GDPR
Anviz (a business unit of Xthings Group, Inc.) has officially launched an OSDP (Open Supervisory Device Protocol)-enabled access control solution. The goal is simple: improve the shortcomings of legacy access control systems while enabling bi-directional, secure data interactions between systems and components. While communication standards ensure interoperability among diverse technologies designed and manufactured by global companies – evolving standards like OSDP allow the application...
Secure digital communications specialist Zivver has announced the launch of its new Email Threat Protection (ETP) product, powered by Sublime Security. The latest addition enhances the company’s existing secure communications platform, enabling enterprises to manage both internal and external email security risks effortlessly. Zivver Email Threat Protection Traditional email security tools can be cryptic, inflexible and labour-intensive for IT teams Tradi...
Zivver, a pioneer in secure communications, has published its latest report, shedding light on critical gaps in email security practices and their alignment with increasing regulatory requirements. The findings from Email Security Trends 2025: The Widening Disconnect Between Email Security and Risk Management highlight the often-overlooked threats in email security, and the scrutiny of regulatory demands on organisations. Data leak prevention Landmark directives such as NIS2, DORA, and GDPR d...
GlobalLogic Inc. is pleased to announce the opening of a new Security Operations centre (SOC) in Kraków, Poland that utilises the capabilities of Hitachi Cyber. This announcement comes as organisations face a critical moment in cybersecurity, with the start of 2025 bringing heightened risks from AI-driven attacks, ransomware-as-a-service, and supply chain vulnerabilities. According to recent reports by ENISA, cyber incidents across Europe have doubled in 2024, and the impact o...
Kong Inc., a pioneering developer of cloud API technologies, recently released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report, which highlights the API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern about AI-enhanced attacks in the future. And while 85% say they’re conf...
iDenfy, a global RegTech company specialising in Know Your Customer (KYC), Anti-Money Laundering (AML), and Know Your Business (KYB) verification solutions, has announced its achievement of SOC II certification with the submission of an independent auditor’s report. New office This milestone confirms iDenfy’s position as a trusted partner in the US market, ensuring that its data handling practices meet rigorous standards of security and confidentiality. The certification coi...
News
Vicon Industries, Inc., a subsidiary of Cemtrex, Inc., a designer and manufacturer of cloud-based and on-prem physical Security Solutions announced a partnership with Hailo, an AI chip manufacturer known for its high-performance edge AI processors. Together, Vicon and Hailo are raising the bar for video intelligence by integrating the groundbreaking Hailo-15 System-on-a-Chip (SoC) into Vicon’s NEXT Modular Camera System. Detect and deter threats "Our partnership with Hailo reaffirms our commitment to transforming the security industry," said Saagar Govil, CEO of Vicon Industries. "By embedding Hailo’s powerful AI technology into NEXT, we are empowering customers with a proactive solution that not only detects but also deters potential threats. This is a camera built for the complex challenges of today and tomorrow.” Hailo-15 This increased AI processing power unlocks significantly lower latency, reduced bandwidth usage, and improved reliability Vicon is among the first to bring Hailo-15 to market, unlocking edge-based AI processing capabilities far exceeding traditional cameras. The Hailo-15 combines patented AI inferencing with advanced computer vision engines, delivering unparalleled image quality and enabling complex deep learning applications directly on the camera. Overall, this increased AI processing power unlocks significantly lower latency, reduced bandwidth usage, and improved reliability, all without the need for server-based processing. Key features NEXT brings this intelligence to the forefront with features like: AI Vision: Advanced AI video enhancement ensures crisp, color-rich images day and night. Color forensics: The ability to pinpoint specific clothing or vehicle colors provides unmatched precision in tracking suspects or vehicles. Smart object classification: Instantly distinguish between people, vehicles, and animals, reducing false alarms and allowing teams to focus on real threats. Real-time analytics: Detects potential threats like loitering or intrusions as they happen, enabling security teams to intervene before incidents escalate. AI performance “With the groundbreaking Hailo-15, we’re setting a new standard for edge AI performance,” said Orr Danon, CEO of Hailo. “Its unparalleled compute power enables advanced video analytics—like object detection, behavioral analysis, and forensic searches—while also delivering AI video enhancement, including low-light denoising, improved colors, and improved image quality." Data privacy and safety "By processing everything on the edge, we ensure increased data privacy and safety as there is no longer a need to transmit personally identifiable information to the cloud." "We’re excited to partner with Vicon, one of the first manufacturers to embrace this technology, as they lead the way in unlocking the full potential of AI on the edge.” Situational awareness NEXT features several onboard technologies, including high-powered microphones with a 50-foot range As a further complement to its AI capabilities, NEXT also features several onboard technologies, including high-powered microphones with a 50-foot range and 360° commercial-grade speakers for real-time audio warnings and communications. Additionally, the dome contains programmable signal lightbars to communicate situational awareness status to indicate threats, warnings, or other operational conditions. Documenting and reporting “By combining next-generation intelligence with the onboard technology,” said Haim Shain, Sr. Vice President of Product Management at Vicon Industries, “the camera transforms from a reactive device into a proactive deterrent, helping to prevent potential threats instead of simply documenting and reporting on them." "It improves communications and daily operations by projecting audible instructions and warnings and issuing visual cues to folks in the area." Communication features with AI "For example, you can pair these communication features with our AI analytics, so if the camera detects an intruder at night, the lightbars can flash red and an automated message can alert the intruder that they’ve been detected." "The lightbars can also signal operational states, like blue to indicate a shift change or amber to notify that someone is waiting in the lobby. The opportunities to integrate them into daily operations are limitless.” Future-proof solutions "By embedding Hailo's high-performance AI processors into our NEXT cameras, we are equipping our customers with powerful, future-proof solutions that transform how they monitor and protect their environments," Govil concluded. "The incredible processing power that Hailo provides ensures customers who invest in NEXT today can take advantage of frequent updates and enhancements shortly." "This includes increasingly sophisticated intelligence that was previously limited to cost-prohibitive, server-based analytics platforms.” The Vicon NEXT camera will be presented at the Hailo hospitality suite at CES, January 7-10 in Las Vegas.
The NurseAssist solution from Kepler Vision Technologies and MOBOTIX has received an important upgrade this week. The MOBOTIX c71 Smart Sensor now more accurately detects behaviour abnormalities and improves accuracy that reduces false alarms. The NurseAssist sensors continue to remain GDPR and HIPAA-compliant, which protects patient and resident privacy while ensuring their safety. New software upgrade False alarms can be reduced by 90 percent compared to conventional systems Following the successful launch of NurseAssist, the first joint solution from Kepler Vision Technologies and MOBOTIX in November 2023, the upgrade now extends the functions of the reliable fall detector, which can be used in hospitals, elderly care facilities or psychiatric clinics. False alarms can be reduced by 90 percent compared to conventional systems. With the new software upgrade for the c71 Kepler Nurse Assist, the camera can now also recognise whether a patient is sitting or lying on the floor, whether they want to leave the room or enter the bathroom and whether they are on the edge of the bed and need support or not. Deep understanding of AI Additionally, it can be distinguished if a client has fallen on the floor or is sitting on the floor, and failures in recognising the bed can be reported, for instance, when a patient lift blocks the view. MOBOTIX and Kepler Vision Technologies are two of the world's pioneering IT experts in the security and healthcare industry. Kepler Vision Technologies, a Dutch powerhouse in computer vision and machine learning, has extensive experience in healthcare and nursing, complemented by a deep understanding of AI in recognising human activity. Kepler NurseAssist technology MOBOTIX has been active in healthcare for many years and successfully delivered numerous HIPAA-compliant projects MOBOTIX has been active in healthcare for many years and has successfully delivered numerous HIPAA-compliant projects for hospitals, nursing homes and care facilities with its secure, robust yet intelligent and flexible video technology solutions. Harro Stokman, CEO of Kepler Vision Technologies, says: “Since the Kepler NurseAssist technology was embedded into the MOBOTIX c71, we received plenty of requests from care homes for additional functionality. We listened carefully to the wishes of the care homes and joined forces to realise the required functionality, which is reflected in the upgrades to the camera presented today.” Data protection-compliant tool Thomas Lausten, CEO of MOBOTIX, comments: “Our joint solution is being used across Europe with great success and our c71 camera model including its Smart Sensor can only get better with every upgrade. The technology still has so much potential in the care sector and is a real game changer in many ways, enabling improved care and support for patients while easing the burden on staff." "Together with Kepler, we offer a unique, data protection-compliant tool for optimising care from a single source. The solution enables an immense improvement in day-to-day care and is easy to plan, configure and install thanks to its plug-and-play concept. The rapid commissioning, use and integration into existing nurse call systems make it easier for operators to establish the technology.”
Matrix concluded a remarkable showcase at Inno Rail 2024, held from November 28 to 30 at the RDSO Stadium Ground in Lucknow. At Booth No. 81, Matrix captivated attendees with its trailblazing security and communication solutions, specifically designed for railway and transportation sectors. Meeting stringent cybersecurity standards Visitors experienced Matrix’s RDSO 6.0-compliant network cameras, a first for India, which meet the stringent cybersecurity standards of Indian Railways. These STQC-certified cameras uphold OWASP ASVS 4.0 L2 standards, ensuring unmatched data protection for sensitive passenger information, a key attraction for railway decision-makers. How to ensure reliability? Matrix’s 4-Channel NVRs, with compact, fanless designs, proved how to ensure reliability Matrix's EN50155-certified and now EN45545-2-certified Ruggedised IP Cameras, engineered for harsh railway and roadway environments, drew significant attention. With features like anti-vibration, shock resistance, and low-light image clarity, these cameras impressed stakeholders seeking dynamic surveillance solutions. Additionally, Matrix’s 4-Channel NVRs, with compact, fanless designs and up to 10TB storage, demonstrated how to ensure reliability and longevity in critical railway applications. Cyber-secure video management for railways Matrix showcased its STQC-certified cyber-secure Video Management Software (VMS), which addresses railway-specific operational challenges. Attendees were particularly interested in its ability to protect data from OWASP Top 10 security risks, providing centralised control for seamless video surveillance across stations, depots, and control rooms. Solutions for railway infrastructure Keys are tailored to meet the needs of railway infrastructure, ensuring streamlined access Railway professionals appreciated Matrix’s COSEC ARGO FACE, a face recognition-based access control system, and COSEC VEGA, an AADHAAR-enabled biometric attendance solution. Designed to enhance both security and operational efficiency, these solutions are tailored to meet the unique needs of railway infrastructure, ensuring streamlined access and personnel management. Telecom solutions for railway communication Matrix’s telecom offerings, including IP-PBX systems and Unified Communication servers, showcased resilient communication networks essential for efficient railway operations. Visitors were impressed by the ability of these solutions to support seamless coordination across vast territories. Strengthening partnerships for a safer rail network “Inno Rail 2024 was an incredible opportunity to engage with key decision-makers and stakeholders in the railway sector,” said Tarun Sharma, Marketing Head at Matrix. “Our solutions resonated with the audience, reflecting our commitment to strengthening railway security and operational efficiency with cutting-edge technology.” Matrix’s successful participation at Inno Rail 2024 reinforced its position as a trusted technology provider for the Indian Railways, paving the way for future collaborations aimed at safer, more efficient rail transport systems.
Cohesity, a pioneer in AI-powered data security, now supports the Haute-Garonne Departmental Council with Cohesity DataProtect. This allows the organisation to drastically reduce the time and resources needed to manage its backups, both on-premises and in the cloud and significantly accelerate the data recovery processes to enhance its cyber resilience. The Haute-Garonne Departmental Council manages a vast collection of data covering different functions, including building plans, architectural services, departmental archives, social assistance requests, and even transport cards. This diversity of formats and data silos made recovery a long process that required many internal resources. Cohesity DataProtect Cohesity allowed the Departmental Council to harmonise all its data into a simple-to-use, high-performance key To resolve any incident, “You had to be an expert in backup administration,” explains Jean-Xavier Mauruc, database systems administrator at the Haute-Garonne Departmental Council. The migration to Cohesity has allowed the Departmental Council to harmonise all their data into a simple-to-use, high-performance solution. Cohesity DataProtect helped to streamline the Departmental Council's backup operations by reducing the number of backup jobs from 150 to around 15. This reduction enabled the Departmental Council to significantly reduce time spent on administrative tasks, from two to three hours per day to just a few minutes, saving it up to 15 working hours per week. Advanced security threats The Departmental Council was also looking for a robust and resilient solution to deal with cyber threats, including the fight against ransomware, while maintaining their existing production infrastructure. The solution had to be easy to use to manage various daily tasks, from integration to corrective and operational maintenance. For Jean-Xavier Mauruc, “DataProtect from Cohesity offers native security improvements. Being a solution specifically designed with advanced security threats in mind, it provides inherent protection against ransomware. Cohesity stood out as an optimal choice.” Cohesity and DataProtect cloud services Beyond the administrative team, the simplified processes and interface of Cohesity and DataProtect cloud services have allowed employees to manage recoveries themselves without additional training, saving both time and money. The adaptation took place very quickly, and the Departmental Council is now well-equipped to protect its various institutional data while continuing to safely promote economic and social progress for the inhabitants of Haute-Garonne. In this territory of more than a million inhabitants, Olivier Savornin, group vice president of EMEA at Cohesity, said, “We are proud to support the Departmental Council in its efforts to secure and manage data, vital for the region's sustainable development.”
Matrix, a pioneering provider of advanced security and telecom solutions, successfully participated in the prestigious Dahej Industrial Expo 2024, held from November 20th to 22nd at GIDC Road, Dahej, Gujarat. The event proved to be an excellent platform for Matrix to highlight its latest advancements in IP video surveillance, access control, time attendance, and telecom solutions, drawing significant attention from industry stakeholders and visitors. Transforming security with innovations At the Dahej Industrial Expo, Matrix captivated attendees with its comprehensive security portfolio tailored to the evolving needs of enterprises. The highlight of the showcase was Matrix's Ruggedised IP Camera, designed to meet EN50155 standards for challenging environments such as roadways and railways. Visitors were impressed with its exceptional video clarity, low-light performance, and ability to capture precise footage of fast-moving vehicles, making it a game-changer for demanding applications. OWASP ASVS 4.0 L2 standards Matrix showed its Professional Series Bullet and Dome Cameras that are fitted with cybersecurity Matrix also exhibited its Professional Series Bullet and Dome Cameras, which are equipped with robust cybersecurity features that are compliant with OWASP ASVS 4.0 L2 standards and certified by STQC. Complementing these cameras, Matrix presented its range of Network Video Recorders, renowned for delivering reliable and efficient video surveillance solutions. Real-time alerts and updates In the domain of access control and time attendance, Matrix showcased its GDPR-compliant systems with advanced features like WhatsApp integration for real-time alerts and updates. Visitors were particularly intrigued by the COSEC ARGO FACE, a high-performance door controller offering Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion for enhanced security. Its ability to manage up to 50,000 personnel with identification speeds under 0.5 seconds garnered widespread appreciation. Innovation and smart enterprise solutions Matrix showed the integration of its IP video surveillance, access control, and time-attendance systems Another standout solution was the COSEC VEGA, an AADHAAR-enabled biometric attendance system designed to improve attendance tracking and streamline workforce management for government and public-sector organisations. Matrix further demonstrated the integration of its IP video surveillance, access control, and time-attendance systems with BACnet for intelligent building automation and proactive security, underlining its commitment to innovation and smart enterprise solutions. Cutting-edge telecom solutions for modern enterprises Matrix’s showcase of its enterprise-grade Telecom Solutions also received enthusiastic feedback from attendees. The display featured Hybrid PBX systems, embedded IP-PBX platforms, VoIP gateways, and SIP deskphones, each designed to optimise communication and boost operational efficiency. With their scalability and robust performance, Matrix’s Telecom Solutions stood out as reliable infrastructure for businesses aiming to streamline communication and enhance productivity. Strengthening market presence Matrix’s participation at Dahej Industrial Expo 2024 reinforced its growing presence in Dahej Matrix’s participation at Dahej Industrial Expo 2024 reinforced its growing presence in Dahej and the surrounding regions. The event served as a valuable opportunity to connect with industry pioneers, project managers, and consultants, demonstrating how Matrix’s innovative solutions address the unique challenges faced by enterprises in this industrial hub. Tarun Sharma, Marketing Head at Matrix, expressed his satisfaction with the event, stating, “Dahej Industrial Expo 2024 was a fantastic platform for Matrix to interact with key stakeholders and showcase our latest innovations in Security and Telecom. The response from visitors has been overwhelmingly positive, and we look forward to building lasting relationships with the enterprises we engaged with during the event.” A successful showcase Matrix extends its gratitude to all the attendees who visited its booth at Dahej Industrial Expo 2024. The event marked another milestone in Matrix’s journey of delivering cutting-edge security and communication solutions to enterprises, reflecting its commitment to innovation, quality, and customer-centricity.
Morphean, Europe’s secure direct-to-cloud video solutions company, has announced a strategic partnership with Hanwha Vision, the global vision solution provider. This collaboration will deliver cutting-edge security solutions tailored to meet the evolving needs of businesses, including across retail, smart cities and banking, amid an increasingly complex threat environment. Direct-to-cloud This partnership will benefit multi-site organisations and streamline their surveillance operations by removing on-site server hardware. The direct-to-cloud approach seamlessly integrates Hanwha Vision ranges, including the X, Q and T series, with the Morphean platform, enabling remote management and access, live streaming, and cloud recording. Users can manage sites from a single, intuitive interface, to simplify setup, management and configuration. Reduces costs, central management Businesses can significantly reduce operational costs by eliminating hardware maintenance By utilising a direct-to-cloud model, businesses can significantly reduce operational costs - by eliminating hardware maintenance, limiting electricity consumption, and reducing the need for site visits. This results in a more sustainable, cost-effective, and scalable system. Furthermore, Morphean’s integrations with Alarm Receiving Centres (ARCs) streamline security processes by providing a centralised management interface, enabling quick and coordinated incident responses. As a result, businesses can reduce downtime and minimise potential losses. Trusted cybersecurity Morphean and Hanwha Vision are committed to trustworthy cybersecurity. Morphean operates within secure, GDPR-compliant data centres located in Switzerland, France, Germany, and the United Kingdom, all certified with ISO 27001 to guarantee top-tier cybersecurity, video encryption, and multi-layer authentication. Morphean offers robust encryption, redundancy, and regular backups, minimising the risk of data loss due to hardware failures or theft and ensuring continuous operation. USNDAA, ISO-27001, and UL CAP Certification The in-house S-CERT is entirely focused on addressing any potential security vulnerabilities Hanwha Vision was chosen as a manufacturing partner for its commitment to designing, developing,g and manufacturing products and solutions that are cyber-secure, keep users’ confidential information safe, and comply with international regulations. Hanwha Vision products and solutions are compliant with the US National Defense Authorization Act (NDAA), meet ISO-27001 and stringent UL CAP Certification requirements, and have FIPS 140-2 and a device certificate (private Root CA). In addition, the dedicated in-house Security Computer Emergency Response Team (S-CERT) is entirely focused on addressing any potential security vulnerabilities. A competitive edge for resellers and system integrators By combining Hanwha Vision's powerful edge-based open platform with Morphean's cloud-hosted solution, resellers and system integrators can leverage direct-to-cloud video surveillance technologies to offer clients an efficient, scalable, and cost-effective solution. Furthermore, this integration reduces the complexity of installations and maintenance, allowing for quicker deployments and fewer on-site visits. Remote management and monitoring services Customer satisfaction increases sales opportunities, and profitability for resellers and system integrators Additionally, the ability to deliver remote management and monitoring services enhances customer satisfaction and fosters long-term relationships. This increases sales opportunities as well as profitability for resellers and system integrators and positions them as leaders in the evolving security technology landscape. Reliable and efficient surveillance “Our collaboration with Hanwha Vision opens new doors for businesses seeking reliable, centralised, and efficient surveillance solutions. Morphean’s direct-to-cloud platform allows companies to streamline security operations while significantly reducing infrastructure costs and complexity,” said Jack Turnell, Commercial Product Owner at Morphean. “This partnership ensures that our clients benefit from state-of-the-art surveillance with robust cybersecurity, supporting them in minimising risk, lowering operating costs, and maximising operational efficiency.” Scalable and sustainable “Our partnership with Morphean showcases scalable, accessible, and sustainable security solutions,” said John Lutz Boorman, Head of Product and Marketing, at Hanwha Vision Europe. "By combining Hanwha Vision’s industry-leading video surveillance solutions with Morphean’s direct-to-cloud capabilities, we’re enabling businesses across sectors - from retail to smart cities - to deploy and manage security systems that are both highly flexible and cost-effective."
Expert commentary
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centres Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines. The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, , purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. agreed to acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution centre, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Case studies
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyse video streams, identifying potential threats and recognising objects or individuals of interest in real-time. Optimal Space Utilisation The NVR NViS 5704 boasts a compact 1U form factor with rack depth only 56cm, making it an ideal choice for security office with limited space. Its space-efficient design ensures seamless integration into existing infrastructure without compromising on performance. At the heart of the NVR NViS 5704 lies the 13th Gen Intel® Core™ Processor with Performance Hybrid Architecture, delivering up to 16 cores, including a balance of performance cores for intensive tasks and efficient cores for power optimisation. NViS 5704 also features a PCIe x16 expansion with the flexibility to integrate accelerator cards or powerful graphics cards. This groundbreaking processing power and accelerator card support enable edge AI applications in video analytics, such as face/motion detection, object recognition, ensuring enhanced surveillance capabilities and efficient decision-making. Fortified data protection and backup Data security is of utmost importance in commercial and residential building security operations Data security is of utmost importance in commercial and residential building security operations. The NViS 5704 comes equipped with TPM2.0 and Bitlocker drive encryption, providing robust data protection to safeguard sensitive information from unauthorised access and potential threats, especially when hard disk is lost or stolen. In addition, Intel RAID technology is utilised for secure data backup. With RAID D 0, 1, 5, 10 support, critical data can be mirrored or distributed across multiple drives, ensuring data redundancy and protection against data loss. The NVR NViS 5704 offers an unparalleled blend of power, flexibility, and security, delivering a comprehensive solution for these mission-critical environments, With its accelerator card support, advanced Intel® Core™ processors, and enhanced data protection features, the NViS 5704 empowers security professionals to stay one step ahead in their efforts to safeguard communities and assets. Safeguarding communities and assets Main Features of NVR NViS 5704 are as follows: System 1U Rackmount 12/13th Gen Intel® Core-i platform DDR4 up to 64GB HDD 4-Bays 3.5” (support RAID 0,1,5,10) 1 x NVME SSD, 1 x M.2 2242 SATA SSD Display DP1.4, 1 x HDMI 2.0b, 1 x HDMI 1.4 2 x 2.5GbE Intel® Ethernet Audio in/out/Mic PCIe x16
The ever-increasing number of shoplifting incidents is forcing retailers to turn to facial biometrics as a security measure. This has yielded impressive results: store owners confirm that such security systems identify thieves by their faces and cite a reduction in theft-related losses between 50 and 90%. Modern facial recognition systems employ advanced algorithms that both ensure data privacy and adhere to international GDPR. Retail theft and robberies Retail store managers have noted a recent rise in thefts and robberies. As reported by Charged, a British retail news outlet, this disturbing trend emerged in 2018-2019 and has since evolved into a pressing issue. Interestingly, the rise in shoplifting incidents coincides with a broader surge in crime rates, as independent research portal Numbeo assigns a "high" rating to this metric in many Latin American cities. Retail security survey 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons The increase in retail attacks, as well as a growing level of aggression from organised groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security and Organised Retail Crime" report by the National Retail Federation provides some alarming statistics. According to the report, 64% of respondents observed a surge in losses from organised criminal groups since 2016, while 53% reported an escalation/increase in theft. What is more, 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons. The average loss per theft The National Retail Federation approximates the average loss per theft incident in a store at $462, with organised robberies amounting to nearly $7,500. Furthermore, data from the British Retail Consortium, as reported by the Daily Mail, reveals an alarming increase in-store theft incidents, soaring from 3 million cases in 2016-2017 to 8 million in 2022. Delayed response Theft cases below a certain monetary value are often deemed low-priority and go uninvestigated The often delayed response of the police to shoplifting incidents leaves retail businesses vulnerable to theft. Store employees, wary of potentially armed perpetrators, avoid personally confronting suspects, while law enforcement personnel respond to incidents only after the criminals have already made their escape. Additionally, theft cases below a certain monetary value are often deemed low-priority and go uninvestigated. Latin America relies on biometric technologies Fortune Business Insights predicts the global facial recognition technology market to reach an impressive $13 billion by 2027, with a compound annual growth rate (CAGR) of 14.8%. The 3D recognition sector exhibits even swifter growth, with Market Research Future reporting a CAGR of 21.6%. Biometric technology development The Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22% However, it is Latin America that is considered the most favourable region for biometric technology development, with its biometrics market surpassing the global growth rate by far. Multiple research firms, including Inkwood Research, anticipate that the Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22%. Government investments Analysts identify Brazil, Mexico, and Argentina as key influencers in the regional development of biometric technologies. This trend is attributable to both governmental investments in initiatives like safe cities or digital identification, and private sector endeavours to mitigate the escalating crime rates. How facial recognition protects against theft A facial biometrics system installed in a major retail store chain prevents thousands of crimes Retailers are finding effective protection against growing losses through a combination of organisational protocols, staff training, and the adoption of ready-to-use security solutions, such as anti-theft systems, in-store surveillance, and biometric technologies. Facial recognition systems have proven to be highly effective in preventing theft and robberies. For example, according to the Daily Mail, a facial biometrics system installed in a major retail store chain prevents thousands of crimes each month. AI-based system Additionally, Charged disclosed that a local convenience store saw a staggering 90% reduction in losses following the installation of an AI-based system. Facial biometric systems assist security services in monitoring the store and promptly identifying any infractions. How it works Cameras installed in the store capture video footage, which the system then uses to extract facial images and create biometric profiles stored in a database. The system continuously cross-references real-time video data against the biometric profiles already cataloged in the database. In case a customer was previously involved in theft, vandalism, or similar incidents features on the "stop-list," the system notifies the security service, prompting closer monitoring of the said individual. Detect suspicious activities and alert By integrating facial biometrics with video analytics, the system can quickly detect suspicious activities and alert security personnel. The incorporation of facial biometrics helps to: Significantly reduce losses from theft, robbery, and vandalism, Improve the efficiency of security services, Lessen the strain of manually sifting through footage from multiple cameras, Minimise the potential for human error in in-store security, Enhance interaction with customers by incorporating biometrics into marketing systems. Police departments also benefit from increased crime-solving rates, while retail industry professional associations can curb recurrent thefts by sharing "stop lists" and biometric data on criminal gangs and individual offenders. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces Brazilian Shopping Centre case study Jockey Plaza, a shopping centre in Curitiba, Brazil, implemented a comprehensive security system featuring video analytics and facial biometrics. This modern facility, spanning 200,000 square metres, accommodates 400 stores and 28 food establishments. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces, a facial biometrics solution developer. Id-Guard facial identification software To enhance the security of the shopping centre, automate security operations, and expedite crime investigations, they chose to employ RecFaces' Id-Guard facial identification software. Id-Guard seamlessly integrates with video surveillance and video analytics systems, offering biometric identification, real-time and retrospective face search within video streams, and stop listing capabilities. Saves time Implementation of Id-Guard saves security specialists time as they no longer have to spend hours" "The moment a person on the stop list enters the camera's field of view, the operator is immediately notified," says Cristiano J S Maffessoni, Francaza’s CIO. "Based on our experience, implementation of Id-Guard saves security specialists time as they no longer have to spend hours sifting through video footage when investigating incidents." 50% cut in shoplifting instances According to Cristiano J S Maffessoni, the payback period for the Jockey Plaza shopping centre project is less than 3 years thanks to a 50% cut in shoplifting instances, swift resolution of crimes, and increased efficiency of security services. The return on investment for biometric systems typically spans 1 to 3 years, depending on the crime rate in the vicinity of the shopping centre. To calculate effectiveness, it is necessary to evaluate the average loss per incident, the average number of similar incidents annually, and the incident reduction rate, generally fluctuating between 30% and 70%, based on the security service's efficacy. Ready-to-use biometric solutions Our solutions allow customers to identify offenders, instantly respond to incidents, and foster loyalty" Maria Kazhuro, RecFaces' BDM in Latin America, shares, "RecFaces has developed two lines of ready-to-use biometric solutions specifically designed for the security and retail sectors." "We've seen an immense demand for our ready-made solutions in Latin America, thanks to their quick and easy deployment on any equipment. Our solutions allow customers to identify offenders, instantly respond to incidents, conduct marketing research, and foster customer loyalty." Data storage method RecFaces' Id-Guard, a biometric ready-to-use solution, stores only biometric template feature vectors that cannot be reconstructed into facial images in its database. This data storage method adheres to international GDPR data protection regulations and is supplemented by AES-256 standard encryption mechanisms for critical data.
A town in Arunachal Pradesh becomes a ‘Smart City’ with AI-powered Videonetics Solution. A smart, resilient, and unified solution enables public safety, asset security and traffic management for the city. The customer One of the prominent towns in Arunachal Pradesh, India, made it into the Government of India’s Smart Cities Mission development scheme with a vision of building a well-managed clean, green, and environment-friendly city. This city is envisioned to possess a character of its own, defined by scenic beauty, intellectual capital, and eco-friendly tourism through sustained economic growth for all its citizens. The target is to create a replicable role model that can act like a lighthouse to other aspiring towns of Arunachal Pradesh. Challenges Over the past few years, the town has witnessed a high influx of students, visitors and tourists The town is fast becoming a bustling tourist attraction in Arunachal Pradesh. Before this, the town had a limited deployment of CCTV cameras, and the system was not well suited to even conduct any investigations if an unwanted incident were to happen. Over the past few years, the town has witnessed a high influx of students, visitors and tourists. Understandably, infrastructure has also shown rapid growth, and hence local authorities understood the need to address concerns of vigilance, traffic, municipality, assets protection and safety of the citizens. Solution The official body formed to execute the vision of a safe city wanted to implement a comprehensive surveillance solution to monitor law and order situations, road safety, identify miscreants, protect public and private properties, and improve urban amenities. A project team comprising officials of the governing body, Videonetics, and system integration partners, carried out extensive research to identify important spots around the town and prepared a comprehensive surveillance strategy. Videonetics designed a versatile and unified solution that includes Intelligent Video Management System (IVMS 3.0), AI-powered Video Analytics, Automatic Licence Plate Recognition (ALPR) System and Face Recognition System (FRS). 24x7 Geo-situational awareness and accelerating response time: Operators in the command and control centre monitor over 180+ locations across the town with Videonetics Intelligent VMS using multi-layer GIS maps for a clear view of cameras spread across the geography. This covers areas like government establishments, public areas, airports, railway stations, schools, parks, markets and roads. Suspect tracking and face recognition: The city deployed network cameras to process video streams with the Face Recognition application (MeraFace™) at city entry-exit points and other public areas. The forensic investigation features of the application also help in a quick search for evidence and identifying suspects during investigations. AI-powered video analytics for the safety and security of people and assets: Artificial Intelligence powered video analytics has been deployed strategically across various facilities throughout the city while keeping in mind the requirements specific to each site. Line crossing detection is deployed along perimeters of correctional facilities to detect intrusion. Face recognition application is also used at entry-exit gates to recognise faces in live video streams. ‘Unattended Object Detection’ use case has also been applied to identify objects that can pose a security threat. Fire and smoke detection has been deployed at the airport and road intersections across the city to detect fire and smoke caused by accidents. Parks and gardens are being monitored to detect people collapsing. Face recognition is also being used to identify people. Crowd formation and estimation has been put to use in public areas like hospitals and VIP hotspots to manage crowd efficiently. To keep the city clean, the municipality body is using AI-powered Video Analytics to detect the overflow of garbage bins installed at all garbage collection centres. Also, to keep a constant track of the timely collection of garbage and identify people violating guidelines and penalise them, the face recognition system has been deployed as well. To protect various government buildings and schools, ‘Vandalism and Graffiti Detection’ use cases have been deployed, along with the face recognition system to identify frequent perpetrators and alert the authority for timely action. In the quest for maintaining the environment and air quality, authorities are using AI-powered Video Analytics to ‘Detect Polluting Vehicles’ in real-time. Accessing vehicle details with ease: Videonetics’ Vehicle Licence Plate Recognition (ANPR or ALPR) application is deployed across 34 locations such as inter-city roads, intersections, entry-exit points of the city and highways. This is done to capture and record the licence plate of any vehicle class and store them in the database for any future investigations. ANPR also supports city officials in identifying suspicious or wanted vehicles or non-standardised number plates in real-time and alert police officials on time. It has been quite helpful in solving cases of ‘stolen’ vehicles in the city. Impact The town has become a shining beacon emblematic of the concept of a truly safe and smart city, as the unified video management platform of Videonetics has successfully provided tools to multiple agencies to solve real challenges beyond the basic need of monitoring for security purposes. Here is a quick summary of the derived benefits of the end-to-end solution: Active monitoring round-the-clock, in-built Video Analytics, ANPR, and facial recognition system has helped law enforcement authorities to manage traffic efficiently, enhance safety for citizens, and protect local businesses and city infrastructure. Working with city administration, control room operators can switch between video feeds using dynamic maps that empower them to obtain critical event information and manage emergencies by alerting stakeholders for quick action. And when necessary, the Videonetics solution makes it possible to share forensic videos across departments, facilitating more collaborative and successful response efforts. On the traffic front, operators gain vital statistical insights into traffic flow across the city that helps in pre-emptive planning to reduce congestion. The authorities also get alerts when there is a hot listed vehicle spotted. Face Recognition System (MeraFace™) has proven to be a watchful eye in identifying people of interest, suspects, criminals and trespassers, and alert teams for faster response and intervention to curtail threats The open and modular architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust but also integrates the city surveillance system in a single unified interface to address overall security concerns with a holistic approach.
MVM is a nationally-owned energy group with a mission to provide affordable and clean energy. Its portfolio covers the total domestic energy system in Hungary, where it is the dominant electricity wholesale trader; and it also operates in Austria, the Czech Republic, Croatia, Slovakia, Romania, and other parts of Europe. It is actively increasing its presence in regional markets, as well as expanding into areas of sustainable energy including solar power, hydropower, and natural nuclear. Electricity generation by the MVM Group is already about 83% carbon neutral. Challenge MVM had 14 photovoltaic power plants that needed to be protected in high-residential areas while protecting the privacy of neighbouring residents. Because of their locations, these sites were at high risk of vandalism, trespass, and theft of equipment. Also due to the adjacent residential settings, traditional security technology such as fence detection and outdoor visual CCTV could not be used. Solution: Thermal and PTZ cameras Protecting the privacy of neighbouring residents The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T The MVM security team turned to Hanwha Vision for its thermal cameras, as a way to protect its high-value photovoltaic assets, while adhering to GDPR and protecting personal privacy. Over 100 thermal cameras were installed along with PTZ cameras with a handover function. The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T. Good features and reasonable pricing “Hanwha Vision has a very balanced product line with good features and reasonable pricing,” explained Tamás Tánczos, Security Engineering at MVM, adding “It was a natural choice when we realised that on these sites we couldn’t use fence protection, infrared, or microwaves to detect intruders. With the thermal cameras, we could rest assured that no personal data would be gathered.” Results Motion detection The thermal cameras help MVM protect its photovoltaic sites without compromising neighbouring residents’ privacy. They come equipped with Motion detection, Handover, Tampering, Loitering, Directional detection, and Audio detection features built-in to boost operators’ situational awareness. The TNO-4040T and TNO-4050T can additionally detect changes in temperature, such as a potential fire, and shock detection, which could indicate displacement or hard blows to the device. Intelligent video analytics While the camera is constantly scanning for potential intrusion and motion detection, operators can continue to work on other activities with alerts issued for any events that need their response. This makes the system more intelligent and efficient compared to traditional fence detection or basic CCTV cameras. Visibility Because the cameras work through thermal imaging, they are not affected by low light levels or visibility, so inclement weather doesn’t impact their effectiveness. Operators consistently receive good images and resolutions no matter the environmental conditions. Further expansion planned The project initially involved 14 sites but as the effectiveness and benefits of the Wisenet cameras are proven, this is expanding to other sites in MVM’s portfolio. The team is also considering adding thermal cameras with built-in AI due to launch soon.
Round table discussion
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Products
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download