mitigation, No-Code Dev Platforms, Rapid App Development and Best Relationship for RASP. Standard in security Appdome strengthens its position in mobile app defence, building on its recognition across securityThis extends Appdome’s market pioneership in the emerging mobile app defence market by adding to its prior recognition as a pioneer in Fraud Detection, Mobile Data Security, Best Meets Requirements, Easiest Setup, Easiest to do Business with, Most Likely to Recommend and Users Love Us categories. “We’re the only vendor that offers a true platform and solution capable of addressing the complex defence needs of mobile brands and businesses over time,” said Jamie Bertasi, Chief Customer Officer of Appdome. “Customers choose Appdome to deliver everything they need to defend their mobile business using a single pane of glass and push button ease of deployment across Anti-Fraud, Bot Defence, Mobile Security, and RASP.” AI-powered threat management Appdome’s patented AI-Native Extended Threat Management (XTM) Platform is designed to automate every aspect of mobile application and business defence – leveraging AI and machine learning to code, build, certify, measure, respond, support, and remediate threats and attacks automatically. Appdome’s platform provides on demand mobile business protection and instantaneous incident response at build-time or run-time using a rapidly growing list of 10,000s of dynamic defence plugins created to address 400+ mobile app security, anti-fraud, bot defence, anti-malware, geo compliance, social engineering, deep fake and other attack vectors. Mobile brands and businesses use Appdome as an enterprise-grade and centralised hub to secure mobile applications, revenues, transactions, authentication and users. Redefining mobile threat protection “Appdome’s platform advantage and AI-Native architecture is the reason we win in so many categories,” said Chris Roeckl, Chief Product Officer of Appdome. “Where other vendors can offer mobile brands and businesses static or slowly evolving point products, or try to bolt AI onto legacy offerings, Appdome was built with and for AI at its core.” “Because of this, we can win in Dev, Cyber and Anti-Fraud categories and bring to market an increasing array of defence capabilities in extremely short timeframes. This allows our customers to enjoy cost savings through consolidated threat management across the business quickly and easily.” Seamless security, no coding Appdome’s AI-Native No-Code approach continues to win praise from customers across industriesAppdome’s AI-Native No-Code approach continues to win praise from customers across industries. A healthcare customer highlighted its impact, “Extensive mobile app protections without coding required.” “This has saved our mobile development team many hours and allows them to focus on business functionality instead of having to implement and maintain code for security functionality.” Similarly, an engineering director noted, “A friendly, easy-to-use solution, with no need to add code, and it delivers what it promises.” Compliance made simple Beyond its no-code capabilities, Appdome’s flexibility and ease of use stood out to financial services professionals. One customer shared, “The Appdome platform is easy to use, reliable, and provides several options for adding layers of security to your mobile apps.” Meanwhile, a banking customer emphasised its regulatory value, stating, “Appdome helped us quickly meet the requirements of Central Bank, which prevented us from being penalised and having our image damaged.” Protecting mobile transactions Appdome is recognised again for its outstanding customer support. A software engineering pioneer emphasised this, stating, “Appdome has the best customer support in the industry. Their team is not only highly responsive but also a pleasure to work with.” “Mobile businesses are digital businesses and demand a digital solution to protect revenues, transactions, login and users,” said Brian Reed, SVP Marketing at Appdome. “The attack surface is evolving faster than ever. For mobile businesses, using Appdome’s platform to operationalise cyber and anti-fraud delivery has become a critical asset in combating the fast-rising threat of AI-powered, and AI-enhanced, fraud, scams, bots, and cyberattacks.”
Sumsub, a full-cycle verification platform, is launching its Reusable Digital Identity product suite. It will effectively mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings are set to reduce applicant onboarding times by 50% and boost conversion rates by 30%, on average. Identity multiple services All of the checks required for ensuring a compliant verification must still take place KYC is essential for security, fraud prevention and compliance. However, when users need to verify their identity repeatedly across multiple services – especially when seeking critical access to financial or transportation apps – it creates friction and frustration. This repetitive process often leads to high drop-off rates and less user interest, impacting both user experience and business conversion rates. At the same time, all of the checks required for ensuring a compliant verification must still take place. Sumsub compliance and security Sumsub is processing millions of identity checks weekly, and aggregated data analysis reveals that one in three applicants have verified previously with Sumsub, highlighting the recurring KYC issue. To address this, Sumsub has launched a combined product to help both individuals and firms alike avoid repetitive verification steps while ensuring full compliance and security. Reusable Digital Identity product Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC The Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC. Both of them enable end-users to skip cumbersome verification steps such as document uploads, while at the same time ensuring that all checks required for regulatory adherence for businesses still take place. Sumsub ID enables end-users to securely store and re-use their verified documents for multiple verifications across Sumsub client platforms, whereas Reusable KYC allows companies in the Sumsub ecosystem to agree to share applicants’ data upon receiving their consent. Reusable Digital Identity While each product has a unique approach to the same challenge, both of them further enhance customer experience while ensuring full compliance and adding an extra layer of security. By offering faster and more efficient ways to verify identities, Reusable Digital Identity is designed to help users avoid unnecessary document uploads and repetitive data input procedures–while, at the same time, speeding up applicant onboarding and enhancing conversion rates for companies. Redefining digital ID verification Reusable Digital Identity is designed to help users avoid unnecessary document uploads “With a decade of experience in the market, our vision remains clear – to provide global businesses digital identity checks with the speed and convenience of payments, without sacrificing on compliance and security”, comments Vyacheslav Zholudev, CTO and co-founder of Sumsub. “With Sumsub ID and Reusable KYC, we are redefining digital ID verification by helping businesses improve onboarding efficiency and also giving users full control over their documents and data, respectively. This marks a significant milestone in our mission to make identity verification faster, safer, and more reliable for everyone.” Key benefits of Sumsub Identity products Key benefits of Sumsub Reusable Digital Identity products for businesses are: Higher pass rates: businesses see up to 30% improvement in successful user verifications. Faster KYC processes: Sumsub ID reduces onboarding time by 50%, improving conversion rates. Full Compliance & Security: Both Reusable KYC and Sumsub ID are GDPR-compliant and built to enhance fraud prevention. Main benefits for users are: Seamless verification: individuals can breeze through KYC by re-using their documents from previous verifications with Sumsub. Full privacy and security of personal data stored or shared by third parties for verification purposes. Less time spent on getting access to the platforms and services people use, as both Sumsub ID and Reusable KYC make the onboarding process faster by eliminating redundant document uploads. How Sumsub reusable digital identity product suite works Sumsub ID allows applicants to onboard onto a platform within the Sumsub ecosystem, securely store their verified documents, and reuse them for future verifications across 4000+ companies which also use Sumsub; Reusable KYC enables companies to share users’ personal data with their explicit consent, ensuring quicker onboarding, which benefits companies and individuals alike. Sumsub ID is now available for anyone to sign up and benefit from seamless verification and onboarding across crypto, fintech, banking, e-commerce, traditional finance, security, regtech, and fraud prevention industries.
At The Security Show (TSE), on stand 5/G55, i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, will showcase its brand new U-series range of AI-powered cameras for the first time in the UK. Designed and manufactured in Japan, the U-Series delivers the accuracy of AI-based object detection to entry-level security installations. Benefit from AI-driven analytics U-Series delivers the accuracy of AI-based object detection to entry-level security installations Built on efficient edge-computing architecture, it offers advanced capabilities — including intrusion detection, loitering alerts, direction monitoring, speeding, and line-crossing detection — without compromising on performance or affordability. “After pioneering AI across our higher-end cameras, we’re excited to bring that same edge-based intelligence to the entry-level market,” said Gerard Figols, Chief Operating Officer at i-PRO. “Security organisations of any size can now benefit from AI-driven analytics.” U-series highlights AI Video Motion Detection (AI-VMD) Built-in audio recording Direct-to-cloud VSaaS support FIPS 140-3 Level 3 cybersecurity compliance Future firmware updates The new lineup includes high-resolution imaging options — 2MP, 5MP, and 4K — in dome, box, and bullet formats, delivering enhanced clarity and precision. Built for flexibility, the U-series is an ideal fit for direct-to-cloud VSaaS deployments. With future firmware updates planned, these cameras will continue to evolve, adding new capabilities while maintaining a lightweight, efficient architecture. Adding AI to the U-Series cameras embodies i-PRO’s mission to democratise AI as a standard feature across all its camera lines, delivering real-time alarms, improving response times, strengthening data privacy and reducing bandwidth use. Active guard analytics Visitors are able to see the latest version of its award-winning Active Guard intelligent search application At TSE, visitors will also be able to see the latest version of its award-winning Active Guard intelligent search application. Active Guard ensures that the wealth of metadata (98 unique characteristics from the X and S-series camera line-up) describing the unique attributes of humans and vehicles captured by i-PRO cameras are seamlessly delivered to popular Video Management Systems (VMS) from Milestone, Genetec, and others. This not only allows deep forensic search from edge-based AI analytics but also enables real-time notifications for operators of essential events that require attention. High zoom bullet and corner cameras Shown at TSE for the first time, the new High Zoom Bullet camera includes the longest IR illumination in its class (up to 250m) and unique automated functions that remove the burden from operators when focusing on unique objects of interest. For example, a High-Zoom bullet camera might initially show a wide-angle view of a street by default. When a vehicle is detected at an entrance, the camera can automatically zoom in and capture the licence plate using Vaxtor ALPR analytics (pre-bundled with the camera). This type of automation requires no intervention by the operator, making it a perfect match for safe cities. Open platform–freedom of choice Customers and integrators are never locked into a proprietary approach, and can pick the best analytics The company’s open-platform approach ensures flexibility and scalability for the unique analytics requirements of every installation through the use of third-party tools. Customers and integrators are never locked into a proprietary approach, and can choose the best analytics for the job from the best development partners like Vaxtor, Noema and many more. Cybersecurity and ethical AI Every i-PRO product is designed with cybersecurity and data integrity at its core. While many companies follow FIPS 140-2 standards, the new U-Series goes further, achieving FIPS 140-3 Level 3 compliance. Powered by an NXP EdgeLock secure element, these cameras meet the industry’s highest data security standards. Level 3 certification introduces stricter cryptographic protections, enhanced physical tamper resistance, and safeguards against key extraction and hardware attacks. With secure boot functionality, the U-Series offers robust defense against unauthorised access and cyber threats — even at the entry-level. ISO/IEC 42001 certification for AI i-PRO is the first company in the physical security industry to reach this level of ethical AI governance Recently, the company also announced it is in the final stage of obtaining the ISO/IEC 42001 certification for its Artificial Intelligence (AI) management systems. Once completed, this certification will make i-PRO the first company in the physical security industry to reach this level of ethical AI governance, reinforcing its commitment to transparency, accountability, and security in AI deployment. Innovation driven by independence Since becoming independent from Panasonic, i-PRO has evolved into an agile, customer-first company, bringing to market over 250 new camera models in the last couple of years. “Our independence allows us to stay laser-focused on our customers,” said Jose Riolobos, EMEA President at i-PRO. “By combining more than 60 years of Japanese engineering expertise with a flexible, market-driven approach, we deliver high-end technology built for real-world needs.”
Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS Security achievement Cequence AWS Security Competency attainment highlights the firm's validated expertise across seven types This Cequence AWS Security Competency achievement highlights the company’s validated expertise across seven foundational categories of cybersecurity use cases: Perimeter Protection, Identity and Access Management, Threat Detection and Response, Infrastructure Protection, Data Protection, Compliance and Privacy, and Application Security. Partners that excel across all seven foundational security categories unlock the exclusive opportunity to qualify for the prestigious 8th designation: Core Security Partner. Each foundational category contains multiple cybersecurity capabilities, each with technical and operational requirements. Cybersecurity solutions from AWS Partners In 2022, AWS revamped the AWS Security Competency program to streamline access for customers, ensuring they can confidently adopt cybersecurity solutions from AWS Partners that have been rigorously validated by AWS. AWS security experts annually validate the tools used and operational processes of each AWS Security Competency partner to address specific cloud security challenges aligned to the categories and use cases that they have applied for. Cequence's advanced expertise commitment AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner The AWS Security Competency provides a faster and easier experience for customers to select the right AWS Partner to help them achieve their goals for business risk and cloud strategy confidence. Cequence proudly earns the distinguished AWS Security Competency, underscoring its leadership in API security and bot management making it a premier AWS Partner. This achievement highlights Cequence's advanced expertise and unwavering commitment to delivering cutting-edge cybersecurity solutions that meet AWS's rigorous standards for protecting cloud environments. Agility and innovation of AWS “Cequence is excited to achieve AWS Security Competency status,” said Ameya Talwalkar, CEO at Cequence Security. “This milestone reflects our dedication to empowering organisations to secure their API ecosystems." "By harnessing the agility and innovation of AWS, we equip businesses to defend against sophisticated bot attacks and API abuse, allowing them to focus on growth and innovation with confidence. Together with AWS, we provide the expertise needed to navigate the complexities of API security, ensuring that organisations can operate resiliently and securely.” Advanced cybersecurity solutions AWS empowers organisations, from startups to global enterprises, with scalable, flexible, and cost-effective solutions. To ensure seamless integration and deployment of these solutions, AWS established the AWS Competency Program, designed to help customers identify trusted AWS Partners with deep industry expertise. As an AWS Security Competency Partner, Cequence stands at the forefront, delivering advanced cybersecurity solutions tailored to safeguard cloud environments while leveraging the full power of AWS.
Pimloc, a pioneering AI video privacy and analytics company, announced a major upgrade to its Secure Redact platform, introducing advanced Named Entity Recognition (NER) capabilities for automated audio redaction. This enhancement allows organisations to quickly and accurately detect and redact sensitive information from audio recordings, strengthening regulatory compliance and consumer trust. Latest AI-powered upgrade Secure Redact automatically identifies and categorises sensitive information such as names With this latest AI-powered upgrade, Secure Redact automatically identifies and categorises sensitive information such as names, locations, dates, and other personally identifiable information (PII) from audio, allowing users to quickly filter, review, and redact content in just a few clicks. "Audio redaction has long been a time-consuming challenge, but Secure Redact is now making it as seamless and effective as video redaction,” said Simon Randall, CEO of Pimloc. Expectations for data security Randall added: "With privacy regulations tightening and consumer expectations for data security rising, organisations need scalable solutions that don’t disrupt their operations." "This enhancement is a game-changer for industries handling large volumes of sensitive audio data, from recorded insurance claims to law enforcement body cam footage and beyond.” Secure Redact’s new NER capability Secure Redact’s new NER capability makes audio redaction faster and more precise by automatically surfacing key entities and allowing users to filter by category, review detected terms, and redact all instances instantly. Secure Redact’s new NER capability makes audio redaction faster and more precise by automatically This advancement is particularly valuable in industries where audio redaction has historically been a manual and time-consuming process. In insurance, Secure Redact can redact customer details in recorded claims and call centre interactions. For law enforcement and public safety agencies, it can ensure compliance in police body cam footage and emergency call recordings. In healthcare, it can safeguard patient confidentiality in medical recordings and telehealth consultations. Secure Redact for PII redaction "Organisations are handling more sensitive audio and video data than ever, and ensuring privacy compliance can be overwhelming," said Randall. "Our goal with Secure Redact is to provide an all-in-one solution for PII redaction, making it easy to automatically detect and remove sensitive information across both video and audio. This latest enhancement streamlines the process, helping organisations reduce risk and stay compliant – without adding complexity to their workflows.”


Expert commentary
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centres Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines. The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, , purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. agreed to acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution centre, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Case studies
The ever-increasing number of shoplifting incidents is forcing retailers to turn to facial biometrics as a security measure. This has yielded impressive results: store owners confirm that such security systems identify thieves by their faces and cite a reduction in theft-related losses between 50 and 90%. Modern facial recognition systems employ advanced algorithms that both ensure data privacy and adhere to international GDPR. Retail theft and robberies Retail store managers have noted a recent rise in thefts and robberies. As reported by Charged, a British retail news outlet, this disturbing trend emerged in 2018-2019 and has since evolved into a pressing issue. Interestingly, the rise in shoplifting incidents coincides with a broader surge in crime rates, as independent research portal Numbeo assigns a "high" rating to this metric in many Latin American cities. Retail security survey 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons The increase in retail attacks, as well as a growing level of aggression from organised groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security and Organised Retail Crime" report by the National Retail Federation provides some alarming statistics. According to the report, 64% of respondents observed a surge in losses from organised criminal groups since 2016, while 53% reported an escalation/increase in theft. What is more, 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons. The average loss per theft The National Retail Federation approximates the average loss per theft incident in a store at $462, with organised robberies amounting to nearly $7,500. Furthermore, data from the British Retail Consortium, as reported by the Daily Mail, reveals an alarming increase in-store theft incidents, soaring from 3 million cases in 2016-2017 to 8 million in 2022. Delayed response Theft cases below a certain monetary value are often deemed low-priority and go uninvestigated The often delayed response of the police to shoplifting incidents leaves retail businesses vulnerable to theft. Store employees, wary of potentially armed perpetrators, avoid personally confronting suspects, while law enforcement personnel respond to incidents only after the criminals have already made their escape. Additionally, theft cases below a certain monetary value are often deemed low-priority and go uninvestigated. Latin America relies on biometric technologies Fortune Business Insights predicts the global facial recognition technology market to reach an impressive $13 billion by 2027, with a compound annual growth rate (CAGR) of 14.8%. The 3D recognition sector exhibits even swifter growth, with Market Research Future reporting a CAGR of 21.6%. Biometric technology development The Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22% However, it is Latin America that is considered the most favourable region for biometric technology development, with its biometrics market surpassing the global growth rate by far. Multiple research firms, including Inkwood Research, anticipate that the Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22%. Government investments Analysts identify Brazil, Mexico, and Argentina as key influencers in the regional development of biometric technologies. This trend is attributable to both governmental investments in initiatives like safe cities or digital identification, and private sector endeavours to mitigate the escalating crime rates. How facial recognition protects against theft A facial biometrics system installed in a major retail store chain prevents thousands of crimes Retailers are finding effective protection against growing losses through a combination of organisational protocols, staff training, and the adoption of ready-to-use security solutions, such as anti-theft systems, in-store surveillance, and biometric technologies. Facial recognition systems have proven to be highly effective in preventing theft and robberies. For example, according to the Daily Mail, a facial biometrics system installed in a major retail store chain prevents thousands of crimes each month. AI-based system Additionally, Charged disclosed that a local convenience store saw a staggering 90% reduction in losses following the installation of an AI-based system. Facial biometric systems assist security services in monitoring the store and promptly identifying any infractions. How it works Cameras installed in the store capture video footage, which the system then uses to extract facial images and create biometric profiles stored in a database. The system continuously cross-references real-time video data against the biometric profiles already cataloged in the database. In case a customer was previously involved in theft, vandalism, or similar incidents features on the "stop-list," the system notifies the security service, prompting closer monitoring of the said individual. Detect suspicious activities and alert By integrating facial biometrics with video analytics, the system can quickly detect suspicious activities and alert security personnel. The incorporation of facial biometrics helps to: Significantly reduce losses from theft, robbery, and vandalism, Improve the efficiency of security services, Lessen the strain of manually sifting through footage from multiple cameras, Minimise the potential for human error in in-store security, Enhance interaction with customers by incorporating biometrics into marketing systems. Police departments also benefit from increased crime-solving rates, while retail industry professional associations can curb recurrent thefts by sharing "stop lists" and biometric data on criminal gangs and individual offenders. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces Brazilian Shopping Centre case study Jockey Plaza, a shopping centre in Curitiba, Brazil, implemented a comprehensive security system featuring video analytics and facial biometrics. This modern facility, spanning 200,000 square metres, accommodates 400 stores and 28 food establishments. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces, a facial biometrics solution developer. Id-Guard facial identification software To enhance the security of the shopping centre, automate security operations, and expedite crime investigations, they chose to employ RecFaces' Id-Guard facial identification software. Id-Guard seamlessly integrates with video surveillance and video analytics systems, offering biometric identification, real-time and retrospective face search within video streams, and stop listing capabilities. Saves time Implementation of Id-Guard saves security specialists time as they no longer have to spend hours" "The moment a person on the stop list enters the camera's field of view, the operator is immediately notified," says Cristiano J S Maffessoni, Francaza’s CIO. "Based on our experience, implementation of Id-Guard saves security specialists time as they no longer have to spend hours sifting through video footage when investigating incidents." 50% cut in shoplifting instances According to Cristiano J S Maffessoni, the payback period for the Jockey Plaza shopping centre project is less than 3 years thanks to a 50% cut in shoplifting instances, swift resolution of crimes, and increased efficiency of security services. The return on investment for biometric systems typically spans 1 to 3 years, depending on the crime rate in the vicinity of the shopping centre. To calculate effectiveness, it is necessary to evaluate the average loss per incident, the average number of similar incidents annually, and the incident reduction rate, generally fluctuating between 30% and 70%, based on the security service's efficacy. Ready-to-use biometric solutions Our solutions allow customers to identify offenders, instantly respond to incidents, and foster loyalty" Maria Kazhuro, RecFaces' BDM in Latin America, shares, "RecFaces has developed two lines of ready-to-use biometric solutions specifically designed for the security and retail sectors." "We've seen an immense demand for our ready-made solutions in Latin America, thanks to their quick and easy deployment on any equipment. Our solutions allow customers to identify offenders, instantly respond to incidents, conduct marketing research, and foster customer loyalty." Data storage method RecFaces' Id-Guard, a biometric ready-to-use solution, stores only biometric template feature vectors that cannot be reconstructed into facial images in its database. This data storage method adheres to international GDPR data protection regulations and is supplemented by AES-256 standard encryption mechanisms for critical data.
A town in Arunachal Pradesh becomes a ‘Smart City’ with AI-powered Videonetics Solution. A smart, resilient, and unified solution enables public safety, asset security and traffic management for the city. The customer One of the prominent towns in Arunachal Pradesh, India, made it into the Government of India’s Smart Cities Mission development scheme with a vision of building a well-managed clean, green, and environment-friendly city. This city is envisioned to possess a character of its own, defined by scenic beauty, intellectual capital, and eco-friendly tourism through sustained economic growth for all its citizens. The target is to create a replicable role model that can act like a lighthouse to other aspiring towns of Arunachal Pradesh. Challenges Over the past few years, the town has witnessed a high influx of students, visitors and tourists The town is fast becoming a bustling tourist attraction in Arunachal Pradesh. Before this, the town had a limited deployment of CCTV cameras, and the system was not well suited to even conduct any investigations if an unwanted incident were to happen. Over the past few years, the town has witnessed a high influx of students, visitors and tourists. Understandably, infrastructure has also shown rapid growth, and hence local authorities understood the need to address concerns of vigilance, traffic, municipality, assets protection and safety of the citizens. Solution The official body formed to execute the vision of a safe city wanted to implement a comprehensive surveillance solution to monitor law and order situations, road safety, identify miscreants, protect public and private properties, and improve urban amenities. A project team comprising officials of the governing body, Videonetics, and system integration partners, carried out extensive research to identify important spots around the town and prepared a comprehensive surveillance strategy. Videonetics designed a versatile and unified solution that includes Intelligent Video Management System (IVMS 3.0), AI-powered Video Analytics, Automatic Licence Plate Recognition (ALPR) System and Face Recognition System (FRS). 24x7 Geo-situational awareness and accelerating response time: Operators in the command and control centre monitor over 180+ locations across the town with Videonetics Intelligent VMS using multi-layer GIS maps for a clear view of cameras spread across the geography. This covers areas like government establishments, public areas, airports, railway stations, schools, parks, markets and roads. Suspect tracking and face recognition: The city deployed network cameras to process video streams with the Face Recognition application (MeraFace™) at city entry-exit points and other public areas. The forensic investigation features of the application also help in a quick search for evidence and identifying suspects during investigations. AI-powered video analytics for the safety and security of people and assets: Artificial Intelligence powered video analytics has been deployed strategically across various facilities throughout the city while keeping in mind the requirements specific to each site. Line crossing detection is deployed along perimeters of correctional facilities to detect intrusion. Face recognition application is also used at entry-exit gates to recognise faces in live video streams. ‘Unattended Object Detection’ use case has also been applied to identify objects that can pose a security threat. Fire and smoke detection has been deployed at the airport and road intersections across the city to detect fire and smoke caused by accidents. Parks and gardens are being monitored to detect people collapsing. Face recognition is also being used to identify people. Crowd formation and estimation has been put to use in public areas like hospitals and VIP hotspots to manage crowd efficiently. To keep the city clean, the municipality body is using AI-powered Video Analytics to detect the overflow of garbage bins installed at all garbage collection centres. Also, to keep a constant track of the timely collection of garbage and identify people violating guidelines and penalise them, the face recognition system has been deployed as well. To protect various government buildings and schools, ‘Vandalism and Graffiti Detection’ use cases have been deployed, along with the face recognition system to identify frequent perpetrators and alert the authority for timely action. In the quest for maintaining the environment and air quality, authorities are using AI-powered Video Analytics to ‘Detect Polluting Vehicles’ in real-time. Accessing vehicle details with ease: Videonetics’ Vehicle Licence Plate Recognition (ANPR or ALPR) application is deployed across 34 locations such as inter-city roads, intersections, entry-exit points of the city and highways. This is done to capture and record the licence plate of any vehicle class and store them in the database for any future investigations. ANPR also supports city officials in identifying suspicious or wanted vehicles or non-standardised number plates in real-time and alert police officials on time. It has been quite helpful in solving cases of ‘stolen’ vehicles in the city. Impact The town has become a shining beacon emblematic of the concept of a truly safe and smart city, as the unified video management platform of Videonetics has successfully provided tools to multiple agencies to solve real challenges beyond the basic need of monitoring for security purposes. Here is a quick summary of the derived benefits of the end-to-end solution: Active monitoring round-the-clock, in-built Video Analytics, ANPR, and facial recognition system has helped law enforcement authorities to manage traffic efficiently, enhance safety for citizens, and protect local businesses and city infrastructure. Working with city administration, control room operators can switch between video feeds using dynamic maps that empower them to obtain critical event information and manage emergencies by alerting stakeholders for quick action. And when necessary, the Videonetics solution makes it possible to share forensic videos across departments, facilitating more collaborative and successful response efforts. On the traffic front, operators gain vital statistical insights into traffic flow across the city that helps in pre-emptive planning to reduce congestion. The authorities also get alerts when there is a hot listed vehicle spotted. Face Recognition System (MeraFace™) has proven to be a watchful eye in identifying people of interest, suspects, criminals and trespassers, and alert teams for faster response and intervention to curtail threats The open and modular architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust but also integrates the city surveillance system in a single unified interface to address overall security concerns with a holistic approach.
MVM is a nationally-owned energy group with a mission to provide affordable and clean energy. Its portfolio covers the total domestic energy system in Hungary, where it is the dominant electricity wholesale trader; and it also operates in Austria, the Czech Republic, Croatia, Slovakia, Romania, and other parts of Europe. It is actively increasing its presence in regional markets, as well as expanding into areas of sustainable energy including solar power, hydropower, and natural nuclear. Electricity generation by the MVM Group is already about 83% carbon neutral. Challenge MVM had 14 photovoltaic power plants that needed to be protected in high-residential areas while protecting the privacy of neighbouring residents. Because of their locations, these sites were at high risk of vandalism, trespass, and theft of equipment. Also due to the adjacent residential settings, traditional security technology such as fence detection and outdoor visual CCTV could not be used. Solution: Thermal and PTZ cameras Protecting the privacy of neighbouring residents The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T The MVM security team turned to Hanwha Vision for its thermal cameras, as a way to protect its high-value photovoltaic assets, while adhering to GDPR and protecting personal privacy. Over 100 thermal cameras were installed along with PTZ cameras with a handover function. The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T. Good features and reasonable pricing “Hanwha Vision has a very balanced product line with good features and reasonable pricing,” explained Tamás Tánczos, Security Engineering at MVM, adding “It was a natural choice when we realised that on these sites we couldn’t use fence protection, infrared, or microwaves to detect intruders. With the thermal cameras, we could rest assured that no personal data would be gathered.” Results Motion detection The thermal cameras help MVM protect its photovoltaic sites without compromising neighbouring residents’ privacy. They come equipped with Motion detection, Handover, Tampering, Loitering, Directional detection, and Audio detection features built-in to boost operators’ situational awareness. The TNO-4040T and TNO-4050T can additionally detect changes in temperature, such as a potential fire, and shock detection, which could indicate displacement or hard blows to the device. Intelligent video analytics While the camera is constantly scanning for potential intrusion and motion detection, operators can continue to work on other activities with alerts issued for any events that need their response. This makes the system more intelligent and efficient compared to traditional fence detection or basic CCTV cameras. Visibility Because the cameras work through thermal imaging, they are not affected by low light levels or visibility, so inclement weather doesn’t impact their effectiveness. Operators consistently receive good images and resolutions no matter the environmental conditions. Further expansion planned The project initially involved 14 sites but as the effectiveness and benefits of the Wisenet cameras are proven, this is expanding to other sites in MVM’s portfolio. The team is also considering adding thermal cameras with built-in AI due to launch soon.
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyse video streams, identifying potential threats and recognising objects or individuals of interest in real-time. Optimal Space Utilisation The NVR NViS 5704 boasts a compact 1U form factor with rack depth only 56cm, making it an ideal choice for security office with limited space. Its space-efficient design ensures seamless integration into existing infrastructure without compromising on performance. At the heart of the NVR NViS 5704 lies the 13th Gen Intel® Core™ Processor with Performance Hybrid Architecture, delivering up to 16 cores, including a balance of performance cores for intensive tasks and efficient cores for power optimisation. NViS 5704 also features a PCIe x16 expansion with the flexibility to integrate accelerator cards or powerful graphics cards. This groundbreaking processing power and accelerator card support enable edge AI applications in video analytics, such as face/motion detection, object recognition, ensuring enhanced surveillance capabilities and efficient decision-making. Fortified data protection and backup Data security is of utmost importance in commercial and residential building security operations Data security is of utmost importance in commercial and residential building security operations. The NViS 5704 comes equipped with TPM2.0 and Bitlocker drive encryption, providing robust data protection to safeguard sensitive information from unauthorised access and potential threats, especially when hard disk is lost or stolen. In addition, Intel RAID technology is utilised for secure data backup. With RAID D 0, 1, 5, 10 support, critical data can be mirrored or distributed across multiple drives, ensuring data redundancy and protection against data loss. The NVR NViS 5704 offers an unparalleled blend of power, flexibility, and security, delivering a comprehensive solution for these mission-critical environments, With its accelerator card support, advanced Intel® Core™ processors, and enhanced data protection features, the NViS 5704 empowers security professionals to stay one step ahead in their efforts to safeguard communities and assets. Safeguarding communities and assets Main Features of NVR NViS 5704 are as follows: System 1U Rackmount 12/13th Gen Intel® Core-i platform DDR4 up to 64GB HDD 4-Bays 3.5” (support RAID 0,1,5,10) 1 x NVME SSD, 1 x M.2 2242 SATA SSD Display DP1.4, 1 x HDMI 2.0b, 1 x HDMI 1.4 2 x 2.5GbE Intel® Ethernet Audio in/out/Mic PCIe x16
The ever-increasing number of shoplifting incidents is forcing retailers to turn to facial biometrics as a security measure. This has yielded impressive results: store owners confirm that such security systems identify thieves by their faces and cite a reduction in theft-related losses between 50 and 90%. Modern facial recognition systems employ advanced algorithms that both ensure data privacy and adhere to international GDPR. Retail theft and robberies Retail store managers have noted a recent rise in thefts and robberies. As reported by Charged, a British retail news outlet, this disturbing trend emerged in 2018-2019 and has since evolved into a pressing issue. Interestingly, the rise in shoplifting incidents coincides with a broader surge in crime rates, as independent research portal Numbeo assigns a "high" rating to this metric in many Latin American cities. Retail security survey 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons The increase in retail attacks, as well as a growing level of aggression from organised groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security and Organised Retail Crime" report by the National Retail Federation provides some alarming statistics. According to the report, 64% of respondents observed a surge in losses from organised criminal groups since 2016, while 53% reported an escalation/increase in theft. What is more, 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons. The average loss per theft The National Retail Federation approximates the average loss per theft incident in a store at $462, with organised robberies amounting to nearly $7,500. Furthermore, data from the British Retail Consortium, as reported by the Daily Mail, reveals an alarming increase in-store theft incidents, soaring from 3 million cases in 2016-2017 to 8 million in 2022. Delayed response Theft cases below a certain monetary value are often deemed low-priority and go uninvestigated The often delayed response of the police to shoplifting incidents leaves retail businesses vulnerable to theft. Store employees, wary of potentially armed perpetrators, avoid personally confronting suspects, while law enforcement personnel respond to incidents only after the criminals have already made their escape. Additionally, theft cases below a certain monetary value are often deemed low-priority and go uninvestigated. Latin America relies on biometric technologies Fortune Business Insights predicts the global facial recognition technology market to reach an impressive $13 billion by 2027, with a compound annual growth rate (CAGR) of 14.8%. The 3D recognition sector exhibits even swifter growth, with Market Research Future reporting a CAGR of 21.6%. Biometric technology development The Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22% However, it is Latin America that is considered the most favourable region for biometric technology development, with its biometrics market surpassing the global growth rate by far. Multiple research firms, including Inkwood Research, anticipate that the Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22%. Government investments Analysts identify Brazil, Mexico, and Argentina as key influencers in the regional development of biometric technologies. This trend is attributable to both governmental investments in initiatives like safe cities or digital identification, and private sector endeavours to mitigate the escalating crime rates. How facial recognition protects against theft A facial biometrics system installed in a major retail store chain prevents thousands of crimes Retailers are finding effective protection against growing losses through a combination of organisational protocols, staff training, and the adoption of ready-to-use security solutions, such as anti-theft systems, in-store surveillance, and biometric technologies. Facial recognition systems have proven to be highly effective in preventing theft and robberies. For example, according to the Daily Mail, a facial biometrics system installed in a major retail store chain prevents thousands of crimes each month. AI-based system Additionally, Charged disclosed that a local convenience store saw a staggering 90% reduction in losses following the installation of an AI-based system. Facial biometric systems assist security services in monitoring the store and promptly identifying any infractions. How it works Cameras installed in the store capture video footage, which the system then uses to extract facial images and create biometric profiles stored in a database. The system continuously cross-references real-time video data against the biometric profiles already cataloged in the database. In case a customer was previously involved in theft, vandalism, or similar incidents features on the "stop-list," the system notifies the security service, prompting closer monitoring of the said individual. Detect suspicious activities and alert By integrating facial biometrics with video analytics, the system can quickly detect suspicious activities and alert security personnel. The incorporation of facial biometrics helps to: Significantly reduce losses from theft, robbery, and vandalism, Improve the efficiency of security services, Lessen the strain of manually sifting through footage from multiple cameras, Minimise the potential for human error in in-store security, Enhance interaction with customers by incorporating biometrics into marketing systems. Police departments also benefit from increased crime-solving rates, while retail industry professional associations can curb recurrent thefts by sharing "stop lists" and biometric data on criminal gangs and individual offenders. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces Brazilian Shopping Centre case study Jockey Plaza, a shopping centre in Curitiba, Brazil, implemented a comprehensive security system featuring video analytics and facial biometrics. This modern facility, spanning 200,000 square metres, accommodates 400 stores and 28 food establishments. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces, a facial biometrics solution developer. Id-Guard facial identification software To enhance the security of the shopping centre, automate security operations, and expedite crime investigations, they chose to employ RecFaces' Id-Guard facial identification software. Id-Guard seamlessly integrates with video surveillance and video analytics systems, offering biometric identification, real-time and retrospective face search within video streams, and stop listing capabilities. Saves time Implementation of Id-Guard saves security specialists time as they no longer have to spend hours" "The moment a person on the stop list enters the camera's field of view, the operator is immediately notified," says Cristiano J S Maffessoni, Francaza’s CIO. "Based on our experience, implementation of Id-Guard saves security specialists time as they no longer have to spend hours sifting through video footage when investigating incidents." 50% cut in shoplifting instances According to Cristiano J S Maffessoni, the payback period for the Jockey Plaza shopping centre project is less than 3 years thanks to a 50% cut in shoplifting instances, swift resolution of crimes, and increased efficiency of security services. The return on investment for biometric systems typically spans 1 to 3 years, depending on the crime rate in the vicinity of the shopping centre. To calculate effectiveness, it is necessary to evaluate the average loss per incident, the average number of similar incidents annually, and the incident reduction rate, generally fluctuating between 30% and 70%, based on the security service's efficacy. Ready-to-use biometric solutions Our solutions allow customers to identify offenders, instantly respond to incidents, and foster loyalty" Maria Kazhuro, RecFaces' BDM in Latin America, shares, "RecFaces has developed two lines of ready-to-use biometric solutions specifically designed for the security and retail sectors." "We've seen an immense demand for our ready-made solutions in Latin America, thanks to their quick and easy deployment on any equipment. Our solutions allow customers to identify offenders, instantly respond to incidents, conduct marketing research, and foster customer loyalty." Data storage method RecFaces' Id-Guard, a biometric ready-to-use solution, stores only biometric template feature vectors that cannot be reconstructed into facial images in its database. This data storage method adheres to international GDPR data protection regulations and is supplemented by AES-256 standard encryption mechanisms for critical data.
A town in Arunachal Pradesh becomes a ‘Smart City’ with AI-powered Videonetics Solution. A smart, resilient, and unified solution enables public safety, asset security and traffic management for the city. The customer One of the prominent towns in Arunachal Pradesh, India, made it into the Government of India’s Smart Cities Mission development scheme with a vision of building a well-managed clean, green, and environment-friendly city. This city is envisioned to possess a character of its own, defined by scenic beauty, intellectual capital, and eco-friendly tourism through sustained economic growth for all its citizens. The target is to create a replicable role model that can act like a lighthouse to other aspiring towns of Arunachal Pradesh. Challenges Over the past few years, the town has witnessed a high influx of students, visitors and tourists The town is fast becoming a bustling tourist attraction in Arunachal Pradesh. Before this, the town had a limited deployment of CCTV cameras, and the system was not well suited to even conduct any investigations if an unwanted incident were to happen. Over the past few years, the town has witnessed a high influx of students, visitors and tourists. Understandably, infrastructure has also shown rapid growth, and hence local authorities understood the need to address concerns of vigilance, traffic, municipality, assets protection and safety of the citizens. Solution The official body formed to execute the vision of a safe city wanted to implement a comprehensive surveillance solution to monitor law and order situations, road safety, identify miscreants, protect public and private properties, and improve urban amenities. A project team comprising officials of the governing body, Videonetics, and system integration partners, carried out extensive research to identify important spots around the town and prepared a comprehensive surveillance strategy. Videonetics designed a versatile and unified solution that includes Intelligent Video Management System (IVMS 3.0), AI-powered Video Analytics, Automatic Licence Plate Recognition (ALPR) System and Face Recognition System (FRS). 24x7 Geo-situational awareness and accelerating response time: Operators in the command and control centre monitor over 180+ locations across the town with Videonetics Intelligent VMS using multi-layer GIS maps for a clear view of cameras spread across the geography. This covers areas like government establishments, public areas, airports, railway stations, schools, parks, markets and roads. Suspect tracking and face recognition: The city deployed network cameras to process video streams with the Face Recognition application (MeraFace™) at city entry-exit points and other public areas. The forensic investigation features of the application also help in a quick search for evidence and identifying suspects during investigations. AI-powered video analytics for the safety and security of people and assets: Artificial Intelligence powered video analytics has been deployed strategically across various facilities throughout the city while keeping in mind the requirements specific to each site. Line crossing detection is deployed along perimeters of correctional facilities to detect intrusion. Face recognition application is also used at entry-exit gates to recognise faces in live video streams. ‘Unattended Object Detection’ use case has also been applied to identify objects that can pose a security threat. Fire and smoke detection has been deployed at the airport and road intersections across the city to detect fire and smoke caused by accidents. Parks and gardens are being monitored to detect people collapsing. Face recognition is also being used to identify people. Crowd formation and estimation has been put to use in public areas like hospitals and VIP hotspots to manage crowd efficiently. To keep the city clean, the municipality body is using AI-powered Video Analytics to detect the overflow of garbage bins installed at all garbage collection centres. Also, to keep a constant track of the timely collection of garbage and identify people violating guidelines and penalise them, the face recognition system has been deployed as well. To protect various government buildings and schools, ‘Vandalism and Graffiti Detection’ use cases have been deployed, along with the face recognition system to identify frequent perpetrators and alert the authority for timely action. In the quest for maintaining the environment and air quality, authorities are using AI-powered Video Analytics to ‘Detect Polluting Vehicles’ in real-time. Accessing vehicle details with ease: Videonetics’ Vehicle Licence Plate Recognition (ANPR or ALPR) application is deployed across 34 locations such as inter-city roads, intersections, entry-exit points of the city and highways. This is done to capture and record the licence plate of any vehicle class and store them in the database for any future investigations. ANPR also supports city officials in identifying suspicious or wanted vehicles or non-standardised number plates in real-time and alert police officials on time. It has been quite helpful in solving cases of ‘stolen’ vehicles in the city. Impact The town has become a shining beacon emblematic of the concept of a truly safe and smart city, as the unified video management platform of Videonetics has successfully provided tools to multiple agencies to solve real challenges beyond the basic need of monitoring for security purposes. Here is a quick summary of the derived benefits of the end-to-end solution: Active monitoring round-the-clock, in-built Video Analytics, ANPR, and facial recognition system has helped law enforcement authorities to manage traffic efficiently, enhance safety for citizens, and protect local businesses and city infrastructure. Working with city administration, control room operators can switch between video feeds using dynamic maps that empower them to obtain critical event information and manage emergencies by alerting stakeholders for quick action. And when necessary, the Videonetics solution makes it possible to share forensic videos across departments, facilitating more collaborative and successful response efforts. On the traffic front, operators gain vital statistical insights into traffic flow across the city that helps in pre-emptive planning to reduce congestion. The authorities also get alerts when there is a hot listed vehicle spotted. Face Recognition System (MeraFace™) has proven to be a watchful eye in identifying people of interest, suspects, criminals and trespassers, and alert teams for faster response and intervention to curtail threats The open and modular architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust but also integrates the city surveillance system in a single unified interface to address overall security concerns with a holistic approach.
MVM is a nationally-owned energy group with a mission to provide affordable and clean energy. Its portfolio covers the total domestic energy system in Hungary, where it is the dominant electricity wholesale trader; and it also operates in Austria, the Czech Republic, Croatia, Slovakia, Romania, and other parts of Europe. It is actively increasing its presence in regional markets, as well as expanding into areas of sustainable energy including solar power, hydropower, and natural nuclear. Electricity generation by the MVM Group is already about 83% carbon neutral. Challenge MVM had 14 photovoltaic power plants that needed to be protected in high-residential areas while protecting the privacy of neighbouring residents. Because of their locations, these sites were at high risk of vandalism, trespass, and theft of equipment. Also due to the adjacent residential settings, traditional security technology such as fence detection and outdoor visual CCTV could not be used. Solution: Thermal and PTZ cameras Protecting the privacy of neighbouring residents The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T The MVM security team turned to Hanwha Vision for its thermal cameras, as a way to protect its high-value photovoltaic assets, while adhering to GDPR and protecting personal privacy. Over 100 thermal cameras were installed along with PTZ cameras with a handover function. The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T. Good features and reasonable pricing “Hanwha Vision has a very balanced product line with good features and reasonable pricing,” explained Tamás Tánczos, Security Engineering at MVM, adding “It was a natural choice when we realised that on these sites we couldn’t use fence protection, infrared, or microwaves to detect intruders. With the thermal cameras, we could rest assured that no personal data would be gathered.” Results Motion detection The thermal cameras help MVM protect its photovoltaic sites without compromising neighbouring residents’ privacy. They come equipped with Motion detection, Handover, Tampering, Loitering, Directional detection, and Audio detection features built-in to boost operators’ situational awareness. The TNO-4040T and TNO-4050T can additionally detect changes in temperature, such as a potential fire, and shock detection, which could indicate displacement or hard blows to the device. Intelligent video analytics While the camera is constantly scanning for potential intrusion and motion detection, operators can continue to work on other activities with alerts issued for any events that need their response. This makes the system more intelligent and efficient compared to traditional fence detection or basic CCTV cameras. Visibility Because the cameras work through thermal imaging, they are not affected by low light levels or visibility, so inclement weather doesn’t impact their effectiveness. Operators consistently receive good images and resolutions no matter the environmental conditions. Further expansion planned The project initially involved 14 sites but as the effectiveness and benefits of the Wisenet cameras are proven, this is expanding to other sites in MVM’s portfolio. The team is also considering adding thermal cameras with built-in AI due to launch soon.
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyse video streams, identifying potential threats and recognising objects or individuals of interest in real-time. Optimal Space Utilisation The NVR NViS 5704 boasts a compact 1U form factor with rack depth only 56cm, making it an ideal choice for security office with limited space. Its space-efficient design ensures seamless integration into existing infrastructure without compromising on performance. At the heart of the NVR NViS 5704 lies the 13th Gen Intel® Core™ Processor with Performance Hybrid Architecture, delivering up to 16 cores, including a balance of performance cores for intensive tasks and efficient cores for power optimisation. NViS 5704 also features a PCIe x16 expansion with the flexibility to integrate accelerator cards or powerful graphics cards. This groundbreaking processing power and accelerator card support enable edge AI applications in video analytics, such as face/motion detection, object recognition, ensuring enhanced surveillance capabilities and efficient decision-making. Fortified data protection and backup Data security is of utmost importance in commercial and residential building security operations Data security is of utmost importance in commercial and residential building security operations. The NViS 5704 comes equipped with TPM2.0 and Bitlocker drive encryption, providing robust data protection to safeguard sensitive information from unauthorised access and potential threats, especially when hard disk is lost or stolen. In addition, Intel RAID technology is utilised for secure data backup. With RAID D 0, 1, 5, 10 support, critical data can be mirrored or distributed across multiple drives, ensuring data redundancy and protection against data loss. The NVR NViS 5704 offers an unparalleled blend of power, flexibility, and security, delivering a comprehensive solution for these mission-critical environments, With its accelerator card support, advanced Intel® Core™ processors, and enhanced data protection features, the NViS 5704 empowers security professionals to stay one step ahead in their efforts to safeguard communities and assets. Safeguarding communities and assets Main Features of NVR NViS 5704 are as follows: System 1U Rackmount 12/13th Gen Intel® Core-i platform DDR4 up to 64GB HDD 4-Bays 3.5” (support RAID 0,1,5,10) 1 x NVME SSD, 1 x M.2 2242 SATA SSD Display DP1.4, 1 x HDMI 2.0b, 1 x HDMI 1.4 2 x 2.5GbE Intel® Ethernet Audio in/out/Mic PCIe x16


Round table discussion
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Products



Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download