Green security
Camden Door Controls is proud to announce the launch of its new 1420 Series Low-Profile Fire-Rated Strike, designed to provide a cost-effective solution for code compliance in UL fire-rated doors and frames with cylindrical locksets. Built to the highest industry standards, the CX-ED1420 strikes are Grade 1 ANSI fire-rated and engineered for 1/2” to 5/8” latch projection. CX-ED1420 Series features They offer exceptional durability with 1,500 lbs static strength and are factory-tes...
Robotic Assistance Devices Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., has secured the deployment of two ROSA-P 360 devices through a proactive engagement with a prominent municipal Business Improvement District. The units are being deployed to enhance safety and visibility across key public spaces managed by the local community improvement organisation. This strategic placement reflects RAD’s growing influence in urban safety initia...
Allegion US, a major provider of security solutions, technology and services, is thrilled to announce its participation in the Data Center World Conference 2025, taking place from April 14-17, 2025 in Washington, DC, at the Walter E. Washington Convention Center. The event will gather more than 400 industry experts from around the globe, and Allegion is poised to make a significant impact with its dedicated team of data centre experts. Allegion to exhibit at Data Center World Conference 2025...
Trusted Connectivity Alliance (TCA) has released Version 3.4 of its eUICC Profile Package: Interoperable Format Technical Specification (Interoperable Profile Package Specification). The latest version includes major updates to support full alignment with 3GPP Release 18 to enable advanced 5G functionality and secure authentication in 5G network slicing, as well as enabling the remote management of eSIM profiles on low-power and network-constrained devices. Interoperable connectivity...
Modern measurement technologies enable high-precision detection of the movement of liquids and gases - and thus provide valuable data for numerous applications. How does the air flow around an aeroplane? How does the blood move through our veins? And how can pollutant emissions in combustion processes be minimised? For this purpose, speed, direction, pressure and turbulence within a flow are analysed in order to increase efficiency, ensure safety and drive innovation in a wide variety of areas....
ASSA ABLOY Opening Solutions will showcase a comprehensive range of access solutions designed to enhance security, convenience, and peace of mind at ISC West, the security industry’s premier international tradeshow. Visit Booth #8061 at ISC West 2025 to explore the latest advancements in comprehensive door security and access control and discuss the real-world challenges with the ASSA ABLOY team of experts. How technologies can transform security “Our mission is to empo...
News
HID, a pioneer in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader at ISC West, an ultra-compact and cable-free RFID reader for mobile use cases. This reader is a game-changer for organisations looking for seamless and secure authentication using a single credential across physical and digital environments. USB-C interface and MFA for security Designed with convenience and security in mind, it fits in a pocket or bag and is ideal for remote workers and field workforces to securely access business systems, applications and networks. OMNIKEY SE Plug offers multi-device compatibility—working with laptops, tablets and smartphones using a USB-C interface and multi-factor authentication (MFA) for enhanced security against phishing and credential theft. Securely access databases Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments —from healthcare facilities providing passwordless authentication anywhere, anytime, to electronic health records, to law enforcement agencies enabling officers in the field to securely access databases or criminal records while on patrol. “With OMNIKEY SE Plug we are taking convenience and security to the next level in today’s connected workplaces,” explains Thierry Roz, managing director, Extended Access Technologies RFID Business Unit at HID. “With hybrid work becoming the norm and mobile devices expanding, organisations need seamless, secure, and scalable authentication solutions to help their mobile employees perform their tasks onsite or on the go.” HID OMNIKEY SE Plug Benefits Superior Security and Compliance: The OMNIKEY SE Plug supports FIDO2, multi-factor authentication (MFA), and various credential formats, ensuring a highly secure, passwordless authentication experience. Additionally, it meets stringent cybersecurity regulations and high-security standards, making it ideal for organisations that require enhanced data protection and regulatory compliance. Seamless Integration Across Systems: With desktop and embedded models, organisations can effortlessly connect authentication to their existing infrastructure—delivering a fully integrated security ecosystem. Plug-and-Play Simplicity: Designed for ease of deployment, this solution requires no additional drivers. Employees can instantly authenticate across multiple devices without complex setup, ensuring a frictionless user experience. Mobility-Friendly Reader: Its compact, USB-C-key design is the ideal companion for remote, mobile, and hybrid employees. Whether accessing secure databases from home, logging into a corporate shared workstation, or authenticating at a POS terminal, users benefit from a portable, hassle-free authentication tool that travels with them. The new OMNIKEY SE Plug Reader is debuting at ISC West 2025, booth #8053.
HID, a pioneer in trusted identity and access control solutions, debuts its latest innovations at ISC West 2025. As the industry accelerates its shift toward mobile-first and seamless security integrations, HID has been working on solutions to create smoother and more secure access across touchpoints—from entryways to internal systems—optimising workflows and minimising disruptions. Integrated security ecosystems “HID is at the forefront of driving a world of seamless security, combining our deep expertise with continuous innovation to meet the evolving needs of modern access control and identification,” said Ramesh Songukrishnasamy, senior vice president and chief technology officer at HID. “As organisations embrace mobile-first solutions and integrated security ecosystems, HID remains committed to delivering cutting-edge technologies that streamline access, enhance user experiences, and reinforce security and secure identity at every touchpoint.” Future of secure identity and access control Visit HID at booth #8053 and Mercury™ at booth #27109, where attendees will have the opportunity to experience this shift firsthand, and see the future of secure identity and access control in action: HID Signo™ Readers: Versatile, Secure, and Future-Ready Reader, a multi-factor authentication key meeting FIPS-201 compliance and NIST 800-116 guidelines The flagship HID Signo Readers offer unparalleled versatility, supporting a broad range of credential technologies—including cards, fobs, digital wallets, and government-issued credentials like PIV, CAC, and TWIC. Designed for modern workplaces and high-security environments, the portfolio now includes the new HID Signo PIV Contact Reader, a multi-factor authentication solution meeting FIPS-201 compliance and NIST 800-116 guidelines. When integrated with Mercury MP4502 controllers, it delivers high-assurance security for U.S. Federal Government entities and organisations managing single facilities or global networks. New! Mercury Embedded Application Environment: Scalable, Interoperable, and Empowering The Mercury embedded application environment is an open platform that enables OEMs and technology partners to develop and deploy custom applications directly on Mercury MP Controllers. Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge, reducing latency, increasing availability and enhancing system redundancy. New! HID Integration Service: Streamlined Connectivity and Enhanced Interoperability This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators, and software vendors to seamlessly and rapidly integrate essential physical security solutions, solving the industry-wide struggle with managing third-party integrations. New! OMNIKEY SE Plug Reader OMNIKEY SE Plug supports passkeys and other MFA methods for enhanced security Revolutionise logical access with a cable-free reader that provides secure, passwordless authentication for mobile professionals. Ideal for hybrid workplaces (like healthcare, retail, law enforcement and other enterprise environments), it ensures your workforce has seamless access to corporate resources from any location – whether in the field, while working remote or when travelling. This versatile reader offers multi-device compatibility — working effortlessly with smartphones, tablets and laptops using a USB-C interface. OMNIKEY SE Plug supports passkeys and other multi-factor authentication (MFA) methods for enhanced security against phishing and credential theft. HID Mobile Access: The Future of Secure, Contactless Authentication HID Mobile Access solutions leverage smartphones and wearables for secure, convenient and touchless authentication, making them ideal for any environment where access control is needed, including workplaces, universities, commercial real estate, financial institutions and more. Streamline management with the HID Origo™ portal, centralising user management and integrating seamlessly with access control systems. Reduce the need for physical encoding, printing, and returns, and embrace a future where access control is simple and efficient. HID Linq™: Smart Device Management and Real-Time Insights HID Linq tool provides real-time device state reporting and remote configuration HID will demonstrate the powerful HID Linq tool platform, designed for seamless device management through Mercury controllers and HID Signo readers. The HID Linq tool provides real-time device state reporting, remote configuration and adjustments capability, as well as seamless firmware updates. HID FARGO HPD5000e printer: High-quality, Personalised Retransfer Technology Making its ISC West debut, the printer was engineered for universities, medium-to-large businesses, healthcare facilities and government agencies who need retransfer printing technology to effectively personalise contactless cards and for any organisation looking to switch from a higher-end, direct-to-card printer to a retransfer printing solution for improved image quality. HID four speaking sessions Additionally, HID will showcase its industry leadership through participation in four speaking sessions, highlighting the expertise of its thought pioneers: The Impact of Identity on the Physical and Digital Access Landscape – April 1, 10 a.m. PST Security Women Actively Supporting Women – How to Develop and Enhance Employee Resource Groups Focused on Women – April 2, 2:15 p.m. PST Retrospective/Future: What Does the Security Experience for Today’s Younger Generation Mean for the Future? April 2, 11:15 a.m. PST Optimising the Future of Workplace Experience – April 1, 1 p.m. PST
Johnson Controls, the pioneer for smart, safe, healthy and sustainable buildings, is excited to reveal new products and solutions across its industry-pioneering security portfolio at Booth 18033 at ISC West in Las Vegas, March 31-April 4. The company will highlight how its breadth of offerings and products enhance safety, improve automation and advance real-time situational awareness for customers. Integrated solutions “As security threats grow more complex, organisations need intelligent, integrated solutions that enhance both protection and efficiency,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “Through AI-driven automation, edge-based analytics, and industry-pioneering intelligence, we are delivering security technologies to customers that strengthen security operations and help businesses make more informed decisions that go beyond security.” Data-driven decisions Johnson Controls is driving advancements to help customers streamline operations Johnson Controls is driving advancements to help customers streamline operations and make data-driven decisions in real-time, a critical upgrade for many customers. For example, according to a study by Forrester Consulting, 70% of respondents believed that optimised, real-time alerting would have helped them significantly or totally reduced the harm of the most serious or disruptive events their organisation faced. Latest advancements in access control and video surveillance “At Johnson Controls, we are committed to empowering enterprises with intelligent, seamless and proactive security solutions,” said Greg Parker, global vice president, lifecycle solutions, Building Solutions North America at Johnson Controls. “By listening to our customers and fostering strategic collaborations, we continue to innovate with integrated offerings that can simplify security operations without sacrificing safety. From building out security and fire solutions to meet the specific needs of non-acute healthcare and correctional facilities to our latest advancements in access control and video surveillance, we’re delivering smarter, more resilient, and cost-effective security solutions that help organisations protect what matters most, across industries.” Security products, solutions and services At ISC West 2025, Johnson Controls will showcase its comprehensive security products, solutions and services, designed for fully integrated, intelligent and automated enterprise security platforms. Products/solutions: Software House C•CURE IQ 3.10 includes powerful new features such as seamless indoor/outdoor maps, enhanced videoclip management features and a new set of dashboards as part of the Security Intelligence suite. This will significantly increase prioritised security focus and response by unifying access control and video surveillance workflows. Software House iSTAR G2 controllers are revamped to support more doors per panel with up to 8 readers and 1 million cardholders and are now OSDP-verified, with the portfolio of OSDP-supporting products extending through to a new family of industry-first OSDP Input/Output modules for unmatched protection with OSDP end-to-end encryption. End-to-End Security Solution with Kantech, Exacq, DSC and Illustra brings together four systems into a seamlessly integrated platform: Kantech Access Control, Exacq Video Management, DSC Intrusion Detection and Illustra Cameras. The technologies combine to provide a unified, interoperable and scalable security ecosystem for commercial and enterprise applications. PowerG + elevates the reliable, field-proven PowerG control panel and sensor technology to the next level and maintains its status of having the longest range on the market. IQ Panel 5, the newest iteration of the IQ Panel, introduces trailblazing control panel capabilities, future-ready updates, and the pioneering wireless connectivity of PowerG +. Attendees will also see expanded comprehensive life safety solutions for non-acute healthcare and correctional facilities. Collaborations: New offering with Threat Extinguisher to help ensure peace of mind in health care, education, government settings and more with an easy-to-use, non-lethal defense solution to neutralise security threats. New initiative with Gallagher Security, a pioneer in integrated technology solutions, to deliver industry-specific solutions that help customers safeguard their people, assets and operations. Johnson Controls legacy of innovation Johnson Controls proudly celebrates its 140th anniversary in 2025, commemorating a remarkable legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. Since the invention of the first thermostat, the company has led the way with more than 8,000 active patents and $3 billion invested in engineering, research & development over the past decade. Johnson Controls continues to redefine building performance, driving the next era of smart, sustainable and autonomous buildings, transforming industries and powering its customers’ missions.
Bugcrowd, a pioneer in crowdsourced cybersecurity, announced the availability of its new Managed Service Provider (MSP) offering. This service is designed to help MSPs efficiently address the backlog of compliance-related pentests. By providing a standardised and scalable solution, with streamlined scoping, Bugcrowd's MSP offering empowers small to midsize businesses to meet their compliance requirements without delay. Bugcrowd's mission for MSPs The service leverages the unique and extensive pen testing expertise of The Crowd The service leverages the unique and extensive pen testing expertise of The Crowd (also known as ethical hackers) to deliver a reliable and efficient way for MSPs to enhance their capabilities and offer new, best-in-class services to their clients. This launch marks a significant step forward in Bugcrowd's mission to broaden support for MSPs and their customers. Bugcrowd's security threats "Bugcrowd's new MSP offering is a game-changer for our partners and an important step for our program," said Jacques Lopez, VP, Global Channel & Alliances, Bugcrowd. "By leveraging our crowdsourced streamlined-scope pentesting capabilities, MSPs can offer their clients fast, reliable, and cost-effective compliance testing. This enables those clients to stay ahead of regulatory requirements and security threats, while their systems are secure and compliant. This offering can augment the capabilities of those partners who already provide pentesting, enabling them to reserve their in-house pentesters for projects they are best suited for while Bugcrowd handles more routine projects.” Bugcrowd’s best-in-class pentesting capabilities The new offering helps MSPs support skill gaps within their practices, provides co-branding with Bugcrowd’s best-in-class pentesting capabilities, and offers attractive revenue opportunities for interested partners. Key capabilities include: Comprehensive Services: MSP Pentesting capabilities include networking, API’s, web, mobile apps, and cloud configuration testing. Standardised Delivery: Managed by Bugcrowd, the program methodology consistently provides a reliable and standardised approach to pentesting. Short Stand-up Time: Partners can launch engagements in as little as three business days, ensuring rapid response times for urgent compliance needs. RapidRevenue: Partners can benefit from faster revenue recognition through faster initiation of engagements, making it financially advantageous for MSPs. Powered by Bugcrowd: Partners not only enhance their service portfolio but also instil confidence in their clients by leveraging Bugcrowd's industry-pioneering expertise in cybersecurity. Expand into other Bugcrowd offerings: Crowdsourced offerings like Bug Bounty, Vulnerability Disclosure Programs, Attack Surface Management, and more are available for traditional resale. Bugcrowd’s service "SMBs often struggle to employ the services they need to meet compliance requirements. Bugcrowd’s service not only enhances our ability to deliver high-quality compliance testing to our clients but also helps us scale our operations and meet the growing demand for pentesting services," said Mitch Evans, Director, Cybersecurity Consulting at BARR Advisory. "We are thrilled to work with Bugcrowd on deploying this service and look forward to new and existing clients benefiting from these trusted capabilities." The new MSP offering is available immediately to a limited number of partners. Pricing is based on a flat rate model, with various options depending on the scope of the pentesting required.
Quanergy Solutions, Inc., the pioneer in high-performance 3D LiDAR security and smart space solutions, is showcasing its comprehensive portfolio of hardware and software solutions for both outdoor and indoor applications at ISC West 2025 booth #29081. Featured products include: Q-Track 2.4 software with powerful AI-driven insights; Q-Track LR for long range intrusion detection and perimeter protection; Q-Track HD for optimal detection, tracking and classification in challenging environments like airport terminals, retail stores and office buildings; and Q-Track Dome to track and classify people in smaller and more complex environments, such as corridors, mantraps, and line queues. Quanergy’s 3D LiDAR solution “Quanergy’s uniquely integrated hardware and software 3D LiDAR solution delivers a new dimension of precise, real-time 3D spatial intelligence that seamlessly extends the reach of existing video systems with the most accurate object identification, classification and tracking solution available in any environment,” said Gerald Becker, VP of Market Development & Alliances at Quanergy Solutions, Inc. “This unified approach provides security integrators and end users with a robust platform for enhanced security and business intelligence.” Quanergy’s line of outdoor and indoor 3D LiDAR sensors Q-Track 2.4 software delivers intelligent 3D LiDAR processing that enhances security and smart space analytics Q-Track 2.4 software delivers intelligent 3D LiDAR processing that enhances security and smart space analytics with powerful AI-driven insights across Quanergy’s line of outdoor and indoor 3D LiDAR sensors. This latest software update introduces sophisticated algorithms that enable hyper-accurate continuous object tracking while achieving an impressive 95% reduction in false alarms. The refined perception technology optimises performance across security and crowd management applications, significantly lowering the total cost of ownership for end users. Key features of Q-Track 2.4 Advanced AI-Powered Algorithms: Provides instant alerts for unauthorised access, perimeter breaches, tailgating, and suspicious movement patterns. Enhanced Crowd Behaviour Analytics: Enables detailed people movement analysis for optimised foot traffic management in high-density environments. Seamless Multi-Sensor Fusion: Integrates multiple 3D LiDAR units into a unified system for comprehensive security coverage. Optimised Indoor and Outdoor Performance: Adaptive calibration algorithms ensure smooth operation in varied lighting and weather conditions. Simplified Deployment: User-friendly semi-automatic floor alignment and improved calibration tools streamline installation and operation. Quanergy’s lineup of 3D LiDAR sensors Q-Track LR is purpose-built for long-range perimeter intrusion and object detection in expansive outdoor environments such as critical infrastructures, data centres, commercial sites, and transportation hubs. With its extended range and 360-degree horizontal field of view, Q-Track LR can monitor vast perimeters, accurately identifying and tracking potential intrusions or objects over considerable distances, even in low-visibility conditions. Integrated into a meshed network, multiple Q-Track LR units provide seamless coverage, ensuring that assets and sensitive areas are secured against unauthorised access and potential threats. Q-Track HD is designed to provide optimal tracking and classification in challenging environments, such as airport terminals, retail stores and office buildings. With its 360-degree horizontal field of view and very wide vertical field of view, a meshed network of Q-Track HD’s can accurately track over 1000 people simultaneously, while they walk around obstructions such as line queues, columns, shelves, desks, etc. Q-Track Dome is designed to track and classify people in even smaller and more complex environments, such as corridors, mantraps, and line queues with a 90-degree vertical field of view. This sensor is optimised for dense areas, offering unmatched performance and reliability for object tracking and crowd intelligence gathering applications. Range of 3D LiDAR solutions ISC West 2025 attendees are invited to visit Quanergy Solutions at stand #29081 for live demonstrations of the company’s complete range of 3D LiDAR solutions. Quanergy will also be showcasing its integration with Avigilon Unity at the Motorola Solutions booth #14059 on April 4 between 10:00 a.m. and 12:20 p.m.
Hanwha Vision, a pioneer in security and surveillance solutions, introduces the TNO-A26081, an ultra-high-resolution AI-powered camera designed to deliver unmatched imaging clarity and powerful analytical capabilities. With 26MP resolution at 30 frames per second, this camera captures every detail, making it ideal for large-area surveillance and high-security environments. Furthermore, its AI features ensure precise object detection, improved operational efficiency, and seamless integration into modern surveillance systems. Crystal-clear view and versatile AI-based analytics provide business intelligence abilities, including people and vehicle counting The TNO-A26081's 26MP resolution offers a level of detail surpassing 4K cameras, ensuring that even the smallest details are captured in real time. Ideal for stadiums and arenas, this camera addresses critical safety and crowd control needs. Its AI-based analytics provide business intelligence capabilities, including people and vehicle counting, queue management, and heat mapping, helping users manage events more efficiently. Whether operators are monitoring large outdoor areas, parking lots, or high-traffic locations, this camera provides crystal-clear images that ensure no detail is missed. Essential for security and operational efficiency With its high sensitivity, the TNO-A26081 is also perfect for critical surveillance points, such as airports, seaports, and manufacturing sites, where capturing fine details can be essential for security and operational efficiency. The model is equipped with a built-in zoom lens (55-250mm), for a versatile field of view that allows users to zoom in on distant subjects while capturing wide areas with ease. Its adjustable field of view is ideal for large outdoor spaces, enabling detailed surveillance without the need for multiple cameras. Powerful AI analytics With AI-based motion detection, the camera reduces false alarms by distinguishing between human movement, animals, and other motion, for example swaying trees or shadows, ensuring only relevant events are flagged to operators. The WiseAI app, pre-installed on this camera, includes advanced object attribute extraction capabilities, recognising identifiers such as clothing colour (upper/lower), and whether a person is wearing a mask or glasses. For vehicles, it detects type (car, truck, bus, motorcycle, bicycle) and colour, enhancing forensic investigations and enabling precise monitoring. Complementary AI pack licences Camera’s abilities can be further enhanced with one of two complementary AI pack licences Furthermore, the camera’s capabilities can be further enhanced with one of two complementary AI pack licences, designed for traffic or industrial applications, to offer tailored analytics that bolster operations. Blocked exit detection, slip and fall detection, and forklift detection, are examples of key features that can be found across the packs. Excelling in low-light, harsh conditions Equipped with an APS-C CMOS sensor, the TNO-A26081 excels in low-light conditions, ensuring clear images day and night. Its superior low-light capabilities allow for continuous surveillance even in challenging lighting environments. This ensures that security teams can rely on the camera to deliver consistent and high-quality footage, regardless of the time of day or lighting conditions. The model is built to withstand all manner of environments. Its robust design, including IP67-rated weather-proofing and IK10 impact resistance, plus an expansive operating temperature of −40°C to 55°C, ensures that the camera can function reliably in extreme conditions, whether it is mounted outdoors in harsh weather or in high-traffic areas prone to physical impact.
HID, a pioneer in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader at ISC West, an ultra-compact and cable-free RFID reader for mobile use cases. This reader is a game-changer for organisations looking for seamless and secure authentication using a single credential across physical and digital environments. USB-C interface and MFA for security Designed with convenience and security in mind, it fits in a pocket or bag and is ideal for remote workers and field workforces to securely access business systems, applications and networks. OMNIKEY SE Plug offers multi-device compatibility—working with laptops, tablets and smartphones using a USB-C interface and multi-factor authentication (MFA) for enhanced security against phishing and credential theft. Securely access databases Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments —from healthcare facilities providing passwordless authentication anywhere, anytime, to electronic health records, to law enforcement agencies enabling officers in the field to securely access databases or criminal records while on patrol. “With OMNIKEY SE Plug we are taking convenience and security to the next level in today’s connected workplaces,” explains Thierry Roz, managing director, Extended Access Technologies RFID Business Unit at HID. “With hybrid work becoming the norm and mobile devices expanding, organisations need seamless, secure, and scalable authentication solutions to help their mobile employees perform their tasks onsite or on the go.” HID OMNIKEY SE Plug Benefits Superior Security and Compliance: The OMNIKEY SE Plug supports FIDO2, multi-factor authentication (MFA), and various credential formats, ensuring a highly secure, passwordless authentication experience. Additionally, it meets stringent cybersecurity regulations and high-security standards, making it ideal for organisations that require enhanced data protection and regulatory compliance. Seamless Integration Across Systems: With desktop and embedded models, organisations can effortlessly connect authentication to their existing infrastructure—delivering a fully integrated security ecosystem. Plug-and-Play Simplicity: Designed for ease of deployment, this solution requires no additional drivers. Employees can instantly authenticate across multiple devices without complex setup, ensuring a frictionless user experience. Mobility-Friendly Reader: Its compact, USB-C-key design is the ideal companion for remote, mobile, and hybrid employees. Whether accessing secure databases from home, logging into a corporate shared workstation, or authenticating at a POS terminal, users benefit from a portable, hassle-free authentication tool that travels with them. The new OMNIKEY SE Plug Reader is debuting at ISC West 2025, booth #8053.
HID, a pioneer in trusted identity and access control solutions, debuts its latest innovations at ISC West 2025. As the industry accelerates its shift toward mobile-first and seamless security integrations, HID has been working on solutions to create smoother and more secure access across touchpoints—from entryways to internal systems—optimising workflows and minimising disruptions. Integrated security ecosystems “HID is at the forefront of driving a world of seamless security, combining our deep expertise with continuous innovation to meet the evolving needs of modern access control and identification,” said Ramesh Songukrishnasamy, senior vice president and chief technology officer at HID. “As organisations embrace mobile-first solutions and integrated security ecosystems, HID remains committed to delivering cutting-edge technologies that streamline access, enhance user experiences, and reinforce security and secure identity at every touchpoint.” Future of secure identity and access control Visit HID at booth #8053 and Mercury™ at booth #27109, where attendees will have the opportunity to experience this shift firsthand, and see the future of secure identity and access control in action: HID Signo™ Readers: Versatile, Secure, and Future-Ready Reader, a multi-factor authentication key meeting FIPS-201 compliance and NIST 800-116 guidelines The flagship HID Signo Readers offer unparalleled versatility, supporting a broad range of credential technologies—including cards, fobs, digital wallets, and government-issued credentials like PIV, CAC, and TWIC. Designed for modern workplaces and high-security environments, the portfolio now includes the new HID Signo PIV Contact Reader, a multi-factor authentication solution meeting FIPS-201 compliance and NIST 800-116 guidelines. When integrated with Mercury MP4502 controllers, it delivers high-assurance security for U.S. Federal Government entities and organisations managing single facilities or global networks. New! Mercury Embedded Application Environment: Scalable, Interoperable, and Empowering The Mercury embedded application environment is an open platform that enables OEMs and technology partners to develop and deploy custom applications directly on Mercury MP Controllers. Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge, reducing latency, increasing availability and enhancing system redundancy. New! HID Integration Service: Streamlined Connectivity and Enhanced Interoperability This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators, and software vendors to seamlessly and rapidly integrate essential physical security solutions, solving the industry-wide struggle with managing third-party integrations. New! OMNIKEY SE Plug Reader OMNIKEY SE Plug supports passkeys and other MFA methods for enhanced security Revolutionise logical access with a cable-free reader that provides secure, passwordless authentication for mobile professionals. Ideal for hybrid workplaces (like healthcare, retail, law enforcement and other enterprise environments), it ensures your workforce has seamless access to corporate resources from any location – whether in the field, while working remote or when travelling. This versatile reader offers multi-device compatibility — working effortlessly with smartphones, tablets and laptops using a USB-C interface. OMNIKEY SE Plug supports passkeys and other multi-factor authentication (MFA) methods for enhanced security against phishing and credential theft. HID Mobile Access: The Future of Secure, Contactless Authentication HID Mobile Access solutions leverage smartphones and wearables for secure, convenient and touchless authentication, making them ideal for any environment where access control is needed, including workplaces, universities, commercial real estate, financial institutions and more. Streamline management with the HID Origo™ portal, centralising user management and integrating seamlessly with access control systems. Reduce the need for physical encoding, printing, and returns, and embrace a future where access control is simple and efficient. HID Linq™: Smart Device Management and Real-Time Insights HID Linq tool provides real-time device state reporting and remote configuration HID will demonstrate the powerful HID Linq tool platform, designed for seamless device management through Mercury controllers and HID Signo readers. The HID Linq tool provides real-time device state reporting, remote configuration and adjustments capability, as well as seamless firmware updates. HID FARGO HPD5000e printer: High-quality, Personalised Retransfer Technology Making its ISC West debut, the printer was engineered for universities, medium-to-large businesses, healthcare facilities and government agencies who need retransfer printing technology to effectively personalise contactless cards and for any organisation looking to switch from a higher-end, direct-to-card printer to a retransfer printing solution for improved image quality. HID four speaking sessions Additionally, HID will showcase its industry leadership through participation in four speaking sessions, highlighting the expertise of its thought pioneers: The Impact of Identity on the Physical and Digital Access Landscape – April 1, 10 a.m. PST Security Women Actively Supporting Women – How to Develop and Enhance Employee Resource Groups Focused on Women – April 2, 2:15 p.m. PST Retrospective/Future: What Does the Security Experience for Today’s Younger Generation Mean for the Future? April 2, 11:15 a.m. PST Optimising the Future of Workplace Experience – April 1, 1 p.m. PST
Johnson Controls, the pioneer for smart, safe, healthy and sustainable buildings, is excited to reveal new products and solutions across its industry-pioneering security portfolio at Booth 18033 at ISC West in Las Vegas, March 31-April 4. The company will highlight how its breadth of offerings and products enhance safety, improve automation and advance real-time situational awareness for customers. Integrated solutions “As security threats grow more complex, organisations need intelligent, integrated solutions that enhance both protection and efficiency,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “Through AI-driven automation, edge-based analytics, and industry-pioneering intelligence, we are delivering security technologies to customers that strengthen security operations and help businesses make more informed decisions that go beyond security.” Data-driven decisions Johnson Controls is driving advancements to help customers streamline operations Johnson Controls is driving advancements to help customers streamline operations and make data-driven decisions in real-time, a critical upgrade for many customers. For example, according to a study by Forrester Consulting, 70% of respondents believed that optimised, real-time alerting would have helped them significantly or totally reduced the harm of the most serious or disruptive events their organisation faced. Latest advancements in access control and video surveillance “At Johnson Controls, we are committed to empowering enterprises with intelligent, seamless and proactive security solutions,” said Greg Parker, global vice president, lifecycle solutions, Building Solutions North America at Johnson Controls. “By listening to our customers and fostering strategic collaborations, we continue to innovate with integrated offerings that can simplify security operations without sacrificing safety. From building out security and fire solutions to meet the specific needs of non-acute healthcare and correctional facilities to our latest advancements in access control and video surveillance, we’re delivering smarter, more resilient, and cost-effective security solutions that help organisations protect what matters most, across industries.” Security products, solutions and services At ISC West 2025, Johnson Controls will showcase its comprehensive security products, solutions and services, designed for fully integrated, intelligent and automated enterprise security platforms. Products/solutions: Software House C•CURE IQ 3.10 includes powerful new features such as seamless indoor/outdoor maps, enhanced videoclip management features and a new set of dashboards as part of the Security Intelligence suite. This will significantly increase prioritised security focus and response by unifying access control and video surveillance workflows. Software House iSTAR G2 controllers are revamped to support more doors per panel with up to 8 readers and 1 million cardholders and are now OSDP-verified, with the portfolio of OSDP-supporting products extending through to a new family of industry-first OSDP Input/Output modules for unmatched protection with OSDP end-to-end encryption. End-to-End Security Solution with Kantech, Exacq, DSC and Illustra brings together four systems into a seamlessly integrated platform: Kantech Access Control, Exacq Video Management, DSC Intrusion Detection and Illustra Cameras. The technologies combine to provide a unified, interoperable and scalable security ecosystem for commercial and enterprise applications. PowerG + elevates the reliable, field-proven PowerG control panel and sensor technology to the next level and maintains its status of having the longest range on the market. IQ Panel 5, the newest iteration of the IQ Panel, introduces trailblazing control panel capabilities, future-ready updates, and the pioneering wireless connectivity of PowerG +. Attendees will also see expanded comprehensive life safety solutions for non-acute healthcare and correctional facilities. Collaborations: New offering with Threat Extinguisher to help ensure peace of mind in health care, education, government settings and more with an easy-to-use, non-lethal defense solution to neutralise security threats. New initiative with Gallagher Security, a pioneer in integrated technology solutions, to deliver industry-specific solutions that help customers safeguard their people, assets and operations. Johnson Controls legacy of innovation Johnson Controls proudly celebrates its 140th anniversary in 2025, commemorating a remarkable legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. Since the invention of the first thermostat, the company has led the way with more than 8,000 active patents and $3 billion invested in engineering, research & development over the past decade. Johnson Controls continues to redefine building performance, driving the next era of smart, sustainable and autonomous buildings, transforming industries and powering its customers’ missions.
Bugcrowd, a pioneer in crowdsourced cybersecurity, announced the availability of its new Managed Service Provider (MSP) offering. This service is designed to help MSPs efficiently address the backlog of compliance-related pentests. By providing a standardised and scalable solution, with streamlined scoping, Bugcrowd's MSP offering empowers small to midsize businesses to meet their compliance requirements without delay. Bugcrowd's mission for MSPs The service leverages the unique and extensive pen testing expertise of The Crowd The service leverages the unique and extensive pen testing expertise of The Crowd (also known as ethical hackers) to deliver a reliable and efficient way for MSPs to enhance their capabilities and offer new, best-in-class services to their clients. This launch marks a significant step forward in Bugcrowd's mission to broaden support for MSPs and their customers. Bugcrowd's security threats "Bugcrowd's new MSP offering is a game-changer for our partners and an important step for our program," said Jacques Lopez, VP, Global Channel & Alliances, Bugcrowd. "By leveraging our crowdsourced streamlined-scope pentesting capabilities, MSPs can offer their clients fast, reliable, and cost-effective compliance testing. This enables those clients to stay ahead of regulatory requirements and security threats, while their systems are secure and compliant. This offering can augment the capabilities of those partners who already provide pentesting, enabling them to reserve their in-house pentesters for projects they are best suited for while Bugcrowd handles more routine projects.” Bugcrowd’s best-in-class pentesting capabilities The new offering helps MSPs support skill gaps within their practices, provides co-branding with Bugcrowd’s best-in-class pentesting capabilities, and offers attractive revenue opportunities for interested partners. Key capabilities include: Comprehensive Services: MSP Pentesting capabilities include networking, API’s, web, mobile apps, and cloud configuration testing. Standardised Delivery: Managed by Bugcrowd, the program methodology consistently provides a reliable and standardised approach to pentesting. Short Stand-up Time: Partners can launch engagements in as little as three business days, ensuring rapid response times for urgent compliance needs. RapidRevenue: Partners can benefit from faster revenue recognition through faster initiation of engagements, making it financially advantageous for MSPs. Powered by Bugcrowd: Partners not only enhance their service portfolio but also instil confidence in their clients by leveraging Bugcrowd's industry-pioneering expertise in cybersecurity. Expand into other Bugcrowd offerings: Crowdsourced offerings like Bug Bounty, Vulnerability Disclosure Programs, Attack Surface Management, and more are available for traditional resale. Bugcrowd’s service "SMBs often struggle to employ the services they need to meet compliance requirements. Bugcrowd’s service not only enhances our ability to deliver high-quality compliance testing to our clients but also helps us scale our operations and meet the growing demand for pentesting services," said Mitch Evans, Director, Cybersecurity Consulting at BARR Advisory. "We are thrilled to work with Bugcrowd on deploying this service and look forward to new and existing clients benefiting from these trusted capabilities." The new MSP offering is available immediately to a limited number of partners. Pricing is based on a flat rate model, with various options depending on the scope of the pentesting required.
Quanergy Solutions, Inc., the pioneer in high-performance 3D LiDAR security and smart space solutions, is showcasing its comprehensive portfolio of hardware and software solutions for both outdoor and indoor applications at ISC West 2025 booth #29081. Featured products include: Q-Track 2.4 software with powerful AI-driven insights; Q-Track LR for long range intrusion detection and perimeter protection; Q-Track HD for optimal detection, tracking and classification in challenging environments like airport terminals, retail stores and office buildings; and Q-Track Dome to track and classify people in smaller and more complex environments, such as corridors, mantraps, and line queues. Quanergy’s 3D LiDAR solution “Quanergy’s uniquely integrated hardware and software 3D LiDAR solution delivers a new dimension of precise, real-time 3D spatial intelligence that seamlessly extends the reach of existing video systems with the most accurate object identification, classification and tracking solution available in any environment,” said Gerald Becker, VP of Market Development & Alliances at Quanergy Solutions, Inc. “This unified approach provides security integrators and end users with a robust platform for enhanced security and business intelligence.” Quanergy’s line of outdoor and indoor 3D LiDAR sensors Q-Track 2.4 software delivers intelligent 3D LiDAR processing that enhances security and smart space analytics Q-Track 2.4 software delivers intelligent 3D LiDAR processing that enhances security and smart space analytics with powerful AI-driven insights across Quanergy’s line of outdoor and indoor 3D LiDAR sensors. This latest software update introduces sophisticated algorithms that enable hyper-accurate continuous object tracking while achieving an impressive 95% reduction in false alarms. The refined perception technology optimises performance across security and crowd management applications, significantly lowering the total cost of ownership for end users. Key features of Q-Track 2.4 Advanced AI-Powered Algorithms: Provides instant alerts for unauthorised access, perimeter breaches, tailgating, and suspicious movement patterns. Enhanced Crowd Behaviour Analytics: Enables detailed people movement analysis for optimised foot traffic management in high-density environments. Seamless Multi-Sensor Fusion: Integrates multiple 3D LiDAR units into a unified system for comprehensive security coverage. Optimised Indoor and Outdoor Performance: Adaptive calibration algorithms ensure smooth operation in varied lighting and weather conditions. Simplified Deployment: User-friendly semi-automatic floor alignment and improved calibration tools streamline installation and operation. Quanergy’s lineup of 3D LiDAR sensors Q-Track LR is purpose-built for long-range perimeter intrusion and object detection in expansive outdoor environments such as critical infrastructures, data centres, commercial sites, and transportation hubs. With its extended range and 360-degree horizontal field of view, Q-Track LR can monitor vast perimeters, accurately identifying and tracking potential intrusions or objects over considerable distances, even in low-visibility conditions. Integrated into a meshed network, multiple Q-Track LR units provide seamless coverage, ensuring that assets and sensitive areas are secured against unauthorised access and potential threats. Q-Track HD is designed to provide optimal tracking and classification in challenging environments, such as airport terminals, retail stores and office buildings. With its 360-degree horizontal field of view and very wide vertical field of view, a meshed network of Q-Track HD’s can accurately track over 1000 people simultaneously, while they walk around obstructions such as line queues, columns, shelves, desks, etc. Q-Track Dome is designed to track and classify people in even smaller and more complex environments, such as corridors, mantraps, and line queues with a 90-degree vertical field of view. This sensor is optimised for dense areas, offering unmatched performance and reliability for object tracking and crowd intelligence gathering applications. Range of 3D LiDAR solutions ISC West 2025 attendees are invited to visit Quanergy Solutions at stand #29081 for live demonstrations of the company’s complete range of 3D LiDAR solutions. Quanergy will also be showcasing its integration with Avigilon Unity at the Motorola Solutions booth #14059 on April 4 between 10:00 a.m. and 12:20 p.m.
Hanwha Vision, a pioneer in security and surveillance solutions, introduces the TNO-A26081, an ultra-high-resolution AI-powered camera designed to deliver unmatched imaging clarity and powerful analytical capabilities. With 26MP resolution at 30 frames per second, this camera captures every detail, making it ideal for large-area surveillance and high-security environments. Furthermore, its AI features ensure precise object detection, improved operational efficiency, and seamless integration into modern surveillance systems. Crystal-clear view and versatile AI-based analytics provide business intelligence abilities, including people and vehicle counting The TNO-A26081's 26MP resolution offers a level of detail surpassing 4K cameras, ensuring that even the smallest details are captured in real time. Ideal for stadiums and arenas, this camera addresses critical safety and crowd control needs. Its AI-based analytics provide business intelligence capabilities, including people and vehicle counting, queue management, and heat mapping, helping users manage events more efficiently. Whether operators are monitoring large outdoor areas, parking lots, or high-traffic locations, this camera provides crystal-clear images that ensure no detail is missed. Essential for security and operational efficiency With its high sensitivity, the TNO-A26081 is also perfect for critical surveillance points, such as airports, seaports, and manufacturing sites, where capturing fine details can be essential for security and operational efficiency. The model is equipped with a built-in zoom lens (55-250mm), for a versatile field of view that allows users to zoom in on distant subjects while capturing wide areas with ease. Its adjustable field of view is ideal for large outdoor spaces, enabling detailed surveillance without the need for multiple cameras. Powerful AI analytics With AI-based motion detection, the camera reduces false alarms by distinguishing between human movement, animals, and other motion, for example swaying trees or shadows, ensuring only relevant events are flagged to operators. The WiseAI app, pre-installed on this camera, includes advanced object attribute extraction capabilities, recognising identifiers such as clothing colour (upper/lower), and whether a person is wearing a mask or glasses. For vehicles, it detects type (car, truck, bus, motorcycle, bicycle) and colour, enhancing forensic investigations and enabling precise monitoring. Complementary AI pack licences Camera’s abilities can be further enhanced with one of two complementary AI pack licences Furthermore, the camera’s capabilities can be further enhanced with one of two complementary AI pack licences, designed for traffic or industrial applications, to offer tailored analytics that bolster operations. Blocked exit detection, slip and fall detection, and forklift detection, are examples of key features that can be found across the packs. Excelling in low-light, harsh conditions Equipped with an APS-C CMOS sensor, the TNO-A26081 excels in low-light conditions, ensuring clear images day and night. Its superior low-light capabilities allow for continuous surveillance even in challenging lighting environments. This ensures that security teams can rely on the camera to deliver consistent and high-quality footage, regardless of the time of day or lighting conditions. The model is built to withstand all manner of environments. Its robust design, including IP67-rated weather-proofing and IK10 impact resistance, plus an expansive operating temperature of −40°C to 55°C, ensures that the camera can function reliably in extreme conditions, whether it is mounted outdoors in harsh weather or in high-traffic areas prone to physical impact.


Expert commentary
March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. Evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its “Women’s Role in Filling the Workforce Gap” report, women make up an estimated 20 to 25 percent of the security industry. Promisingly, younger generations are entering the profession at higher rates, with 26 percent of working professionals under 30 identifying as women. The security industry has witnessed a steady increase in women's participation The research tells us that women are thriving in a variety of roles, from engineering and system administration to sales, marketing, and project leadership. Key factors driving this transformation include mentorship programs, male allies advocating for gender equality, and cultural shifts recognising the unique perspectives and strengths women bring to security challenges. These efforts are fostering more inclusive environments and ultimately strengthening the industry. The value of diverse perspectives in security Security is not a one-size-fits-all industry—each organisation and facility has unique needs that require varied perspectives. Greater representation of women has introduced fresh approaches to problem-solving, fostering collaboration and driving innovation. By integrating diverse viewpoints, security professionals can create more effective solutions that better address end-user needs. Industry support for women’s professional growth SIA's WISF offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER Organisations like the Security Industry Association (SIA) and ASIS International have established networking platforms and initiatives to support women in security. Events such as the Security LeadHER Conference provide valuable professional development and networking opportunities. Companies are also investing in science, technology, engineering, and mathematics (STEM) initiatives, hands-on training, and recruitment programs to attract more women into the field. Additionally, SIA's Women in Security Forum (WISF) offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER, which provide pathways for engagement and growth. Challenges women in security face Despite progress, challenges remain. Many women still feel it necessary to repeatedly prove their expertise, take on additional informal responsibilities, or carefully navigate workplace dynamics. Imposter syndrome can be another hurdle, even for accomplished professionals. However, women in security are addressing these challenges by setting boundaries, advocating for themselves, and supporting one another through mentorship. By excelling in leadership and technical roles, women are reshaping outdated perceptions and advocating for more inclusive workplace policies. Steps industry pioneers can take To further support women in security, industry pioneers could: Provide targeted professional development and career advancement opportunities. Foster strong, supportive communities that recognise and mentor women. Implement structured mentorship programs that connect experienced professionals with newcomers. Promote workplace flexibility to help employees balance personal and career commitments. Actively challenge biases and advocate for meaningful change within organisations. Advice for women entering the security field Here are key pieces of advice for women considering a career in security: Own Your Expertise – Have confidence in your knowledge and skills. Seek Out Mentors & Allies – Connect with supportive professionals who can guide your career. Build a Strong Network – Join organisations like ASIS Women in Security, SIA Women in Security Forum, or Women in CyberSecurity (WiCyS), and attend industry events to expand your connections. Speak Up & Take Space – Confidently share your ideas and challenge outdated norms. Develop Resilience & Advocate for Yourself – Push past biases, demand the respect you deserve, and negotiate for fair salaries and promotions. Keep Learning & Stay Ahead – Continually build your expertise to stay competitive in the evolving security industry. The future of women in security As the security industry evolves with technological advancements and global changes, opportunities for women will continue to expand. Women are not just participating in the industry’s growth—they are shaping its future. With growing mentorship programs, male allies advocating for gender equality, and ongoing cultural shifts, the focus is no longer just on breaking barriers but on building bridges to new opportunities.
Technology advances in the security industry are transforming the way modern systems are designed and installed. Customers today are looking for greater scalability and flexibility, lower up-front costs, and operational efficiency. Cloud-based software as a service (SaaS) solutions, AI-enhanced tools, and IoT-enabled sensors and devices are increasingly in demand. The traditional role of the systems integrator is evolving as a result. While security integrators have always worked closely with end users, today’s pioneers go beyond installation and maintenance. They align security strategies with evolving business needs, integrating IT, cybersecurity, and data-driven insights into their offerings. A look at the past and present Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity Traditionally, systems integrators specialised in installing and maintaining wired physical security systems like CCTV, access control, and alarms. The service model was built around large, up-front investments and project-based installations. However, today customers are seeking comprehensive solutions. They’re looking to wirelessly integrate security infrastructure with cloud-based SaaS systems and IoT devices. While modern systems are often faster to deploy, they’re most effective when supported by ongoing consulting and strategic planning. Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity. Data requirements and modern systems Data requirements have also changed. Modern systems collect vast amounts of data. Advanced analytics, machine learning, and automation are now must-have tools for actionable insights. Security integrators can help end users set up custom dashboards, automations, and continuous system optimisation. Let’s look at some of the specific ways the role of systems integrators is evolving and how to adapt and succeed. Strengthen your IT expertise Integrators with IT expertise can ensure that hardware is optimised and maintained for peak performance The competitive landscape today includes not just security specialists but also IT-focused integrators and SaaS providers. Systems integrators with expertise in traditional physical security solutions plus IT experience offer unique value. They understand the real-world security challenges and opportunities, along with cybersecurity and network best practices. Integrators with IT expertise can also ensure that hardware is optimised and maintained for peak performance. Their experience with legacy systems allows them to offer practical recommendations on cost-effective approaches, such as upgrading or integrating older hardware with new digital solutions. Consider who’s making the purchase decisions Traditionally, security integrators primarily sold to security directors, facility managers, and operations teams. Now, multiple stakeholders may be involved in decision-making. IT teams, CIOs, and CTOs often weigh in on purchase decisions when cloud-based security and SaaS solutions are under consideration. Customers today aren’t just shopping for cameras, access control panels, alarms, and other hardware components. They’re looking for security ecosystems that can integrate with enterprise-wide IT infrastructure and business applications. When working with these different teams, consider outlining the system's return on investment (ROI). How can the solution reduce risk for various departments? Can it help improve operational efficiency or reduce the time required to onboard and train staff? Will it make regulatory compliance easier to manage? Focus on the long-term value for the entire organisation. Take a consultative approach Another way systems integrators are adding value is by offering vertical specialisation Installation fees remain important for many integrators, but there may be additional consultative opportunities to build long-term relationships with customers. Offer services such as roadmap planning, hardware and integration maintenance, training to certify end users on the manufacturer’s product, and cybersecurity services. While cloud-based solutions reduce on-premises maintenance, they don’t eliminate the need for ongoing support and training. Consider offering training opportunities. These can lead to other benefits as well. Better-educated and technically proficient customers are usually more willing to adopt new technologies. They understand the value of these investments and have more confidence that they’ll see results. Another way systems integrators are adding value is by offering vertical specialisation. Healthcare, sports venues, critical infrastructure, education, retail - each specialty has its own set of challenges, partner networks, regulatory restrictions, training needs, and business requirements. Integrators who specialise are uniquely positioned to offer key sector-specific insights that are invaluable to their clients. Embrace the cloud A key growth area for integrators is supporting customers in their shift to cloud deployments. Cloud solutions aren’t a one-size-fits-all solution. Each organisation is evaluating options and deciding whether cloud, hybrid, or fully on-prem solutions are the right fit for its unique needs. A key growth area for integrators is helping clients in their shift to cloud deployments Helping customers navigate and adopt cloud or hybrid solutions opens new opportunities to expand your business and deepen your relationship with your customers. Systems integrators who sell cloud solutions have the opportunity to add new layers to services for more value for customers. With a cloud solution that's easy and fast to deploy and managed and maintained by the provider, you can reduce overhead costs, staff training, and truck rolls via remote customer support. These benefits also allow you to spend time developing greater expertise in your customers’ processes. Using this knowledge, you can tailor your services towards potential productivity gains for your customers and turn them into additional sales. You ensure that your customers get the most out of the technology that’s available and that they have already purchased. Highlight your focus on cybersecurity Cybersecurity is no longer solely an IT department's responsibility. While dedicated IT security teams may still handle broader network defense, integrators play a crucial role in securing access control, surveillance, and IoT devices within a security framework. If unsecured, these devices can provide an entry point for cyber criminals to gain access to an organisation’s network. Cybersecurity is no longer solely an IT department's responsibility To best protect end users from cyberattacks, choose physical security systems with built-in security and privacy-by-design features. Help customers implement best practices to ensure their entire ecosystem is designed, built, and managed with end-to-end security in mind. Once implemented, work with your manufacturers, consultants, and end users to ensure that vulnerabilities are identified and mitigated. Every person on the network plays a role in keeping cyber threats at bay. Lean into the power of partnerships In today’s complex and dynamic security landscape, choosing the right technology partners is crucial. Ask potential partners to share their technology roadmap, and how you can offer feedback or participate in discussions about industry trends. Ideally, your partners will have a program in place to get input from integrators and end users, so they can develop products that are designed to address their most pressing issues and concerns. Your manufacturer partners should be working to help identify the evolving needs of customers and communicate these insights to systems integrators. Seek partners who actively support integrators to understand how security is evolving In addition to a good experience for the end user, strong manufacturer partners also offer solutions to streamline and automate workflows for integrators. It should be easy to order and check your shipping statuses online, for example. These are simple things that save you time and demonstrate your partner’s care for your business. Seek partners who actively support integrators to understand how security is evolving. While training is often offered on-site, some companies are now also offering blended learning models so integrators and their technicians can reduce classroom time and stay out in the field. Evolution is an opportunity Security integrators with traditional physical security expertise remain indispensable because they understand real-world risks and regulatory requirements. They can provide hands-on system deployment and optimisation. Now, there are new opportunities to build long term customer relationships. As the physical security industry undergoes this profound shift, adaptation is key. By embracing cloud and hybrid solutions, integrators can unlock new revenue streams, enhance customer relationships, and stay ahead of technological advancements. With the right partnerships and a forward-thinking mindset, systems integrators can navigate this transformation and take advantage of new opportunities being presented by evolving technology. Leverage your deep industry experience while upskilling in cloud, cybersecurity, and IT. The strongest approach is for end users, systems integrators, IT specialists, and manufacturers to work together to navigate industry changes.
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
The slit lamp examination is one of the most important diagnostic techniques in ophthalmology. It enables a detailed examination of the anterior, middle and posterior segment of the eye. Ophthalmologists can use it to recognise the smallest changes, anomalies or damage. This procedure is used for the early detection and monitoring of the progression of eye diseases such as corneal injuries, eye infections, retinal detachment or macular degeneration. However, the eye with its fast movements is a challenging subject to photograph; motion blur and shaking are typical image errors. IDS USB3 Vision industrial camera OCULUS Optikgeräte GmbH develops instruments for eye diagnostics for ophthalmologists To facilitate diagnostics for ophthalmologists and opticians, improve the workflow and at the same time shorten examination times, fast and reliable slit lamp documentation systems are required. They must provide meaningful images and be designed to be user-friendly and ergonomic. The German company OCULUS Optikgeräte GmbH develops instruments for eye diagnostics for ophthalmologists, optometrists and opticians. Part of the extensive portfolio: one of the world's smallest and lightest image documentation systems for slit lamps. A powerful, high-resolution USB3 Vision industrial camera from IDS is integrated, especially for applications in medical technology and microscopy. Efficient system The OCULUS ImageCam®3 universal slit lamp image documentation system is not only intuitive and easy to use, but also sets high standards in digital slit lamp photography. This includes an outstanding field of view that enables highly precise diagnoses of the anterior, middle and posterior segments of the eye. The images are captured by a particularly low-light, high-performance IDS camera from the USB3 uEye+ CP family. OCULUS ImageCam® 3 OCULUS ImageCam® 3 makes this possible without any loss of quality "Only a fast camera delivers low-noise images in the difficult recording situations at the eye," explains Michael Moos, Product Manager at OCULUS, the choice of camera model. Another important requirement criterion is speed. "The advanced camera features enable continuous shooting at up to 60 frames per second. Among other things, these series recordings make it possible to record the eye during breaks in movement. The innovative frame-out-of-video function enables simple documentation of the entire examination process at the slit lamp, whereby the best quality individual images can then be selected for evaluation," says Michael Moos. The OCULUS ImageCam® 3 makes this possible without any loss of quality while minimising the time required. Powerful camera The IDS camera from the CP family is predestined for use in medical technology, as it offers extensive pixel pre-processing and has an internal 120 MB image memory for buffering image sequences. This enables a high data rate of 420 MByte/s, low CPU load and easy integration. The Sony Pregius IMX265 in the model used here is considered one of the best CMOS image sensors in the 3 MP class. The USB3 Vision industrial camera U3-3270CP Rev.2.2 with the 1/1.8" global shutter sensor thus achieves a resolution of 3.19 megapixels (2064 x 1544 px). IDS test camera functions The IDS camera from the CP family is predestined for use in medical technology "In this case, however, the image is scaled down using AOI in order to achieve a significantly higher frame rate," explains Phillip Schissler, Sales Manager Medical and Microscopy at IDS. OCULUS has integrated the camera with the IDS peak software development kit. "IDS peak allows users to test camera functions in detail and optimise them for your own applications," says the IDS Medical expert. Decisive selection criterion for the model However, the camera is not only recommended for medical technology and microscopy in terms of sensitivity, dynamic range and linearity. In addition to the required light intensity and speed, the size of the camera was also a decisive selection criterion for the model. At around 50 grams, the camera's small 29 x 29 x 29 millimetre magnesium housing is as light as it is robust, underlining its suitability for space-critical applications. Facilitated slit lamp diagnostics A beam splitter divides the light between the camera and the eyepiece of the slit lamp To deliver optimum diagnostic images, the system includes a high-quality beam splitter in addition to the camera. A beam splitter divides the light between the camera and the eyepiece of the slit lamp to simultaneously illuminate and view the eye, allowing a detailed examination of each eye segment. The beam splitter of the OCULUS system has a purely mechanical iris diaphragm that significantly increases the depth of field, regardless of the position of the pathological findings. It can also be adapted to all commercially available slit lamps. Highest quality standards in laboratory and diagnostics "The camera unit and the beam splitter are extremely small and light. This means in daily practice: It is barely noticeable, is very easy to attach and delivers images like no other in this size. This makes daily slit lamp diagnostics easier in the truest sense of the word," says the manufacturer. In terms of image quality, reliability and long-term availability, IDS stands for the highest quality standards in laboratory and diagnostics. Benefit from the image documentation system The slit lamp photos of the OCULUS ImageCam® 3 help factual documentation of eye states The slit lamp photos of the OCULUS ImageCam® 3 enable objective documentation of eye conditions in order to monitor the progress of diseases and compare treatments. Patients also benefit from the image documentation system. The visual references of the diagnosis created in this way help them to better understand their state of health and the doctors' treatment plan. The medical findings can be saved and archived accordingly. Outlook Innovative image processing systems such as OCULUS ImageCam®, which use powerful industrial cameras to deliver informative, high-contrast images with a high depth of field, help to improve diagnostic accuracy, efficiency and patient care in ophthalmology. Artificial intelligence (AI) is increasingly being integrated into the analysis of slit lamp images in order to automatically recognise diseases, support diagnostic decisions, improve the workflow for doctors and develop new treatment methods. Further development of technologies The company develops first-class instruments for eye diagnostics for this clearly defined group of users The company OCULUS Optikgeräte GmbH has been a partner for ophthalmologists, optometrists and opticians worldwide for 125 years. The company develops first-class instruments for eye diagnostics for this clearly defined group of users. The measure of all things is the high demands of customers and the continuous further development of technologies. Over 55% of OCULUS' sales are realised in foreign markets. OCULUS customers' service More than 400 employees work at the OCULUS headquarters. More than 60 % of them work in research and development, production and customer service. With 12 company-owned subsidiaries and more than 200 wholesalers in over 80 countries, OCULUS is at its customers' service around the globe. Founded in 1895, the family business is now jointly managed by the third and fourth generations.
Porthaven Care Homes, a provider of high-quality care services in the UK, recently completed the opening of its latest addition, Cavell Park Care Home, located in Maidstone, Kent. This marks another significant addition to their growing portfolio of 18 purpose-built care homes, each designed with a person-centred approach. Located near the historic town of Maidstone, Cavell Park Care Home provides a peaceful and secure environment for up to 80 residents. The care home offers a wide range of services - all within a setting that combines safety, comfort, and aesthetic appeal. Elevating security standards To ensure the safety of residents while also maintaining an inviting atmosphere, Jacksons Fencing was chosen to install a combination of black metal bow-top railings and matching gates at varying heights around the care home. The 1.8-metre-high bow top railings surround the gardens where residents enjoy much of their leisure time, while 1.2 metre high fencing was installed around the car park and entrance. First impressions matter The railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors The design of the bow top railings features rounded pales, posts, and curved hoop tops which score highly for both safety and aesthetics, creating a secure and inviting environment while minimising injury risk. Additionally, the railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors, ensuring that the fencing is resistant to vandalism or break-in attempts. Weather-resistant railings Made from galvanised tubular steel, these railings are strong and weather-resistant. The polyester powder coating ensures a sleek, durable finish that won't crack or peel, offering long-lasting protection against wear and tear. This combination makes the railings both visually appealing and a sustainable investment. The design of the railings complements the home’s contemporary architecture and seamlessly blends with the surrounding landscaped gardens, creating a harmonious and secure environment for residents. Each railing installation is backed by a 25-year Service Life Guarantee from Jacksons Fencing, providing long-term peace of mind that the fencing will continue to deliver security and aesthetic value for years to come. A sense of safety and autonomy The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access Located adjacent to the reception entrance, the garden’s visibility offers visitors and prospective residents immediate assurance that their loved ones are in a safe and welcoming space. The vertical pale design of the fence ensures high visibility, which not only improves supervision but also enhances the autonomy of residents by making them feel connected to the outside world. The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access, while maintaining ease of entry for staff and residents. Bow top fencing and gates Reflecting on the success of the project, Peter Jackson, Managing Director at Jacksons Fencing, commented, “The installation of our bow top fencing and gates has not only provided Cavell Park Care Home with a secure and well-defined perimeter but also ensured exceptional durability. Jacksons Fencing’s products are designed to withstand the test of time, offering long-term protection while retaining an attractive finish." “A care home is more than just a building - it’s a community where safety, comfort, and a sense of belonging are paramount,” continued Peter. “We’re proud to have played a role in bringing this vision to life and blending robust security with sleek design.”
DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-pioneering technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security. To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. DP World Yarimca: An overview DP World Yarimca is located in the heart of Anatolia, Turkey. The port is the gateway to overseas markets to many Turkish firms and it supports economic activity in the East Marmara region and a large part of Anatolia. DP World Yarimca can berth four vessels or two ultra-large container ships at the same time, making it Turkey’s fastest and most efficient port. Maintaining safe and uninterrupted operations for its customers is one of the main tasks of the DP World Yarimca port operators, but it’s frequently complicated by illegal fishing, diving, and mussel poaching along the region. Challenges faced by DP World Yarimca Illegal fishing and mussel poaching Harvesting the mussels could also damage the port’s cathodic protection system Mussels are growing abundantly on the piles that support the port’s berths. This is a main attraction for mussel poachers. Not only is this activity illegal, but it also poses a serious safety risk for poachers as well as for people who are legally active in the port. Harvesting the mussels could also damage the port’s cathodic protection system, a system that prevents corrosion on submerged and underground metallic structures. “Mussel poachers prevent us from efficiently monitoring our port activity and they potentially interrupt our operations,” says Ismail Karaçam, HSSE Manager at DP World Yarimca. Delays in vessel maneouvering In addition, illegal hunters and divers can enter the vessel maneuvering areas and cause delays in the berthing and departure of vessels. This can cause disruptions in the supply chain. DP World Yarimca's commitment to security Since its formation, the port has always viewed security as its top priority. The organisation has always provided the necessary technology to monitor activities from the seaside and to guarantee security and sustained operations at the container site. When their current security monitoring system reached the end of life, DP World’s security team was looking for a new solution that could help them detect intruders both onshore and at sea. Finding the right port security monitoring solution The port security team scanned the market for new technology and learned about FLIR’s visible portfolio The port security team scanned the market for new technology and learned about FLIR’s visible and thermal security monitoring portfolio through Turkish distributor and integrator IRMARINETECH. “We had completed port security projects in Turkey before,” says Koray Serbest, founder of IRMARINETECH. “This already instilled confidence in the team of DP World that we could meet their needs. After convincing product demonstrations and proofs of concepts, DP World Yarimca decided to collaborate with us and FLIR.” Enhancing port security with FLIR’s thermal and visible cameras FLIR's thermal and visible camera systems have revolutionised DP World Yarimca's approach to port security. These advanced technologies empower the port's security team to monitor illegal activities during nighttime, inclement weather conditions, and from extended distances. Monitoring activities at sea and at night “The illegal fishermen and divers had proven to be very resourceful in their activities,” says Ismail Karaçam. “One of their tactics was to paint their boat black, so they were invisible at night for our current camera systems." "That’s when we knew we needed thermal camera technology. With the thermal cameras from FLIR, we can now monitor any illegal activity at night, in challenging weather conditions like rain or fog, and from a long distance.” Detection of intruders and man-overboard situations The port operators have a 24/7 view of intruders at sea, but they also use cameras to monitor To monitor the port’s 800-meter shoreline and activities up to 200 meters out to sea, the port invested in FLIR’s thermal cameras, including the FC-Series ID analytical camera, the Saros dome camera, and the M232 pan/tilt marine thermal camera. The port operators have a 24/7 view of intruders at sea, but they also use the cameras to monitor for man overboard situations and oil spills. The port’s security patrols also make use of a FLIR Scion thermal handheld camera to detect fishermen and divers hiding under the rocks, who enter under the berth in complete darkness. Perimeter security and container area monitoring A combination of thermal and visible cameras, like the FLIR Quasar panoramic and PTZ cameras, are used to monitor the site’s perimeter security as well as the activities inside the container area. FLIR’s wide portfolio and local support DP World Yarimca was well aware of FLIR’s strong reputation in the field of port security monitoring. Ultimately, it was the visual quality of the thermal camera systems and the ability to offer highly accurate imaging over a long distance that convinced the DP World Yarimca security management team. In addition, FLIR was able to present a suitable solution for every specific security need and application in the port by bringing in a combination of the company’s wide portfolio of enterprise, perimeter security, and maritime monitoring solutions. Support and service The support of IRMARINETECH was a confirmation that DP World Yarimca had made the right choice The support of a dedicated and local FLIR support partner like IRMARINETECH was a confirmation that DP World Yarimca had made the right choice. “We want to guarantee continued security to our customers, which means that we just cannot afford technical downtime,” says the Security Manager at DP World Yarimca. “So, in case we need technical maintenance, spare parts, or a quick product replacement, we are confident that we can rely on the support and service from our local partner IRMARINETECH.” DP World Yarimca's focus on technology innovation As a firm believer in digital transformation, DP World Yarimca continually seeks opportunities to enhance its physical infrastructure's efficiency. FLIR stands as a reliable partner, supporting DP World Yarimca's commitment to leveraging technology for future growth and security advancements. The port is actively exploring collaborations with FLIR to implement additional security measures and augment existing systems. Future collaborations and security advancements The port is already collaborating with FLIR to investigate how visible and thermal camera technology can bring the organisation additional security gains. The possibility of detecting fires in an early stage is a valuable contribution to the port’s security strategy One of the possibilities they are exploring is the addition of thermal boom cameras installed on cranes to monitor the surroundings of the vessels. Another application is the addition of thermal fire detection cameras. Many of the port’s customers are carrying highly flammable products into the port. The possibility of detecting fires in an early stage is a valuable contribution to the port’s security strategy. FLIR FH-Series R Thermal cameras like the FLIR FH-Series R can automatically spot small temperature changes in their field of view, identify hot spots before they ignite, and provide an early warning response to avoid a full-on fire outbreak before assets are harmed or safety is compromised. Upon detection, an alert can be sent to an operator through a connected Video Management System (VMS) for instantaneous assessment and deployment of response tactics.
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over a two-year period by specialist security installer, Scottish Communications Group. HID Mobile Access licences University has purchased 10,000 HID Mobile Access licences to offer its academic community In addition, the University has purchased 10,000 HID Mobile Access licences to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. “We wanted a modern system which is safe, secure and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. HID solution: future-proof equipment Stebbing added: “Complying with forthcoming legislation was also another important project requirement. With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we have a duty to protect to ensure everyone is safe." "The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” Ambitious development plans University of Dundee is a research institute in Scotland, noted for its academic merit in dentistry The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering and life sciences. Based in the heart of the city, it is home to over 16,000 students, 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organisations flexible laboratory, meeting and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. New HID Signo readers The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP (Open Supervised Device Protocol) and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers, thereby speeding up the rollout. RFID cards access buildings The university used to print and issue plastic RFID cards so staff and students could access buildings Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week, when some 2,500 – 3,000 undergraduate and postgraduate students enrol. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Origo management software Shifting to HID Mobile Access – which utilises cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licencing, allocation of credentials, setting of building access rights, validating or revoking of IDs – all of which is now done virtually and remotely. Improve the mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Integrate with digital campus cards While the strategy and aspiration are for the university population to shift wholesale to mobile access While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach now is to operate a dual system. “We recognise that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO range of ID card printers Given that RFID cards are still required now, the University of Dundee utilises its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. HID’s reputation University of Dundee utilises its FARGO DTC4500e printers to back up this shift to digital change “HID Signo readers are going in now across the main buildings, including the new Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications and authentication standards. Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” MOTORTRBO Ion smart radios In addition, Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems and CriticalArc Safezone® App, security staff need carry only a single device to fulfil their duties.
Thames Valley Police worked with local authorities to improve CCTV coverage, cut costs, and boost efficiency. It’s made public spaces safer and ensured long-term, reliable monitoring across the region. Thames Valley Police is the largest non-metropolitan police force in England and Wales, covering 2,218 square miles and a population of 2.42 million people. Its jurisdiction includes multiple towns, city centres and council areas across the three counties of Berkshire, Buckinghamshire and Oxfordshire. Setting a long-term vision for public space CCTV Public space CCTV is vital in deterring and detecting crime across the Thames Valley Public space CCTV is vital in deterring and detecting crime across the Thames Valley. However, significant pressure on local authority budgets has made it increasingly difficult for councils to provide public space CCTV. There was real jeopardy that financial constraints would result in unmaintained systems, with limited or no real-time monitoring. A fresh approach was needed, so the Thames Valley CCTV partnership between Genetec™ and Hanwha Vision was formed. The first major challenge was securing funding to overhaul several local authorities’ ageing systems, which were proving increasingly expensive to upgrade and maintain. The second was to manage the ongoing costs of staffing control rooms to ensure the long-term sustainability of monitored CCTV across the Thames Valley. Ownership and monitoring of public space CCTV Ambitious plans were devised to pool resources and replace many disparate systems with one police-owned system that could extend across multiple authorities. In effect, the aim was to transfer the ownership and monitoring of public space CCTV from local authorities to dedicated Thames Valley Police control rooms. It would be led by the Thames Valley Police & Crime Commissioner (PCC) Matthew Barber, collaborating with any local authority who chose to participate. It was a feat that had never been attempted in the UK on this scale that held the potential to drive efficiencies and enhance CCTV provision in areas it might otherwise have deteriorated. Ongoing commitment and investment “CCTV is an important part of community safety; benefitting police and local communities in helping to deter crime and antisocial behaviour, identify offenders and support prosecutions." "Ongoing commitment and investment enables high quality, consistent and sustainable CCTV provision now and into the future”, explains Matthew Barber, PCC, Thames Valley. Centralisation creates area-wide visibility and control Several control rooms in the Thames Valley, like Windsor & Maidenhead, had implemented Genetec Security Centre Several control rooms in the Thames Valley, such as Windsor & Maidenhead, had already implemented Genetec Security Centre and were very happy with its operation. Furthermore, as an open platform video management system, it could minimise costs by supporting a phased unification or “takeover” of existing systems across the Thames Valley. Finally, its hybrid cloud architecture provided Thames Valley with maximal flexibility to leverage any combination of cloud or on-premises infrastructure according to Name Thames Valley Police Industries Public Safety Location Thames Valley, United Kingdom Products Genetec Security Centre; Genetec Cloud Services; Federation Technology Partners Hanwha Vision Channel Partners CDS Systems what made sense for each application and location. This made it the obvious choice on which to standardise. Range of multidirectional AI-enabled cameras Following a competitive tender, Thames Valley chose CDS Systems to implement its proposed solution. This would be built on Genetec Security Centre and incorporate a range of multidirectional AI-enabled cameras from Hanwha Vision. A key driver in the decision was the high levels of commitment shown by all three parties to cybersecurity. Another was the recognition that the system design and technology selection could ensure a cost-effective implementation that could continue to evolve in line with the needs of its users. Integration between Genetec and Hanwha Vision technology Legacy cameras were retained and reused to maximise the return on existing investment wherever possible “We urgently needed to improve the quality of CCTV, enhance collaboration, and drive efficiencies for all partners. The respective capabilities and seamless integration between Genetec and Hanwha Vision technology was the optimal way of meeting Thames Valley’s requirements,” says Sam Thomas, CDS Systems. Phase one of the deployment involved CDS taking over an existing control room in Milton Keynes, replacing the legacy analogue infrastructure with a modern IP backbone. It then installed Genetec Security Centre to establish one platform through which officers could smartly interact with all incoming video feeds. Legacy cameras were retained and reused to maximise the return on existing investment wherever possible. A second Genetec workstation was also set up inside Slough Police Station, allowing officers to rapidly review footage for improved community response. Hanwha Vision’s AI-enabled multidirectional cameras CDS then introduced Hanwha Vision’s AI-enabled multidirectional 4k cameras to improve CCTV coverage and quality in public spaces. Each of these cameras incorporates up to five cameras in one device for wide-area surveillance, which would previously have required several separate devices, simplifying installation and resulting in significantly less associated cabling and infrastructure. They also provide powerful AI analytics, including accurate object detection and classification, to enable forensic search and save operators' time when responding to incidents. For example, identifying and establishing the movement of specific people or vehicles based on attributes such as vehicle type. Thames Valley CCTV partnership Phase two will see four additional control rooms in Oxfordshire merged into a single hub Phase two will see four additional control rooms in Oxfordshire merged into a single hub inside Abingdon Police station, also built on the Genetec Security Centre. This and the control room in Milton Keynes will be interlinked, adding further resilience as each site will be able to act as a fallback for the other. At this point, there will be a dedicated team of eighteen staff responsible for monitoring CCTV and enhancing CCTV for all participating communities in the Thames Valley CCTV Partnership. Innovative and cost-effective solutions “The CCTV Command Suite enabled by CDS, Genetec and Hanwha Vision has improved our workflows beyond recognition, enabling staff to quickly review and package evidence for frontline officers or more complex investigations. It has received several plaudits from officers for its ease of use,” says Jason Owen, CCTV Operations Manager, Thames Valley Police. “This collaboration between Thames Valley Police, Genetec, CDS Systems, and Hanwha Vision showcases the power of partnership in driving innovative, cost-effective solutions that improve public safety,” says John Boorman, Head of Product and Marketing at Hanwha Vision Europe. “Our AI-enabled cameras are designed to reduce false alarms and streamline operations, ensuring teams can focus on real incidents and drive efficiency across their monitoring.” Efficiency, at a lower cost All CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers Pooling resources and transferring ownership to the police has brought about significant cost efficiencies for participating authorities, while also enhancing the quality and reliability of public spaces CCTV. Just as importantly, it has dramatically improved the police’s direct access to quality video evidence. Unlike in a traditional council-run control room, all CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers. This means they have full access to Thames Valley’s suite of police databases and reporting software packages. They are better equipped to rapidly report incidents, support front-line officers, and communicate effectively with investigators as a result. On average, it handles between 300 – 500 incidents a month and has substantially increased the number of successful requests for supporting footage. “We’ve immediately seen the benefit of our investment in equipment and CCTV operators, with the police now much better equipped to deter and detect crime across the Thames Valley,” adds Barber. A solid platform for further improvements Control room operators’ intuition will always be the driving force that brings results Looking forward, Thames Valley has plans to use the Genetec platform to connect its people and mobile surveillance assets back to its control rooms for better cross-force interaction. Genetec Federation as a Service is already allowing live and recorded video to be shared with officers in the field. Soon it will also be extended to ensure video from police CCTV vans and drones is immediately available in the control room. In both cases this is achieved without complex network configuration, requiring only an internet connection. It is also at the beginning of its journey of fully realising the value of the AI-equipped Hanwha Vision cameras specified by CDS. Control room operators’ intuition will always be the driving force that brings results, but AI is freeing them up to do what they do best by saving time on routine monitoring and searches. Cost savings, resilience, and efficiencies Finally, talks continue that would see the addition of further control rooms across the Thames Valley to the Thames Valley CCTV Partnership. Having proven the model, would allow it to scale operations further to deliver even greater cost savings, resilience, and efficiencies. “We’re proud of what we’ve achieved to date but have no intention of resting on our laurels. The foundations we’ve established will ensure continued high-quality, consistent, and sustainable CCTV provision for our communities,” concludes Owen.
Modern measurement technologies enable high-precision detection of the movement of liquids and gases - and thus provide valuable data for numerous applications. How does the air flow around an aeroplane? How does the blood move through our veins? And how can pollutant emissions in combustion processes be minimised? For this purpose, speed, direction, pressure and turbulence within a flow are analysed in order to increase efficiency, ensure safety and drive innovation in a wide variety of areas. Innovative sensor technology High-resolution cameras are used to track marked particles within a flow and analyse their movement A range of methods are available to measure these flows, including visual ones such as particle image velocimetry (PIV). High-resolution cameras are used to track marked particles within a flow and analyse their movement. iLA_5150 GmbH from Aachen (Germany) now also relies on EBIV. The abbreviation stands for Event-Based Particle Image Velocimetry and is a new optical method for the qualitative and quantitative visualisation of flows and flow velocities. It combines PIV with event-based cameras, here with a uEye EVS from IDS Imaging Development Systems GmbH. The innovative sensor technology of the industrial camera enables highly dynamic and energy-efficient detection, especially of fast and turbulent movements. Application In the EBIV method, tiny particles are added to a flowing fluid and illuminated in a plane, the so-called light section plane. They generate individual light pulses as they enter and exit the LED light section. This change in local brightness is recorded independently by the camera pixels and transmitted to the PC as a data stream of "change events". In contrast to conventional cameras, event-based models therefore only react to the changes in brightness registered in the image field. Stationary scattered light, such as background or a non-changing illuminated surface, does not generate a measurement signal. This reduces the amount of data considerably. Frame rates of up to 10,000 frames per second The data stream essentially contains information about what happens, when and where The data stream essentially contains information about what happens, when and where. In detail, these are the pixel coordinates on the sensor, microsecond time stamps of the pixel events and the information about the events: ON or OFF. This allows a distinction to be made between increasing intensity (ON event) and decreasing intensity (OFF event). Using suitable software, the stream can be converted into an image matrix in which both the spatial information and the linear time base of the stream are available. The result is comparable to the extremely high frame rate of a high-speed camera. EBIV measurement method "The EBIV measurement method differs fundamentally from conventional imaging methods. They usually generate very large amounts of data and require powerful peripherals that can process them. For exceptional frame rates of 1000 Hertz and more, the image-based cameras required are themselves very complex and expensive." "With the help of event-based camera technology, comparable frame rates of 10,000 frames per second are possible, whereby only standard PC interfaces such as USB with a few gigabits per second are required. The price of the event-based models themselves is significantly lower than that of corresponding high-speed cameras and is therefore also very interesting for smaller teaching and research institutions," explains Dr André Brunn - Head of Development at iLA_5150 GmbH. Further processing The user can optimise the display of the move paths and adapt them to unique study objectives The data stream is converted into image data and displayed in a front end - the so-called EBIV viewer - for direct online flow visualisation. The user can also select the integration time, which corresponds to the exposure time of an image camera, as well as the time increments of the sequence, i.e., the period between two consecutive shots. Classic image filters can also be used. With the help of these settings, the user can optimise the display of the movement paths and adapt them to individual examination objectives. Both fine flow details and large-scale patterns can be made more clearly recognisable. This ability to readjust the measurement results is another advantage of the event-based approach. Numerical analysis of the flow properties In the qualitative visualisation of the flow in the EBIV-View, particles are continuously illuminated so that they are visible as luminous traces. The method is therefore very well suited to visualising the flow. However, it does not provide exact measurements of its speed or direction. For a precise, numerical analysis of the flow properties, individual particles are illuminated for a moment using short, time-defined light pulses. Image sequences of the event-based camera As with classic PIV, the image sequences of the event-based camera can also be statistically analysed This allows their exact position to be recorded and their movement quantified. By comparing the particle positions in successive images, the speed and direction of the flow can be precisely calculated using PIV, for example. The result is a transient 2D vector field that changes over time - in other words, the vectors do not remain constant. As with classic PIV, the image sequences of the event-based camera can also be statistically analysed, for example, to determine mean values and fluctuations in the flow velocity. Camera and software On the camera side, iLA relies on a uEye XCP-E from IDS. The small, lightweight industrial camera offers event-based sensor technology in a robust die-cast zinc housing (29 × 29 × 17 mm) with screw-on USB Micro-B connection. It is compatible with all standard C-mount lens sizes. This makes it ideal for both industrial and non-industrial areas. The integrated event-based vision sensor (EVS) was developed by Sony and Prophesee. It is supported by the Metavision SDK, a seamlessly integrated suite of software tools and models, APIs and other training and development resources from Prophesee for efficient analysis, visualisation and customisation. Building on this, the EBIV viewer from iLA_5150/PIVTec is specially tailored to flow visualisation applications. Outlook The optimisation of fluidic systems and processes requires detailed knowledge of the flow conditions The optimisation of fluidic systems and processes requires detailed knowledge of the flow conditions. A qualitative flow visualisation is often sufficient to understand effects and develop suitable control mechanisms. Until now, however, imaging fast flows with high temporal resolution was usually only possible with expensive high-speed cameras. Event-based camera technology offers a cost-effective alternative that requires significantly less technical effort. These “simple” methods have been lacking in teaching and research in particular. Thanks to the extreme data reduction, this technology also allows the use of several cameras or large camera arrays without the periphery becoming a limitation for data transfer. The compact design of the uEye EVS models also makes them ideal for mobile applications. This means that real application environments can be analysed directly for the first time - without having to rely on artificial flow models or channels. Established flow measurement methods Event-based cameras enable efficient, cost-effective and high-resolution visualisation and quantification of flows. Due to the small amounts of data generated, many processes can be analysed almost in real time, which also makes them interesting for use in fully automated systems. Established flow measurement methods such as Particle Image Velocimetry (PIV) can be seamlessly integrated and expanded. The technology can be used wherever flow information is captured by changes in scattered light intensity - be it from moving particles or vibrating surfaces.
The slit lamp examination is one of the most important diagnostic techniques in ophthalmology. It enables a detailed examination of the anterior, middle and posterior segment of the eye. Ophthalmologists can use it to recognise the smallest changes, anomalies or damage. This procedure is used for the early detection and monitoring of the progression of eye diseases such as corneal injuries, eye infections, retinal detachment or macular degeneration. However, the eye with its fast movements is a challenging subject to photograph; motion blur and shaking are typical image errors. IDS USB3 Vision industrial camera OCULUS Optikgeräte GmbH develops instruments for eye diagnostics for ophthalmologists To facilitate diagnostics for ophthalmologists and opticians, improve the workflow and at the same time shorten examination times, fast and reliable slit lamp documentation systems are required. They must provide meaningful images and be designed to be user-friendly and ergonomic. The German company OCULUS Optikgeräte GmbH develops instruments for eye diagnostics for ophthalmologists, optometrists and opticians. Part of the extensive portfolio: one of the world's smallest and lightest image documentation systems for slit lamps. A powerful, high-resolution USB3 Vision industrial camera from IDS is integrated, especially for applications in medical technology and microscopy. Efficient system The OCULUS ImageCam®3 universal slit lamp image documentation system is not only intuitive and easy to use, but also sets high standards in digital slit lamp photography. This includes an outstanding field of view that enables highly precise diagnoses of the anterior, middle and posterior segments of the eye. The images are captured by a particularly low-light, high-performance IDS camera from the USB3 uEye+ CP family. OCULUS ImageCam® 3 OCULUS ImageCam® 3 makes this possible without any loss of quality "Only a fast camera delivers low-noise images in the difficult recording situations at the eye," explains Michael Moos, Product Manager at OCULUS, the choice of camera model. Another important requirement criterion is speed. "The advanced camera features enable continuous shooting at up to 60 frames per second. Among other things, these series recordings make it possible to record the eye during breaks in movement. The innovative frame-out-of-video function enables simple documentation of the entire examination process at the slit lamp, whereby the best quality individual images can then be selected for evaluation," says Michael Moos. The OCULUS ImageCam® 3 makes this possible without any loss of quality while minimising the time required. Powerful camera The IDS camera from the CP family is predestined for use in medical technology, as it offers extensive pixel pre-processing and has an internal 120 MB image memory for buffering image sequences. This enables a high data rate of 420 MByte/s, low CPU load and easy integration. The Sony Pregius IMX265 in the model used here is considered one of the best CMOS image sensors in the 3 MP class. The USB3 Vision industrial camera U3-3270CP Rev.2.2 with the 1/1.8" global shutter sensor thus achieves a resolution of 3.19 megapixels (2064 x 1544 px). IDS test camera functions The IDS camera from the CP family is predestined for use in medical technology "In this case, however, the image is scaled down using AOI in order to achieve a significantly higher frame rate," explains Phillip Schissler, Sales Manager Medical and Microscopy at IDS. OCULUS has integrated the camera with the IDS peak software development kit. "IDS peak allows users to test camera functions in detail and optimise them for your own applications," says the IDS Medical expert. Decisive selection criterion for the model However, the camera is not only recommended for medical technology and microscopy in terms of sensitivity, dynamic range and linearity. In addition to the required light intensity and speed, the size of the camera was also a decisive selection criterion for the model. At around 50 grams, the camera's small 29 x 29 x 29 millimetre magnesium housing is as light as it is robust, underlining its suitability for space-critical applications. Facilitated slit lamp diagnostics A beam splitter divides the light between the camera and the eyepiece of the slit lamp To deliver optimum diagnostic images, the system includes a high-quality beam splitter in addition to the camera. A beam splitter divides the light between the camera and the eyepiece of the slit lamp to simultaneously illuminate and view the eye, allowing a detailed examination of each eye segment. The beam splitter of the OCULUS system has a purely mechanical iris diaphragm that significantly increases the depth of field, regardless of the position of the pathological findings. It can also be adapted to all commercially available slit lamps. Highest quality standards in laboratory and diagnostics "The camera unit and the beam splitter are extremely small and light. This means in daily practice: It is barely noticeable, is very easy to attach and delivers images like no other in this size. This makes daily slit lamp diagnostics easier in the truest sense of the word," says the manufacturer. In terms of image quality, reliability and long-term availability, IDS stands for the highest quality standards in laboratory and diagnostics. Benefit from the image documentation system The slit lamp photos of the OCULUS ImageCam® 3 help factual documentation of eye states The slit lamp photos of the OCULUS ImageCam® 3 enable objective documentation of eye conditions in order to monitor the progress of diseases and compare treatments. Patients also benefit from the image documentation system. The visual references of the diagnosis created in this way help them to better understand their state of health and the doctors' treatment plan. The medical findings can be saved and archived accordingly. Outlook Innovative image processing systems such as OCULUS ImageCam®, which use powerful industrial cameras to deliver informative, high-contrast images with a high depth of field, help to improve diagnostic accuracy, efficiency and patient care in ophthalmology. Artificial intelligence (AI) is increasingly being integrated into the analysis of slit lamp images in order to automatically recognise diseases, support diagnostic decisions, improve the workflow for doctors and develop new treatment methods. Further development of technologies The company develops first-class instruments for eye diagnostics for this clearly defined group of users The company OCULUS Optikgeräte GmbH has been a partner for ophthalmologists, optometrists and opticians worldwide for 125 years. The company develops first-class instruments for eye diagnostics for this clearly defined group of users. The measure of all things is the high demands of customers and the continuous further development of technologies. Over 55% of OCULUS' sales are realised in foreign markets. OCULUS customers' service More than 400 employees work at the OCULUS headquarters. More than 60 % of them work in research and development, production and customer service. With 12 company-owned subsidiaries and more than 200 wholesalers in over 80 countries, OCULUS is at its customers' service around the globe. Founded in 1895, the family business is now jointly managed by the third and fourth generations.
Porthaven Care Homes, a provider of high-quality care services in the UK, recently completed the opening of its latest addition, Cavell Park Care Home, located in Maidstone, Kent. This marks another significant addition to their growing portfolio of 18 purpose-built care homes, each designed with a person-centred approach. Located near the historic town of Maidstone, Cavell Park Care Home provides a peaceful and secure environment for up to 80 residents. The care home offers a wide range of services - all within a setting that combines safety, comfort, and aesthetic appeal. Elevating security standards To ensure the safety of residents while also maintaining an inviting atmosphere, Jacksons Fencing was chosen to install a combination of black metal bow-top railings and matching gates at varying heights around the care home. The 1.8-metre-high bow top railings surround the gardens where residents enjoy much of their leisure time, while 1.2 metre high fencing was installed around the car park and entrance. First impressions matter The railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors The design of the bow top railings features rounded pales, posts, and curved hoop tops which score highly for both safety and aesthetics, creating a secure and inviting environment while minimising injury risk. Additionally, the railings are built with welded pale-through-rail construction and tamper-proof panel-to-post connectors, ensuring that the fencing is resistant to vandalism or break-in attempts. Weather-resistant railings Made from galvanised tubular steel, these railings are strong and weather-resistant. The polyester powder coating ensures a sleek, durable finish that won't crack or peel, offering long-lasting protection against wear and tear. This combination makes the railings both visually appealing and a sustainable investment. The design of the railings complements the home’s contemporary architecture and seamlessly blends with the surrounding landscaped gardens, creating a harmonious and secure environment for residents. Each railing installation is backed by a 25-year Service Life Guarantee from Jacksons Fencing, providing long-term peace of mind that the fencing will continue to deliver security and aesthetic value for years to come. A sense of safety and autonomy The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access Located adjacent to the reception entrance, the garden’s visibility offers visitors and prospective residents immediate assurance that their loved ones are in a safe and welcoming space. The vertical pale design of the fence ensures high visibility, which not only improves supervision but also enhances the autonomy of residents by making them feel connected to the outside world. The advanced keypad entry system at the entrance further enhances security, not allowing unauthorised access, while maintaining ease of entry for staff and residents. Bow top fencing and gates Reflecting on the success of the project, Peter Jackson, Managing Director at Jacksons Fencing, commented, “The installation of our bow top fencing and gates has not only provided Cavell Park Care Home with a secure and well-defined perimeter but also ensured exceptional durability. Jacksons Fencing’s products are designed to withstand the test of time, offering long-term protection while retaining an attractive finish." “A care home is more than just a building - it’s a community where safety, comfort, and a sense of belonging are paramount,” continued Peter. “We’re proud to have played a role in bringing this vision to life and blending robust security with sleek design.”
DP World Yarimca, one of the largest container terminals of the Gulf of İzmit and Turkey, is a strong proponent of using industry-pioneering technology to deliver unrivaled value to its customers and partners. As the port is growing, DP World Yarimca needs to continue to provide uninterrupted operations and a high level of security. To address these challenges, DP World Yarimca has embraced innovative technological products, including FLIR's comprehensive portfolio of security monitoring solutions. DP World Yarimca: An overview DP World Yarimca is located in the heart of Anatolia, Turkey. The port is the gateway to overseas markets to many Turkish firms and it supports economic activity in the East Marmara region and a large part of Anatolia. DP World Yarimca can berth four vessels or two ultra-large container ships at the same time, making it Turkey’s fastest and most efficient port. Maintaining safe and uninterrupted operations for its customers is one of the main tasks of the DP World Yarimca port operators, but it’s frequently complicated by illegal fishing, diving, and mussel poaching along the region. Challenges faced by DP World Yarimca Illegal fishing and mussel poaching Harvesting the mussels could also damage the port’s cathodic protection system Mussels are growing abundantly on the piles that support the port’s berths. This is a main attraction for mussel poachers. Not only is this activity illegal, but it also poses a serious safety risk for poachers as well as for people who are legally active in the port. Harvesting the mussels could also damage the port’s cathodic protection system, a system that prevents corrosion on submerged and underground metallic structures. “Mussel poachers prevent us from efficiently monitoring our port activity and they potentially interrupt our operations,” says Ismail Karaçam, HSSE Manager at DP World Yarimca. Delays in vessel maneouvering In addition, illegal hunters and divers can enter the vessel maneuvering areas and cause delays in the berthing and departure of vessels. This can cause disruptions in the supply chain. DP World Yarimca's commitment to security Since its formation, the port has always viewed security as its top priority. The organisation has always provided the necessary technology to monitor activities from the seaside and to guarantee security and sustained operations at the container site. When their current security monitoring system reached the end of life, DP World’s security team was looking for a new solution that could help them detect intruders both onshore and at sea. Finding the right port security monitoring solution The port security team scanned the market for new technology and learned about FLIR’s visible portfolio The port security team scanned the market for new technology and learned about FLIR’s visible and thermal security monitoring portfolio through Turkish distributor and integrator IRMARINETECH. “We had completed port security projects in Turkey before,” says Koray Serbest, founder of IRMARINETECH. “This already instilled confidence in the team of DP World that we could meet their needs. After convincing product demonstrations and proofs of concepts, DP World Yarimca decided to collaborate with us and FLIR.” Enhancing port security with FLIR’s thermal and visible cameras FLIR's thermal and visible camera systems have revolutionised DP World Yarimca's approach to port security. These advanced technologies empower the port's security team to monitor illegal activities during nighttime, inclement weather conditions, and from extended distances. Monitoring activities at sea and at night “The illegal fishermen and divers had proven to be very resourceful in their activities,” says Ismail Karaçam. “One of their tactics was to paint their boat black, so they were invisible at night for our current camera systems." "That’s when we knew we needed thermal camera technology. With the thermal cameras from FLIR, we can now monitor any illegal activity at night, in challenging weather conditions like rain or fog, and from a long distance.” Detection of intruders and man-overboard situations The port operators have a 24/7 view of intruders at sea, but they also use cameras to monitor To monitor the port’s 800-meter shoreline and activities up to 200 meters out to sea, the port invested in FLIR’s thermal cameras, including the FC-Series ID analytical camera, the Saros dome camera, and the M232 pan/tilt marine thermal camera. The port operators have a 24/7 view of intruders at sea, but they also use the cameras to monitor for man overboard situations and oil spills. The port’s security patrols also make use of a FLIR Scion thermal handheld camera to detect fishermen and divers hiding under the rocks, who enter under the berth in complete darkness. Perimeter security and container area monitoring A combination of thermal and visible cameras, like the FLIR Quasar panoramic and PTZ cameras, are used to monitor the site’s perimeter security as well as the activities inside the container area. FLIR’s wide portfolio and local support DP World Yarimca was well aware of FLIR’s strong reputation in the field of port security monitoring. Ultimately, it was the visual quality of the thermal camera systems and the ability to offer highly accurate imaging over a long distance that convinced the DP World Yarimca security management team. In addition, FLIR was able to present a suitable solution for every specific security need and application in the port by bringing in a combination of the company’s wide portfolio of enterprise, perimeter security, and maritime monitoring solutions. Support and service The support of IRMARINETECH was a confirmation that DP World Yarimca had made the right choice The support of a dedicated and local FLIR support partner like IRMARINETECH was a confirmation that DP World Yarimca had made the right choice. “We want to guarantee continued security to our customers, which means that we just cannot afford technical downtime,” says the Security Manager at DP World Yarimca. “So, in case we need technical maintenance, spare parts, or a quick product replacement, we are confident that we can rely on the support and service from our local partner IRMARINETECH.” DP World Yarimca's focus on technology innovation As a firm believer in digital transformation, DP World Yarimca continually seeks opportunities to enhance its physical infrastructure's efficiency. FLIR stands as a reliable partner, supporting DP World Yarimca's commitment to leveraging technology for future growth and security advancements. The port is actively exploring collaborations with FLIR to implement additional security measures and augment existing systems. Future collaborations and security advancements The port is already collaborating with FLIR to investigate how visible and thermal camera technology can bring the organisation additional security gains. The possibility of detecting fires in an early stage is a valuable contribution to the port’s security strategy One of the possibilities they are exploring is the addition of thermal boom cameras installed on cranes to monitor the surroundings of the vessels. Another application is the addition of thermal fire detection cameras. Many of the port’s customers are carrying highly flammable products into the port. The possibility of detecting fires in an early stage is a valuable contribution to the port’s security strategy. FLIR FH-Series R Thermal cameras like the FLIR FH-Series R can automatically spot small temperature changes in their field of view, identify hot spots before they ignite, and provide an early warning response to avoid a full-on fire outbreak before assets are harmed or safety is compromised. Upon detection, an alert can be sent to an operator through a connected Video Management System (VMS) for instantaneous assessment and deployment of response tactics.
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over a two-year period by specialist security installer, Scottish Communications Group. HID Mobile Access licences University has purchased 10,000 HID Mobile Access licences to offer its academic community In addition, the University has purchased 10,000 HID Mobile Access licences to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. “We wanted a modern system which is safe, secure and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. HID solution: future-proof equipment Stebbing added: “Complying with forthcoming legislation was also another important project requirement. With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we have a duty to protect to ensure everyone is safe." "The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” Ambitious development plans University of Dundee is a research institute in Scotland, noted for its academic merit in dentistry The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering and life sciences. Based in the heart of the city, it is home to over 16,000 students, 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organisations flexible laboratory, meeting and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. New HID Signo readers The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP (Open Supervised Device Protocol) and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers, thereby speeding up the rollout. RFID cards access buildings The university used to print and issue plastic RFID cards so staff and students could access buildings Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week, when some 2,500 – 3,000 undergraduate and postgraduate students enrol. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Origo management software Shifting to HID Mobile Access – which utilises cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licencing, allocation of credentials, setting of building access rights, validating or revoking of IDs – all of which is now done virtually and remotely. Improve the mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Integrate with digital campus cards While the strategy and aspiration are for the university population to shift wholesale to mobile access While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach now is to operate a dual system. “We recognise that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO range of ID card printers Given that RFID cards are still required now, the University of Dundee utilises its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. HID’s reputation University of Dundee utilises its FARGO DTC4500e printers to back up this shift to digital change “HID Signo readers are going in now across the main buildings, including the new Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications and authentication standards. Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” MOTORTRBO Ion smart radios In addition, Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems and CriticalArc Safezone® App, security staff need carry only a single device to fulfil their duties.
Thames Valley Police worked with local authorities to improve CCTV coverage, cut costs, and boost efficiency. It’s made public spaces safer and ensured long-term, reliable monitoring across the region. Thames Valley Police is the largest non-metropolitan police force in England and Wales, covering 2,218 square miles and a population of 2.42 million people. Its jurisdiction includes multiple towns, city centres and council areas across the three counties of Berkshire, Buckinghamshire and Oxfordshire. Setting a long-term vision for public space CCTV Public space CCTV is vital in deterring and detecting crime across the Thames Valley Public space CCTV is vital in deterring and detecting crime across the Thames Valley. However, significant pressure on local authority budgets has made it increasingly difficult for councils to provide public space CCTV. There was real jeopardy that financial constraints would result in unmaintained systems, with limited or no real-time monitoring. A fresh approach was needed, so the Thames Valley CCTV partnership between Genetec™ and Hanwha Vision was formed. The first major challenge was securing funding to overhaul several local authorities’ ageing systems, which were proving increasingly expensive to upgrade and maintain. The second was to manage the ongoing costs of staffing control rooms to ensure the long-term sustainability of monitored CCTV across the Thames Valley. Ownership and monitoring of public space CCTV Ambitious plans were devised to pool resources and replace many disparate systems with one police-owned system that could extend across multiple authorities. In effect, the aim was to transfer the ownership and monitoring of public space CCTV from local authorities to dedicated Thames Valley Police control rooms. It would be led by the Thames Valley Police & Crime Commissioner (PCC) Matthew Barber, collaborating with any local authority who chose to participate. It was a feat that had never been attempted in the UK on this scale that held the potential to drive efficiencies and enhance CCTV provision in areas it might otherwise have deteriorated. Ongoing commitment and investment “CCTV is an important part of community safety; benefitting police and local communities in helping to deter crime and antisocial behaviour, identify offenders and support prosecutions." "Ongoing commitment and investment enables high quality, consistent and sustainable CCTV provision now and into the future”, explains Matthew Barber, PCC, Thames Valley. Centralisation creates area-wide visibility and control Several control rooms in the Thames Valley, like Windsor & Maidenhead, had implemented Genetec Security Centre Several control rooms in the Thames Valley, such as Windsor & Maidenhead, had already implemented Genetec Security Centre and were very happy with its operation. Furthermore, as an open platform video management system, it could minimise costs by supporting a phased unification or “takeover” of existing systems across the Thames Valley. Finally, its hybrid cloud architecture provided Thames Valley with maximal flexibility to leverage any combination of cloud or on-premises infrastructure according to Name Thames Valley Police Industries Public Safety Location Thames Valley, United Kingdom Products Genetec Security Centre; Genetec Cloud Services; Federation Technology Partners Hanwha Vision Channel Partners CDS Systems what made sense for each application and location. This made it the obvious choice on which to standardise. Range of multidirectional AI-enabled cameras Following a competitive tender, Thames Valley chose CDS Systems to implement its proposed solution. This would be built on Genetec Security Centre and incorporate a range of multidirectional AI-enabled cameras from Hanwha Vision. A key driver in the decision was the high levels of commitment shown by all three parties to cybersecurity. Another was the recognition that the system design and technology selection could ensure a cost-effective implementation that could continue to evolve in line with the needs of its users. Integration between Genetec and Hanwha Vision technology Legacy cameras were retained and reused to maximise the return on existing investment wherever possible “We urgently needed to improve the quality of CCTV, enhance collaboration, and drive efficiencies for all partners. The respective capabilities and seamless integration between Genetec and Hanwha Vision technology was the optimal way of meeting Thames Valley’s requirements,” says Sam Thomas, CDS Systems. Phase one of the deployment involved CDS taking over an existing control room in Milton Keynes, replacing the legacy analogue infrastructure with a modern IP backbone. It then installed Genetec Security Centre to establish one platform through which officers could smartly interact with all incoming video feeds. Legacy cameras were retained and reused to maximise the return on existing investment wherever possible. A second Genetec workstation was also set up inside Slough Police Station, allowing officers to rapidly review footage for improved community response. Hanwha Vision’s AI-enabled multidirectional cameras CDS then introduced Hanwha Vision’s AI-enabled multidirectional 4k cameras to improve CCTV coverage and quality in public spaces. Each of these cameras incorporates up to five cameras in one device for wide-area surveillance, which would previously have required several separate devices, simplifying installation and resulting in significantly less associated cabling and infrastructure. They also provide powerful AI analytics, including accurate object detection and classification, to enable forensic search and save operators' time when responding to incidents. For example, identifying and establishing the movement of specific people or vehicles based on attributes such as vehicle type. Thames Valley CCTV partnership Phase two will see four additional control rooms in Oxfordshire merged into a single hub Phase two will see four additional control rooms in Oxfordshire merged into a single hub inside Abingdon Police station, also built on the Genetec Security Centre. This and the control room in Milton Keynes will be interlinked, adding further resilience as each site will be able to act as a fallback for the other. At this point, there will be a dedicated team of eighteen staff responsible for monitoring CCTV and enhancing CCTV for all participating communities in the Thames Valley CCTV Partnership. Innovative and cost-effective solutions “The CCTV Command Suite enabled by CDS, Genetec and Hanwha Vision has improved our workflows beyond recognition, enabling staff to quickly review and package evidence for frontline officers or more complex investigations. It has received several plaudits from officers for its ease of use,” says Jason Owen, CCTV Operations Manager, Thames Valley Police. “This collaboration between Thames Valley Police, Genetec, CDS Systems, and Hanwha Vision showcases the power of partnership in driving innovative, cost-effective solutions that improve public safety,” says John Boorman, Head of Product and Marketing at Hanwha Vision Europe. “Our AI-enabled cameras are designed to reduce false alarms and streamline operations, ensuring teams can focus on real incidents and drive efficiency across their monitoring.” Efficiency, at a lower cost All CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers Pooling resources and transferring ownership to the police has brought about significant cost efficiencies for participating authorities, while also enhancing the quality and reliability of public spaces CCTV. Just as importantly, it has dramatically improved the police’s direct access to quality video evidence. Unlike in a traditional council-run control room, all CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers. This means they have full access to Thames Valley’s suite of police databases and reporting software packages. They are better equipped to rapidly report incidents, support front-line officers, and communicate effectively with investigators as a result. On average, it handles between 300 – 500 incidents a month and has substantially increased the number of successful requests for supporting footage. “We’ve immediately seen the benefit of our investment in equipment and CCTV operators, with the police now much better equipped to deter and detect crime across the Thames Valley,” adds Barber. A solid platform for further improvements Control room operators’ intuition will always be the driving force that brings results Looking forward, Thames Valley has plans to use the Genetec platform to connect its people and mobile surveillance assets back to its control rooms for better cross-force interaction. Genetec Federation as a Service is already allowing live and recorded video to be shared with officers in the field. Soon it will also be extended to ensure video from police CCTV vans and drones is immediately available in the control room. In both cases this is achieved without complex network configuration, requiring only an internet connection. It is also at the beginning of its journey of fully realising the value of the AI-equipped Hanwha Vision cameras specified by CDS. Control room operators’ intuition will always be the driving force that brings results, but AI is freeing them up to do what they do best by saving time on routine monitoring and searches. Cost savings, resilience, and efficiencies Finally, talks continue that would see the addition of further control rooms across the Thames Valley to the Thames Valley CCTV Partnership. Having proven the model, would allow it to scale operations further to deliver even greater cost savings, resilience, and efficiencies. “We’re proud of what we’ve achieved to date but have no intention of resting on our laurels. The foundations we’ve established will ensure continued high-quality, consistent, and sustainable CCTV provision for our communities,” concludes Owen.
Modern measurement technologies enable high-precision detection of the movement of liquids and gases - and thus provide valuable data for numerous applications. How does the air flow around an aeroplane? How does the blood move through our veins? And how can pollutant emissions in combustion processes be minimised? For this purpose, speed, direction, pressure and turbulence within a flow are analysed in order to increase efficiency, ensure safety and drive innovation in a wide variety of areas. Innovative sensor technology High-resolution cameras are used to track marked particles within a flow and analyse their movement A range of methods are available to measure these flows, including visual ones such as particle image velocimetry (PIV). High-resolution cameras are used to track marked particles within a flow and analyse their movement. iLA_5150 GmbH from Aachen (Germany) now also relies on EBIV. The abbreviation stands for Event-Based Particle Image Velocimetry and is a new optical method for the qualitative and quantitative visualisation of flows and flow velocities. It combines PIV with event-based cameras, here with a uEye EVS from IDS Imaging Development Systems GmbH. The innovative sensor technology of the industrial camera enables highly dynamic and energy-efficient detection, especially of fast and turbulent movements. Application In the EBIV method, tiny particles are added to a flowing fluid and illuminated in a plane, the so-called light section plane. They generate individual light pulses as they enter and exit the LED light section. This change in local brightness is recorded independently by the camera pixels and transmitted to the PC as a data stream of "change events". In contrast to conventional cameras, event-based models therefore only react to the changes in brightness registered in the image field. Stationary scattered light, such as background or a non-changing illuminated surface, does not generate a measurement signal. This reduces the amount of data considerably. Frame rates of up to 10,000 frames per second The data stream essentially contains information about what happens, when and where The data stream essentially contains information about what happens, when and where. In detail, these are the pixel coordinates on the sensor, microsecond time stamps of the pixel events and the information about the events: ON or OFF. This allows a distinction to be made between increasing intensity (ON event) and decreasing intensity (OFF event). Using suitable software, the stream can be converted into an image matrix in which both the spatial information and the linear time base of the stream are available. The result is comparable to the extremely high frame rate of a high-speed camera. EBIV measurement method "The EBIV measurement method differs fundamentally from conventional imaging methods. They usually generate very large amounts of data and require powerful peripherals that can process them. For exceptional frame rates of 1000 Hertz and more, the image-based cameras required are themselves very complex and expensive." "With the help of event-based camera technology, comparable frame rates of 10,000 frames per second are possible, whereby only standard PC interfaces such as USB with a few gigabits per second are required. The price of the event-based models themselves is significantly lower than that of corresponding high-speed cameras and is therefore also very interesting for smaller teaching and research institutions," explains Dr André Brunn - Head of Development at iLA_5150 GmbH. Further processing The user can optimise the display of the move paths and adapt them to unique study objectives The data stream is converted into image data and displayed in a front end - the so-called EBIV viewer - for direct online flow visualisation. The user can also select the integration time, which corresponds to the exposure time of an image camera, as well as the time increments of the sequence, i.e., the period between two consecutive shots. Classic image filters can also be used. With the help of these settings, the user can optimise the display of the movement paths and adapt them to individual examination objectives. Both fine flow details and large-scale patterns can be made more clearly recognisable. This ability to readjust the measurement results is another advantage of the event-based approach. Numerical analysis of the flow properties In the qualitative visualisation of the flow in the EBIV-View, particles are continuously illuminated so that they are visible as luminous traces. The method is therefore very well suited to visualising the flow. However, it does not provide exact measurements of its speed or direction. For a precise, numerical analysis of the flow properties, individual particles are illuminated for a moment using short, time-defined light pulses. Image sequences of the event-based camera As with classic PIV, the image sequences of the event-based camera can also be statistically analysed This allows their exact position to be recorded and their movement quantified. By comparing the particle positions in successive images, the speed and direction of the flow can be precisely calculated using PIV, for example. The result is a transient 2D vector field that changes over time - in other words, the vectors do not remain constant. As with classic PIV, the image sequences of the event-based camera can also be statistically analysed, for example, to determine mean values and fluctuations in the flow velocity. Camera and software On the camera side, iLA relies on a uEye XCP-E from IDS. The small, lightweight industrial camera offers event-based sensor technology in a robust die-cast zinc housing (29 × 29 × 17 mm) with screw-on USB Micro-B connection. It is compatible with all standard C-mount lens sizes. This makes it ideal for both industrial and non-industrial areas. The integrated event-based vision sensor (EVS) was developed by Sony and Prophesee. It is supported by the Metavision SDK, a seamlessly integrated suite of software tools and models, APIs and other training and development resources from Prophesee for efficient analysis, visualisation and customisation. Building on this, the EBIV viewer from iLA_5150/PIVTec is specially tailored to flow visualisation applications. Outlook The optimisation of fluidic systems and processes requires detailed knowledge of the flow conditions The optimisation of fluidic systems and processes requires detailed knowledge of the flow conditions. A qualitative flow visualisation is often sufficient to understand effects and develop suitable control mechanisms. Until now, however, imaging fast flows with high temporal resolution was usually only possible with expensive high-speed cameras. Event-based camera technology offers a cost-effective alternative that requires significantly less technical effort. These “simple” methods have been lacking in teaching and research in particular. Thanks to the extreme data reduction, this technology also allows the use of several cameras or large camera arrays without the periphery becoming a limitation for data transfer. The compact design of the uEye EVS models also makes them ideal for mobile applications. This means that real application environments can be analysed directly for the first time - without having to rely on artificial flow models or channels. Established flow measurement methods Event-based cameras enable efficient, cost-effective and high-resolution visualisation and quantification of flows. Due to the small amounts of data generated, many processes can be analysed almost in real time, which also makes them interesting for use in fully automated systems. Established flow measurement methods such as Particle Image Velocimetry (PIV) can be seamlessly integrated and expanded. The technology can be used wherever flow information is captured by changes in scattered light intensity - be it from moving particles or vibrating surfaces.


Round table discussion
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might be suspicious, but the situation is different if they are yelling for help. Furthermore, audio enables operators to talk remotely to people on site, which can deter crime, de-escalate situations, or gather information. And yet, optimising audio is often an overlooked aspect of physical security system design. We asked this week's Expert Panel Roundtable: What is the expanding role of audio in today's physical security systems?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionise physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products


Videos
Green security: Manufacturers & Suppliers

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download