Hybrid security
iDenfy, a Lithuania-based RegTech solution provider best known for its fraud prevention tools, announced a new milestone established by recognition from G2. A pioneer B2B review platform, which has named iDenfy as one of the Best Software Products of 2025. This marks iDenfy’s debut on the top 100 list, with the company securing 44th place in the Financial Services Products category and 48th place in the Data Privacy Products section. Trusted security solutions G2’s rankings...
In a powerful show of solidarity, the U.S. security industry gathered for a crucial information-sharing webcast concerning recovery efforts for the Los Angeles-area wildfires disaster. Hosted by the Security Industry Association (SIA) and coordinated by Elite Interactive Solutions Marketing Director Scott Goldfine — with official endorsements from the Electronic Security Association (ESA), The Monitoring Association (TMA) and PSA Security Network (PSA) Collaborating for wildfire re...
Security Central is excited to announce the addition of Adam Emmett as our new Southeast Account Executive. With over 12 years of experience in the security industry, Adam brings a deep understanding of dealer success, emerging technology, and relationship-driven growth. Since beginning his career in security product manufacturing in 2013, Adam has built a strong reputation in the industry. A legacy of innovation With a passion for dealer growth and industry innovation, Adam bring...
India is among the world’s fastest-growing data centre markets. Hands-on specification support provided by specialists in access and security management technologies can help data centre architects, construction companies, project managers and other stakeholders work smarter in this complex field – and stay ahead of their competitors. When Edifice was designing a new data centre in Hyderabad, for example, security was clearly a top priority. By working with access experts at ASSA AB...
The practice of executive protection changed forever on Dec. 4, 2024, when UnitedHealthcare CEO Brian Thompson was shot outside a Manhattan, New York, hotel. The shocking event raised awareness in board rooms around the world about the need for, and challenges of, executive protection. Questions followed immediately, including why was the high-level executive not protected? Combination of risk and reward UnitedHealthcare’s stock price has gone down more than 20% since the sh...
Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced the appointment of Ha Hoang as its new Chief Information Officer (CIO). With over 25 years of experience in pioneering enterprise technology transformations for Fortune 500 companies, Hoang brings a wealth of expertise in cloud strategy, SaaS optimisation, and global infrastructure operations. Prior roles of Hoang In her role as CIO, Hoang will focus on advancing next-generation...
News
SharpEagle Technology, a global pioneer in industrial safety solutions, unveiled the top trends to redefine safety protocols across industries in 2025. With advancements in technology shaping the future of workplace safety, SharpEagle continues to take charge of integrating innovation with robust solutions to protect lives and assets. AI-Driven Predictive Analytics Artificial intelligence (AI) is becoming a cornerstone of industrial safety. In 2025, predictive analytics powered by AI will enable organizations to anticipate potential hazards before they occur. To deliver actionable insights, AI algorithms analyze historical data from workplace accidents to machinery breakdowns. This reduces risks and improves preventive measures. Advanced Vision Systems for Enhanced Monitoring With its advanced explosion-proof camera solutions, SharpEagle is at the forefront The demand for high-performance vision systems continues to grow. With its advanced explosion-proof camera solutions, SharpEagle is at the forefront. These systems guarantee round-the-clock surveillance in dangerous areas, offering real-time observation to avert mishaps and aid emergency response activities. Wearable Safety Tech Personal safety in industrial environments is being revolutionized by smart wearables with sensors. Devices like smart helmets, gloves, and vests monitor workers' health metrics and environmental conditions, instantly alerting supervisors to potential risks. This trend reflects the growing emphasis on worker-centric safety solutions. IoT Integration for Real-Time Safety Management The Internet of Things (IoT) is transforming how safety is managed on industrial sites. Connected devices and sensors create an integrated ecosystem, providing real-time data on equipment performance, environmental conditions, and worker safety. Organizations may make well-informed decisions more quickly and effectively with the help of IoT-enabled solutions. Enhanced Safety Training with AR and VR In addition to improving learning, this method lowers the possibility of mistakes in high-risk scenarios Augmented Reality (AR) and Virtual Reality (VR) are redefining safety training. Immersive simulations allow workers to experience and respond to realistic scenarios in a controlled environment. In addition to improving learning, this method lowers the possibility of mistakes in high-risk scenarios. Automation for Hazardous Tasks Robotics and automation are playing a vital role in industrial safety. By delegating hazardous tasks to machines, companies can significantly reduce risks to human workers. Automated systems are valuable in industries like oil and gas, mining, and chemical processing. Sustainability and Green Safety Technologies Eco-friendly safety systems are becoming more popular as industries place a higher priority on sustainability. In 2025, there will be a greater emphasis on striking a balance between environmental responsibility and protection, from energy-efficient safety equipment to sustainable manufacturing practices. Commitment to Innovation SharpEagle Technology's mission is to innovate and deliver solutions that safeguard lives while enabling industries to thrive. SharpEagle Technology intends to introduce some new solutions that are intended to satisfy the evolving needs of industrial safety. These innovations will utilize innovative advancements such as AI-driven analytics, IoT integration, and enhanced monitoring technologies, ensuring industries stay ahead in safety and efficiency. SharpEagle Technology invites stakeholders to explore these emerging trends and collaborate in driving safety excellence across industries.
Trane Technologies, a global climate innovator, has been recognised in Corporate Knights’ 2025 Global 100 ranking. This is the third time Trane Technologies has been featured on this annual list, which recognises companies for their investments in green solutions such as renewable energy, energy efficiency, and the circular economy. sustainable future "It’s an incredible honor to be recognised in Corporate Knights’ 2025 Global 100 ranking," said Mauro Atalla, Senior Vice President, Chief Technology and Sustainability Officer, Trane Technologies. "This acknowledgment underscores our dedication to pioneering groundbreaking innovations for our customers, pushing the boundaries of possibility, and pioneering the transformation to a more sustainable future for all.” BrainBox AI BrainBox AI leverages deep learning algorithms to predict building energy needs and automate HVAC systems For over a decade, sustainability has been the cornerstone of Trane Technologies’ business strategy and integrated into every aspect of how we do business. This was recently demonstrated through the company’s acquisition of BrainBox AI, a pioneer in autonomous HVAC controls and generative Artificial Intelligence (AI) building technology. BrainBox AI leverages deep learning algorithms to predict building energy needs and automate HVAC systems, resulting in up to a 25% reduction in energy consumption and up to a 40% decrease in greenhouse gas (GHG) emissions. 40% reduced carbon footprint Trane Technologies recently became the first company in its industry to commit to a 40% reduction in embodied carbon by partnering with material suppliers and incorporating circular design criteria, addressing the significant carbon footprint of buildings. This commitment builds on Trane Technologies’ 2030 Sustainability Commitments, including the Gigaton Challenge, and its pledge to be net-zero by 2050.
The Keyholding Company (TKC), a tech-enabled security services company, has officially become B Corp Certified. It joins a global community of around 9,000 businesses dedicated to meeting high standards of environmental and social impact. Ethical business practice B Corp is a global standard for ethical business practice established by B Lab. This non-profit organisation is working towards a common vision of “business as a force for good”. Being B Corp Certified represents a commitment to operating with transparency and accountability, in which businesses must balance profit with purpose. For TKC, this certification affirms its commitment to ethical practices, sustainability, and driving positive impact within the security industry. Evaluation and ESG initiatives TKC believes that exceptional security services can coexist with a commitment to protecting people and the planet To achieve certification, TKC underwent B Lab's rigorous B Impact Assessment, which evaluates performance across five key areas: Governance, Environment, Workers, Community, and Customers. TKC believes that exceptional security services can coexist with a commitment to protecting people and the planet. Therefore, it saw achieving B Corp Certification as the ideal framework for uniting the many ESG initiatives it already had in place. Sustainability, and community impact This belief drives their commitment to impactful actions, such as introducing an electric vehicle fleet within their London Operations, implementing transparent emissions reporting, fostering active ED&I strategies geared towards personal and professional development (like the award-nominated My TKC Journey initiative), and championing local businesses via their service partner network. “Our B Corp Certification highlights that the security industry can and should take ethics, sustainability, and community impact seriously," says Charlie Gordon Lennox, TKC’s CEO. Operational excellence “There is an increasing call for responsible practices. We want to show that upholding high ethical standards while maintaining operational excellence is possible.” Maintaining the certification requires ongoing commitment, with companies needing to re-certify every three years and publish annual Impact Reports, detailing how they track against various assessment criteria and sustainability objectives. So, TKC has still more work ahead. While proud of reaching this milestone, they are committed to continually raising standards and pursuing their vision of an inclusive, equitable, and sustainable security industry.
Nutanix, a pioneer in hybrid multi-cloud computing announced the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress with cloud adoption. The report sheds light on Generative Artificial Intelligence (GenAI) adoption, investment priorities, and benefits along with key challenges organisations face to meet the demands of these emerging workloads. GenAI application adoption As GenAI application adoption and implementation move at a blazing pace, the ECI uncovered that while the majority of organisations have already implemented a GenAI strategy, implementation targets vary significantly. Organisations are eager to leverage GenAI for productivity, automation, and innovation, but they also face critical hurdles in the form of data security, compliance, and IT infrastructure modernisation. Further, 90% of respondents expect their IT costs to rise due to GenAI and modern application implementation. But promisingly, 70% of organisations expect to make a return on their investment from GenAI projects over the next two to three years. Data governance, privacy, and visibility “Many organisations have reached an inflection point with GenAI implementation and deployment,” said Lee Caswell, SVP, Product and Solutions Marketing at Nutanix. “This year’s ECI revealed key trends that we’re hearing from customers as well, including challenges with scaling GenAI workloads from development to production, new requirements GenAI creates for data governance, privacy, and visibility, and integration with existing IT infrastructure. To successfully unlock ROI with GenAI projects, organisations need to take a holistic approach to modernising applications and infrastructure and embrace containerisation.” Key findings Application containerisation is the new infrastructure standard. Nearly 90% of organisations report that at least some of their applications are now containerised, and this number is expected to grow with the rapid adoption of new application workloads like GenAI. Simply put, 94% of respondents agree that their organisation benefits from adopting cloud native applications/containers. This approach to infrastructure and application development should be considered the gold standard for delivering seamless, secure access to data across hybrid and multicloud environments. GenAI application adoption and implementation continue at a rapid pace. Over 80% of organisations have already implemented a GenAI strategy with only 2% of organisations admitting that they have not started planning their GenAI strategy. That said, implementation targets vary significantly. Most organisations believe GenAI solutions will help improve their organisation’s levels of productivity, automation, and efficiency. Meanwhile, real-world GenAI use cases gravitate towards customer support and experience solutions today. However, organisations aspire to apply GenAI solutions to cybersecurity and data protection workloads in the near future. GenAI adoption will challenge traditional norms for data security and privacy. 95% of respondents agree that GenAI is changing their organisation’s priorities, with security and privacy being a primary concern. Over 90% of organisations say data privacy is a priority for their organisation when implementing GenAI solutions. Clearly, organisations understand that security and privacy are critical components of GenAI success. However, a staggering 95% of respondents still believe their organisation could be doing more to secure its GenAI models and applications. Security and privacy will remain a major challenge for organisations as they seek to justify the use of emerging, GenAI-based solutions and ensure that they adhere to traditional security norms, as well as new requirements for data governance, privacy, and visibility. Infrastructure modernisation to support GenAI at scale. Running cloud native applications at enterprise scale requires an infrastructure that can support the necessary requirements including security, data integrity and resilience. Emerging GenAI applications are no exception to this rule. Almost all respondents (98%) face challenges when it comes to scaling GenAI workloads from development to production. In fact, the #1 challenge organisations face when scaling GenAI workloads from development into production is integration with existing IT infrastructure. As a result, IT Infrastructure was chosen as the #1 area of investment needed to support GenAI. GenAI solution adoption requires changes to technology and people. 52% of respondents say their organisation needs to invest in IT training to support GenAI. Similarly, 48% of respondents believe their organisation needs to hire new IT talent to support GenAI. There is no denying organisations face acute skills shortages and competition for GenAI-related talent. The good news? Many teams will embrace the challenge to adopt AI-related competencies and skills organically, as part of normal work. The survey shows that 53% of respondents believe advancements in GenAI will provide them with an opportunity to become an AI expert. Global research study For the seventh consecutive year, Nutanix commissioned a global research study to learn about the state of global enterprise cloud deployments, application containerisation trends, and GenAI application adoption. In the Fall of 2024, U.K. researcher Vanson Bourne surveyed 1,500 IT and DevOps/Platform Engineering decision-makers around the world. The respondent base spanned multiple industries, business sizes, and geographies, including North and South America; Europe, the Middle East and Africa (EMEA); and Asia-Pacific-Japan (APJ) region.
March Networks®, a global pioneer in cloud-based intelligent video surveillance, is proud to celebrate its 25th anniversary. For a quarter of a century, March Networks has been at the forefront of the security and business intelligence industries, driving innovation in video surveillance and delivering solutions that help businesses around the world secure and improve their operations. Advanced video analytics Since its founding in 2000, March Networks has become a trusted partner for thousands of organisations in retail, banking, transportation, and more. The company has consistently pushed boundaries by introducing advanced, yet practical technology that empowers businesses with actionable insights and advanced video analytics. Over the years, March Networks has pioneered solutions that have helped our customers migrate from analog to IP video surveillance, and from on-premise systems to hybrid and cloud-based platforms that turn video into a proactive business tool. 4000 Series hybrid NVRs The company was the first to centralise all ATM transaction data across thousands of ATMs and seamlessly correlate it Starting with the groundbreaking reliability of the 4000 Series hybrid NVRs and the scalability of Enterprise Services Manager (ESM) central management software, March Networks earned the trust of many of the world’s largest companies, securing deployments across thousands of locations. The company was the first to centralise all ATM transaction data across thousands of ATMs and seamlessly correlate it with surveillance video in a single, unified enterprise system. 8000 Series NVRs Building on this foundation, March Networks introduced the next-generation 8000 Series NVRs and evolved ESM into Command Enterprise Software (CES), the most advanced enterprise video management system of its time. In 2005, the company reached another milestone with a successful IPO, becoming the first company to achieve a dual listing on the TSX and AIM. March Networks is proudly owned by Delta, a global leader in power and thermal management solutions. Generative AI March Networks is leading the movement of enterprise video to the cloud and the integration of Generative AI. The latest generation of NVRs, the revolutionary X-Series hybrid, and all-IP recorders, utilise NVIDIA chipsets and provide embedded AI capabilities that continue to advance. As March Networks enters its next 25 years, it remains committed to transforming video surveillance beyond security, making it a powerful business intelligence tool. The Searchlight Cloud platform integrates video with all types of video analytics metadata, IoT sensors, and transactional data from POS and ATM systems, delivering real-time security and loss prevention alerts, along with comprehensive dashboards to help organisations enhance efficiency and the customer experience. Generative AI-based Smart Search capabilities Customers benefit from end-to-end video and business intelligence solutions that provide valuable insights The recent launch of Generative AI-based Smart Search capabilities highlights March Networks’ commitment to innovation and the ongoing evolution of video technology. Customers benefit from end-to-end video and business intelligence solutions that provide valuable insights across multiple departments – from security and operations to marketing and HR. “Reaching this milestone is a testament to the dedication of our employees, the loyalty of our customers, and the strength of our partnerships,” said Peter Strom, President and CEO of March Networks. 25th-anniversary video “As we celebrate our 25th anniversary, we remain committed to delivering solutions that shape the future of intelligent video and help our customers succeed. We look forward to 25 more years of innovation, security, and growth in intelligent video solutions.” To mark this special occasion, March Networks has released a commemorative 25th anniversary video, showcasing key milestones, longtime employees, and the company’s vision for the future. Visitors are encouraged to visit and explore the company’s refreshed website to watch the video.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security Safety Act Designation, and Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced a new industry partnership. This collaboration will enhance safety measures across campuses nationwide, including hospitals and schools, by combining pioneering-edge detection technologies to better protect customers in these environments. ZeroEyes’ AI-powered solution ZeroEyes and Metrasens merge their forces to create a layered security method that uses education sectors Through this partnership, ZeroEyes and Metrasens combine their strengths to create a layered security approach that benefits both the education and healthcare sectors. ZeroEyes’ AI-powered solution leverages existing security cameras to proactively detect brandished firearms, instantly identifying visible threats in real time. Meanwhile, Metrasens’ advanced concealed weapons screening technology focuses on identifying hidden dangers, detecting concealed weapons without disrupting the flow of daily activities. Combined, these solutions offer a comprehensive, layered security approach, addressing both visible and hidden threats to ensure a safer environment. Advanced sensor technology Metrasens Ultra™, the most advanced concealed weapons detection system, uses cutting-edge technology to swiftly and accurately detect potential threats, including concealed weapons. With advanced sensor technology, it reliably detects ferrous items like guns, knives, and even vapes. Its lightweight, portable design and intuitive interface make it easy to operate in diverse environments. Widely adopted by school districts and hospitals nationwide, it provides precise weapons screening and integrates seamlessly into any setting, leveraging advanced algorithms, machine learning, and sensor technology to ensure the detection of threat items. Safety and reassurance “Security, especially in hospitals and schools, should create an environment of safety and reassurance, fostering comfort and well-being,” said Simon Goodyear, CEO of Metrasens. “We understand that there’s no one-size-fits-all solution, so we're thrilled to partner with ZeroEyes to offer a complete weapons detection solution to our current and future customers.” Digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local staff as quickly as 3 to 5 seconds from detection. Safeguard efforts “ZeroEyes is dedicated to eliminating gun violence, and our partnerships are instrumental in making this a reality,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Working with Metrasens to enhance the security of organisations across the country is a privilege, and we are excited to continue expanding our efforts to safeguard even more lives.”
SharpEagle Technology, a global pioneer in industrial safety solutions, unveiled the top trends to redefine safety protocols across industries in 2025. With advancements in technology shaping the future of workplace safety, SharpEagle continues to take charge of integrating innovation with robust solutions to protect lives and assets. AI-Driven Predictive Analytics Artificial intelligence (AI) is becoming a cornerstone of industrial safety. In 2025, predictive analytics powered by AI will enable organizations to anticipate potential hazards before they occur. To deliver actionable insights, AI algorithms analyze historical data from workplace accidents to machinery breakdowns. This reduces risks and improves preventive measures. Advanced Vision Systems for Enhanced Monitoring With its advanced explosion-proof camera solutions, SharpEagle is at the forefront The demand for high-performance vision systems continues to grow. With its advanced explosion-proof camera solutions, SharpEagle is at the forefront. These systems guarantee round-the-clock surveillance in dangerous areas, offering real-time observation to avert mishaps and aid emergency response activities. Wearable Safety Tech Personal safety in industrial environments is being revolutionized by smart wearables with sensors. Devices like smart helmets, gloves, and vests monitor workers' health metrics and environmental conditions, instantly alerting supervisors to potential risks. This trend reflects the growing emphasis on worker-centric safety solutions. IoT Integration for Real-Time Safety Management The Internet of Things (IoT) is transforming how safety is managed on industrial sites. Connected devices and sensors create an integrated ecosystem, providing real-time data on equipment performance, environmental conditions, and worker safety. Organizations may make well-informed decisions more quickly and effectively with the help of IoT-enabled solutions. Enhanced Safety Training with AR and VR In addition to improving learning, this method lowers the possibility of mistakes in high-risk scenarios Augmented Reality (AR) and Virtual Reality (VR) are redefining safety training. Immersive simulations allow workers to experience and respond to realistic scenarios in a controlled environment. In addition to improving learning, this method lowers the possibility of mistakes in high-risk scenarios. Automation for Hazardous Tasks Robotics and automation are playing a vital role in industrial safety. By delegating hazardous tasks to machines, companies can significantly reduce risks to human workers. Automated systems are valuable in industries like oil and gas, mining, and chemical processing. Sustainability and Green Safety Technologies Eco-friendly safety systems are becoming more popular as industries place a higher priority on sustainability. In 2025, there will be a greater emphasis on striking a balance between environmental responsibility and protection, from energy-efficient safety equipment to sustainable manufacturing practices. Commitment to Innovation SharpEagle Technology's mission is to innovate and deliver solutions that safeguard lives while enabling industries to thrive. SharpEagle Technology intends to introduce some new solutions that are intended to satisfy the evolving needs of industrial safety. These innovations will utilize innovative advancements such as AI-driven analytics, IoT integration, and enhanced monitoring technologies, ensuring industries stay ahead in safety and efficiency. SharpEagle Technology invites stakeholders to explore these emerging trends and collaborate in driving safety excellence across industries.
Trane Technologies, a global climate innovator, has been recognised in Corporate Knights’ 2025 Global 100 ranking. This is the third time Trane Technologies has been featured on this annual list, which recognises companies for their investments in green solutions such as renewable energy, energy efficiency, and the circular economy. sustainable future "It’s an incredible honor to be recognised in Corporate Knights’ 2025 Global 100 ranking," said Mauro Atalla, Senior Vice President, Chief Technology and Sustainability Officer, Trane Technologies. "This acknowledgment underscores our dedication to pioneering groundbreaking innovations for our customers, pushing the boundaries of possibility, and pioneering the transformation to a more sustainable future for all.” BrainBox AI BrainBox AI leverages deep learning algorithms to predict building energy needs and automate HVAC systems For over a decade, sustainability has been the cornerstone of Trane Technologies’ business strategy and integrated into every aspect of how we do business. This was recently demonstrated through the company’s acquisition of BrainBox AI, a pioneer in autonomous HVAC controls and generative Artificial Intelligence (AI) building technology. BrainBox AI leverages deep learning algorithms to predict building energy needs and automate HVAC systems, resulting in up to a 25% reduction in energy consumption and up to a 40% decrease in greenhouse gas (GHG) emissions. 40% reduced carbon footprint Trane Technologies recently became the first company in its industry to commit to a 40% reduction in embodied carbon by partnering with material suppliers and incorporating circular design criteria, addressing the significant carbon footprint of buildings. This commitment builds on Trane Technologies’ 2030 Sustainability Commitments, including the Gigaton Challenge, and its pledge to be net-zero by 2050.
The Keyholding Company (TKC), a tech-enabled security services company, has officially become B Corp Certified. It joins a global community of around 9,000 businesses dedicated to meeting high standards of environmental and social impact. Ethical business practice B Corp is a global standard for ethical business practice established by B Lab. This non-profit organisation is working towards a common vision of “business as a force for good”. Being B Corp Certified represents a commitment to operating with transparency and accountability, in which businesses must balance profit with purpose. For TKC, this certification affirms its commitment to ethical practices, sustainability, and driving positive impact within the security industry. Evaluation and ESG initiatives TKC believes that exceptional security services can coexist with a commitment to protecting people and the planet To achieve certification, TKC underwent B Lab's rigorous B Impact Assessment, which evaluates performance across five key areas: Governance, Environment, Workers, Community, and Customers. TKC believes that exceptional security services can coexist with a commitment to protecting people and the planet. Therefore, it saw achieving B Corp Certification as the ideal framework for uniting the many ESG initiatives it already had in place. Sustainability, and community impact This belief drives their commitment to impactful actions, such as introducing an electric vehicle fleet within their London Operations, implementing transparent emissions reporting, fostering active ED&I strategies geared towards personal and professional development (like the award-nominated My TKC Journey initiative), and championing local businesses via their service partner network. “Our B Corp Certification highlights that the security industry can and should take ethics, sustainability, and community impact seriously," says Charlie Gordon Lennox, TKC’s CEO. Operational excellence “There is an increasing call for responsible practices. We want to show that upholding high ethical standards while maintaining operational excellence is possible.” Maintaining the certification requires ongoing commitment, with companies needing to re-certify every three years and publish annual Impact Reports, detailing how they track against various assessment criteria and sustainability objectives. So, TKC has still more work ahead. While proud of reaching this milestone, they are committed to continually raising standards and pursuing their vision of an inclusive, equitable, and sustainable security industry.
Nutanix, a pioneer in hybrid multi-cloud computing announced the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress with cloud adoption. The report sheds light on Generative Artificial Intelligence (GenAI) adoption, investment priorities, and benefits along with key challenges organisations face to meet the demands of these emerging workloads. GenAI application adoption As GenAI application adoption and implementation move at a blazing pace, the ECI uncovered that while the majority of organisations have already implemented a GenAI strategy, implementation targets vary significantly. Organisations are eager to leverage GenAI for productivity, automation, and innovation, but they also face critical hurdles in the form of data security, compliance, and IT infrastructure modernisation. Further, 90% of respondents expect their IT costs to rise due to GenAI and modern application implementation. But promisingly, 70% of organisations expect to make a return on their investment from GenAI projects over the next two to three years. Data governance, privacy, and visibility “Many organisations have reached an inflection point with GenAI implementation and deployment,” said Lee Caswell, SVP, Product and Solutions Marketing at Nutanix. “This year’s ECI revealed key trends that we’re hearing from customers as well, including challenges with scaling GenAI workloads from development to production, new requirements GenAI creates for data governance, privacy, and visibility, and integration with existing IT infrastructure. To successfully unlock ROI with GenAI projects, organisations need to take a holistic approach to modernising applications and infrastructure and embrace containerisation.” Key findings Application containerisation is the new infrastructure standard. Nearly 90% of organisations report that at least some of their applications are now containerised, and this number is expected to grow with the rapid adoption of new application workloads like GenAI. Simply put, 94% of respondents agree that their organisation benefits from adopting cloud native applications/containers. This approach to infrastructure and application development should be considered the gold standard for delivering seamless, secure access to data across hybrid and multicloud environments. GenAI application adoption and implementation continue at a rapid pace. Over 80% of organisations have already implemented a GenAI strategy with only 2% of organisations admitting that they have not started planning their GenAI strategy. That said, implementation targets vary significantly. Most organisations believe GenAI solutions will help improve their organisation’s levels of productivity, automation, and efficiency. Meanwhile, real-world GenAI use cases gravitate towards customer support and experience solutions today. However, organisations aspire to apply GenAI solutions to cybersecurity and data protection workloads in the near future. GenAI adoption will challenge traditional norms for data security and privacy. 95% of respondents agree that GenAI is changing their organisation’s priorities, with security and privacy being a primary concern. Over 90% of organisations say data privacy is a priority for their organisation when implementing GenAI solutions. Clearly, organisations understand that security and privacy are critical components of GenAI success. However, a staggering 95% of respondents still believe their organisation could be doing more to secure its GenAI models and applications. Security and privacy will remain a major challenge for organisations as they seek to justify the use of emerging, GenAI-based solutions and ensure that they adhere to traditional security norms, as well as new requirements for data governance, privacy, and visibility. Infrastructure modernisation to support GenAI at scale. Running cloud native applications at enterprise scale requires an infrastructure that can support the necessary requirements including security, data integrity and resilience. Emerging GenAI applications are no exception to this rule. Almost all respondents (98%) face challenges when it comes to scaling GenAI workloads from development to production. In fact, the #1 challenge organisations face when scaling GenAI workloads from development into production is integration with existing IT infrastructure. As a result, IT Infrastructure was chosen as the #1 area of investment needed to support GenAI. GenAI solution adoption requires changes to technology and people. 52% of respondents say their organisation needs to invest in IT training to support GenAI. Similarly, 48% of respondents believe their organisation needs to hire new IT talent to support GenAI. There is no denying organisations face acute skills shortages and competition for GenAI-related talent. The good news? Many teams will embrace the challenge to adopt AI-related competencies and skills organically, as part of normal work. The survey shows that 53% of respondents believe advancements in GenAI will provide them with an opportunity to become an AI expert. Global research study For the seventh consecutive year, Nutanix commissioned a global research study to learn about the state of global enterprise cloud deployments, application containerisation trends, and GenAI application adoption. In the Fall of 2024, U.K. researcher Vanson Bourne surveyed 1,500 IT and DevOps/Platform Engineering decision-makers around the world. The respondent base spanned multiple industries, business sizes, and geographies, including North and South America; Europe, the Middle East and Africa (EMEA); and Asia-Pacific-Japan (APJ) region.
March Networks®, a global pioneer in cloud-based intelligent video surveillance, is proud to celebrate its 25th anniversary. For a quarter of a century, March Networks has been at the forefront of the security and business intelligence industries, driving innovation in video surveillance and delivering solutions that help businesses around the world secure and improve their operations. Advanced video analytics Since its founding in 2000, March Networks has become a trusted partner for thousands of organisations in retail, banking, transportation, and more. The company has consistently pushed boundaries by introducing advanced, yet practical technology that empowers businesses with actionable insights and advanced video analytics. Over the years, March Networks has pioneered solutions that have helped our customers migrate from analog to IP video surveillance, and from on-premise systems to hybrid and cloud-based platforms that turn video into a proactive business tool. 4000 Series hybrid NVRs The company was the first to centralise all ATM transaction data across thousands of ATMs and seamlessly correlate it Starting with the groundbreaking reliability of the 4000 Series hybrid NVRs and the scalability of Enterprise Services Manager (ESM) central management software, March Networks earned the trust of many of the world’s largest companies, securing deployments across thousands of locations. The company was the first to centralise all ATM transaction data across thousands of ATMs and seamlessly correlate it with surveillance video in a single, unified enterprise system. 8000 Series NVRs Building on this foundation, March Networks introduced the next-generation 8000 Series NVRs and evolved ESM into Command Enterprise Software (CES), the most advanced enterprise video management system of its time. In 2005, the company reached another milestone with a successful IPO, becoming the first company to achieve a dual listing on the TSX and AIM. March Networks is proudly owned by Delta, a global leader in power and thermal management solutions. Generative AI March Networks is leading the movement of enterprise video to the cloud and the integration of Generative AI. The latest generation of NVRs, the revolutionary X-Series hybrid, and all-IP recorders, utilise NVIDIA chipsets and provide embedded AI capabilities that continue to advance. As March Networks enters its next 25 years, it remains committed to transforming video surveillance beyond security, making it a powerful business intelligence tool. The Searchlight Cloud platform integrates video with all types of video analytics metadata, IoT sensors, and transactional data from POS and ATM systems, delivering real-time security and loss prevention alerts, along with comprehensive dashboards to help organisations enhance efficiency and the customer experience. Generative AI-based Smart Search capabilities Customers benefit from end-to-end video and business intelligence solutions that provide valuable insights The recent launch of Generative AI-based Smart Search capabilities highlights March Networks’ commitment to innovation and the ongoing evolution of video technology. Customers benefit from end-to-end video and business intelligence solutions that provide valuable insights across multiple departments – from security and operations to marketing and HR. “Reaching this milestone is a testament to the dedication of our employees, the loyalty of our customers, and the strength of our partnerships,” said Peter Strom, President and CEO of March Networks. 25th-anniversary video “As we celebrate our 25th anniversary, we remain committed to delivering solutions that shape the future of intelligent video and help our customers succeed. We look forward to 25 more years of innovation, security, and growth in intelligent video solutions.” To mark this special occasion, March Networks has released a commemorative 25th anniversary video, showcasing key milestones, longtime employees, and the company’s vision for the future. Visitors are encouraged to visit and explore the company’s refreshed website to watch the video.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security Safety Act Designation, and Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced a new industry partnership. This collaboration will enhance safety measures across campuses nationwide, including hospitals and schools, by combining pioneering-edge detection technologies to better protect customers in these environments. ZeroEyes’ AI-powered solution ZeroEyes and Metrasens merge their forces to create a layered security method that uses education sectors Through this partnership, ZeroEyes and Metrasens combine their strengths to create a layered security approach that benefits both the education and healthcare sectors. ZeroEyes’ AI-powered solution leverages existing security cameras to proactively detect brandished firearms, instantly identifying visible threats in real time. Meanwhile, Metrasens’ advanced concealed weapons screening technology focuses on identifying hidden dangers, detecting concealed weapons without disrupting the flow of daily activities. Combined, these solutions offer a comprehensive, layered security approach, addressing both visible and hidden threats to ensure a safer environment. Advanced sensor technology Metrasens Ultra™, the most advanced concealed weapons detection system, uses cutting-edge technology to swiftly and accurately detect potential threats, including concealed weapons. With advanced sensor technology, it reliably detects ferrous items like guns, knives, and even vapes. Its lightweight, portable design and intuitive interface make it easy to operate in diverse environments. Widely adopted by school districts and hospitals nationwide, it provides precise weapons screening and integrates seamlessly into any setting, leveraging advanced algorithms, machine learning, and sensor technology to ensure the detection of threat items. Safety and reassurance “Security, especially in hospitals and schools, should create an environment of safety and reassurance, fostering comfort and well-being,” said Simon Goodyear, CEO of Metrasens. “We understand that there’s no one-size-fits-all solution, so we're thrilled to partner with ZeroEyes to offer a complete weapons detection solution to our current and future customers.” Digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local staff as quickly as 3 to 5 seconds from detection. Safeguard efforts “ZeroEyes is dedicated to eliminating gun violence, and our partnerships are instrumental in making this a reality,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Working with Metrasens to enhance the security of organisations across the country is a privilege, and we are excited to continue expanding our efforts to safeguard even more lives.”


Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
IFSEC International took place over three days at the ExCel in London, presented alongside shows covering fire safety, intelligent buildings, facilities management, and safety and health. While perhaps not on the same scale as pre-pandemic events, the atmosphere was convivial and spirits high, everyone glad to be back amongst their peers in the industry. Predictably, the trending topics were steered by issues in the wider world: sustainability, moving services to a subscription-based model, and new ways of working inspired by COVID-19 safety measures. A place for cutting-edge innovation After a challenging couple of years, companies were keen to meet customers, showcase their products and reveal the latest innovations. Integrated Design Limited displayed their new Glassgate 400 Plus turnstile, a sleek design for the corporate market. Tony Smith, Major Accounts and Marketing Manager, Entrance Control and Turnstile Security, told SourceSecurity.com, “I feel trade shows are a very important part of IDL’s marketing effort. We are more than pleased to display alongside our peers and have customers make direct comparisons with our products and theirs.” Biometric access reader Biometrics, as ever, generated a lot of interest, including the European launch of RealNetworks’ new SAFR SCAN biometric access reader, which combines facial recognition, computer vision, and image capture technologies for a range of applications. “Overall, there was a really good footfall, and we met an excellent mixture of end-customers, system integrators, distributors, and consultants from both Europe and the Middle East who are exactly the types of people we were hoping to demonstrate SAFR SCAN to,” commented Charlie Bennett, Vice President UK & Europe – SAFR, RealNetworks. Access control systems going green HID Global is one company leading the way in the move away from plastics to focus on mobile access The eco-friendly trend and the need to be more sustainable is becoming a real force in the security industry, particularly in access control where there is considerable pressure to ditch the plastic. HID Global is one company leading the way in the move away from plastics to focus on mobile access. Gerald Grattoni, Physical Access Control Solutions Regional Business Unit Vice President at HID Global (part of the ASSA ABLOY Group), explained in a press briefing, “Making buildings smarter and more eco-conscious is high on the corporate responsibility agenda of many companies as the sustainability credentials of new buildings are now very important. With digitalised mobile identities there is less plastic waste and lower emissions.” Flexible, remote, and contactless Innovation in smart buildings is also being led by changes to how we work, live, and play, inspired in part by the recent pandemic. New technology is required to meet the needs of the hybrid workspace, as employers adopt more flexible working models and demand for contactless access control increases. Now, the most technologically sophisticated buildings are controlled by an app on a mobile phone, giving ease of access and full control without the need for plastic cards. Remote monitoring Advances in remote monitoring have escalated due to COVID-19, particularly in high demand in the health and education markets. Connecting via industrial standard network protocols allows for remote communication Ian Bridgewater, Director, Technical Sales Manager, TOA Corporation (UK) Ltd, explained further, “Connecting via industrial standard network protocols allows for remote communication. Working with specialist software developers has expanded this, giving greater flexibility to monitor and maintain systems remotely from a central hub.” AI-based autonomous access solution AI also has a role to play in this new high-tech, touchless world and various companies are utilising this technology. Alcatraz AI found IFSEC the perfect opportunity to exhibit their new Rock autonomous access solution. "We now live in a time in which AI can make precise real-time decisions at the door to authenticate or deny access using your face as a credential,” said Greg Sarrail, Senior Vice President of Sales at Alcatraz AI. “IFSEC 2022 allowed Alcatraz AI to demonstrate the speed and accuracy of autonomous access control. The number of qualified partners and end-users representing a broad international scope in attendance at IFSEC was encouraging.” Meanwhile, the Eagle Eye Networks stand attracted a lot of visitors keen for a demo of their new Eagle Eye Smart Video Search, which allows users to search for people, vehicles, or objects, and immediately find the exact video across all cameras in all sites. "AI and cloud are two trends that Eagle Eye, the media, and the security business community have been talking about for a while. We were excited to showcase Eagle Eye's new AI-powered technologies at IFSEC 2022," added Rishi Lodhia, Eagle Eye Networks Vice President and Manager Director EMEA. "Our stand was buzzing with activity and AI was the main topic of discussion for all three days. All in all, a great show." Investing in a secure future Engineers of Tomorrow gave apprentice finalists the chance to show off their skills in front of thousands of peers and professionals from the security sectors live on the show floor. The winners will go on to the WorldSkills UK (WSUK) LIVE competition – the nation’s premier skills, apprenticeships, and careers event. Although the products on display at IFSEC promised a contactless, digital future, this was a good reminder of the importance of the people who install and maintain these systems and the vital role of engineering apprenticeships in the industry.
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long-term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Protecting critical infrastructure An attack by a disgruntled former employee, ideologically motivated activist, or a criminal could inflict significant damage Currently, a significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks can target the grid, and an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target,” could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. Data capture form to appear here! According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure. The number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year Large power transformers A large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually are not interchangeable with each other, and they are not produced for spare-part inventories; so if one blows, a lot of companies and homes could be without power for more than six months. They are not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill. Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. According to EEP, $10 million is a fairly average cost for a large power transformer NERC/CIP guidelines The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC/CIP) guidelines address security needs of electrical substations. Every facility has a baseline requirement for perimeter security protection around the site, although medium- and high-impact sites will have more stringent requirements. The geography surrounding sites – Is it an urban area or rural? Does the surrounding elevation provide additional lines of sight? – also impacts the types of systems they require. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it. Inherited challenges According to the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street. Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. There are many possible targets, too. Approximately 300 control centres around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has cybersecurity issues.
Case studies
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
Morse Watchmans, the industry pioneer in key control and asset management systems, reports a rising number of international cities and municipalities installing the company’s flagship key control system, KeyWatcher® Touch, to secure the buildings, equipment, and vehicles utilised by various municipal departments. “From public works to waste departments, courthouses, and beyond, the adoption of our KeyWatcher Touch solution continues to resonate positively across so many diverse cities,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “We take pride in knowing that our systems are being used to facilitate secure and efficient operations for some of the public’s most critical services.” New KeyWatcher Touch system By implementing effective municipal key control measures, cities can mitigate the risks associated with unauthorised key access while maintaining the operational integrity of public works. Cities and metropolises can set a foundation of trust and confidence within their societies This proactive approach not only safeguards against potential security breaches but also fosters accountability and responsible use of resources among city employees. In this way, cities and municipalities can establish a foundation of trust and confidence within their communities. In one instance, the Walworth County Public Works Department in Wisconsin implemented a new KeyWatcher Touch system after the original key box system failed to adequately support the county’s hundreds of keys for government buildings and county fleet vehicles. KeyWatcher Touch solution After seeing the success of the KeyWatcher Touch solution at the Department of Public Works, other departments within Walworth County have also begun installing their own KeyWatcher Systems. “These boxes are starting to catch on, and departments are really thinking about how they will use them for vehicles and building keys,” said John Miller, Senior Project Manager, Walworth County Public Works. The operational efficiencies of the KeyWatcher Touch solution are also appreciated Across the globe, the operational efficiencies of the KeyWatcher Touch solution are also appreciated. Blacktown City, a suburban community located approximately 22 miles west of Sydney, Australia, implemented a KeyWatcher Touch system at their Main Works Depot to help maintain usage accountability and eliminate the problem of missing or overdue vehicles, machinery, and building keys. KeyWatcher Touch automated control “We manage keys for at least 500 vehicles and machines here at the Depot and each of them has at least two to three sets of keys,” said Joe Haddad, Facility Manager, Blacktown City Main Works Depot. “Without the KeyWatcher Touch automated control and tracking, the job of accurately keeping track of these many keys would be almost impossible.”
Screencastify, the end-to-end video creation platform announced its partnership with Modern Classrooms Project, a nonprofit organisation that empowers educators to build classrooms that respond to every student’s needs. Student-centered learning Screencastify’s video creation tools will enable MCP educators with fresh resources to improve teaching outcomes and fuel the future of K-12 learning. The partnership provides all educators who are enrolled in Modern Classrooms Project’s Virtual Mentorship programme with unlimited premium access to Screencastify, helping more teachers open new possibilities by creating dynamic, differentiated instruction and student-centered learning. End-to-end platform An end-to-end platform that makes recording, editing, sharing, assessing, and viewing video simple and accessible Screencastify, an original video creation tool via an internet browser, has become an end-to-end platform that makes recording, editing, sharing, assessing, and viewing video simple and accessible, so anyone can become a more effective communicator. Nearly 13 million users worldwide have used Screencastify to make nearly 500 million videos since 2016. Full access to creative tools “Screencastify has always had a singular goal of empowering teachers and students of all kinds to improve learning through the power of video,” said Vishal Shah, CEO of Screencastify. “This next evolution of our partnership with Modern Classrooms Project ensures that teachers and mentors within their programme will have full access to our entire suite of creative tools to create the best video possible for students. We’re excited to continue to build on our partnership with Modern Classrooms Project and do our part in building the modern classroom and helping shape the classroom of the future.” Modern Classrooms Project Modern Classrooms Project has trained and certified over 700 Expert Mentors and Distinguished Educators Modern Classrooms Project is a nonprofit organisation that leads a movement of educators in implementing video to drive blended instruction in a self-paced, mastery-based instructional model that leverages technology to foster human connection, authentic learning, and social-emotional growth. Modern Classrooms Project has trained and certified over 700 Expert Mentors and Distinguished Educators who implement its instructional model effectively in classrooms all around the world. New methods “Anyone who has spent time in the classroom knows that the task at hand perpetually feels unconquerable. But one place to start is in equipping educators with new methods that fundamentally restructure how they use space and time in the classrooms,” said Kareem Farah, CEO and co-founder of Modern Classrooms Project. According to a 2021 survey, the Modern Classrooms Project has helped 85% of teachers enjoy teaching more and feel more optimistic about their future in education and has made 72% more likely to continue teaching as a career. Video creation tools “With our partnership with Screencastify, the Modern Classrooms Project is investing in supporting teachers and unleashing their capacity." The partnership puts simple yet powerful video creation tools into the hands of leading K -12 educators who will implement the classroom of the future. Seamless assignments Each educator chosen was allowed to learn how to use instructional videos to carry on the mission “Screencastify is very intuitive. So, going into the Modern Classrooms Project mentoring programme having already used Screencastify, it just made the assignments flow seamlessly,” said Cecelia Gillam, a teacher at St. Charles Parish School Board and MCP expert mentor. In 2021, Screencastify used $25,000 to recognise and sponsor 50 educators to learn the nonprofit organisation’s innovative and research-backed instructional model. Each educator chosen was allowed to learn how to use instructional videos to carry on the Modern Classrooms Project’s mission to improve learning outcomes for every student and give them more control over their education. Flexibility to pause and rewind “Screencastify does a great job of giving students the flexibility to pause and rewind the video and make notes … and give them a sense of control of their own pace of learning,” said Monte Woodard, Science Teacher at The Field School in Washington, D.C. and MCP expert mentor. Screencastify has remained laser-focused on helping empower K -12 educators with the right tools to implement blended and hybrid classroom environments that are necessary today. Screencastify is used by educators in more than 70% of U.S. school districts.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution is deployed at the University of New Haven. This integration marks the first time a Connecticut university has adopted ZeroEyes, enhancing the safety and security measures across the campus and surrounding areas. University of New Haven The University of New Haven, located on a suburban campus near New Haven, Connecticut, serves a community of over 10,000 students, faculty, and staff. Its comprehensive, multilayered safety and security strategy ensures protection 24/7/365 with features such as electronic card access gates, CCTV cameras, emergency phones, and the LiveSafe app, which facilitates real-time communication with the University Police Department that patrols the entire campus. Threat identify, assess, and respond With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify, assess, and respond to potential gun-related threats. “The security of our campus and the safety of our students, faculty, staff, and visitors are our paramount priority,” said Adam Brown, chief of the University of New Haven Police Department. AI-based gun-detection system “From our first conversations with ZeroEyes, it was clear they could help enrich the safety and security of our community by offering an AI-based gun-detection system that uses the most advanced technology – supported by a specially trained operations center – to identify and analyze the presence of a firearm." "Testing, implementing, and integrating ZeroEyes into our safety and security systems and protocols has been seamless. ZeroEyes’ expertise in this critical area of public safety provides an important tool that enhances the safety and security of our community.” Situational awareness software If a gun is identified, images are instantly shared with the ZOC which is staffed 24/7/365 ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location, to local law enforcement and university security as quickly as 3 to 5 seconds from detection. Campus safety “Our collaboration with the University of New Haven underscores their unwavering dedication to campus safety in Connecticut,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “By integrating our AI gun detection solution, the university is taking a significant step forward in safeguarding its students, faculty, and staff. We are honored to support their mission to create a secure educational environment.”
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
The client functions as a prominent producer of phosphate fertilisers in Sub-Saharan Africa. They began mining phosphate rock in the early 1960s and started producing phosphoric acid in the late 1980s. Their extensive industrial facility, located in Senegal, includes various sites such as Mining, an Acid Plant, a Fertiliser site, and a power plant. They mainly export their phosphoric acid to India and distribute their fertiliser products within West Africa and globally. Client's requirements The client had a pressing requirement to connect multiple sites and consolidate them using a single communication platform. Additionally, they were in search of a hybrid communication solution that could support both modern and traditional networks. Their needs can be outlined as follows: Hybrid Communication Solution: Deploy a blend of Voice over Internet Protocol (VoIP) and conventional networks to enhance communication efficiency. Multilocation Solution: Create connectivity among various locations and merge them onto a unified platform to streamline communication effectively. Additional Features: Specifically desired functionalities like Call Accounting and Billing to streamline daily administrative duties and operations across multiple sites. Moreover, the integration of a public address system through the CO line at the power plant was crucial to guarantee the prompt communication of vital instructions to workers, whether in routine activities or emergencies. Hybrid communication solution The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks Matrix, collaborating with Bintech, developed a Hybrid Communication solution tailored for this industrial pioneer. The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks preferred by the industry. While there was an opportunity to modernise through VoIP connectivity, analogue terminals were also essential components of the solution. The Matrix solution includes: Two SETU VTEPs and a PRI Gateway extended an IP Connection to the ANANT, a server-based PBX, located at both the MINE and ACID sites. At the MINE, there were five ETERNITY GENX platforms, and at the ACID site, there were two, all connected over LAN to the ANANT. Various analog phones were linked to these GENX platforms, and each GENX platform at the ACID site featured a GSM trunk extension. At the Fertiliser site, the primary ANANT was linked to the WAN. A single GENX platform, connected via LAN, facilitated connections to numerous analog phones on-site. Furthermore, this GENX Platform supported a GSM trunk. At the power plant, an ETERNITY PENX was linked to the WAN, supporting a public address system over CO. Furthermore, 28 analog phones were incorporated into the network at the power plant. At Senchim, a SETU VFXTH, a VoIP-FXS gateway, was linked to the WAN. This gateway provided connectivity to several analog phones as well. Results The Hybrid Communication solution effectively integrated disparate sites onto a common communication platform, utilising both contemporary and conventional networks. Moreover, it enhanced communication through a range of features. The solution delivered: Smooth Multi-site Connectivity: With the support of SETU VTEP, capable of handling up to 2100 IP users, and ANANT, accommodating up to 5000 IP users, seamless connectivity across numerous sites was accomplished. Hybrid Communication Solution: A tailored Matrix solution integrated products capable of harnessing both contemporary and conventional networks. VoIP, GSM, and analog networks were effectively amalgamated to ensure efficient communication among various sites. Contemporary Features: The solution facilitated public address capabilities over CO via ETERNITY PENX at the power plant, allowing for vital information dissemination during emergencies. Integration of Call Accounting software, as requested by the client, was seamlessly integrated into Matrix PBXs. By combining contemporary and conventional networks, the Matrix solution distinguishes itself for its effectiveness, efficiency, distinctiveness, and readiness for the future.
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
Morse Watchmans, the industry pioneer in key control and asset management systems, reports a rising number of international cities and municipalities installing the company’s flagship key control system, KeyWatcher® Touch, to secure the buildings, equipment, and vehicles utilised by various municipal departments. “From public works to waste departments, courthouses, and beyond, the adoption of our KeyWatcher Touch solution continues to resonate positively across so many diverse cities,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “We take pride in knowing that our systems are being used to facilitate secure and efficient operations for some of the public’s most critical services.” New KeyWatcher Touch system By implementing effective municipal key control measures, cities can mitigate the risks associated with unauthorised key access while maintaining the operational integrity of public works. Cities and metropolises can set a foundation of trust and confidence within their societies This proactive approach not only safeguards against potential security breaches but also fosters accountability and responsible use of resources among city employees. In this way, cities and municipalities can establish a foundation of trust and confidence within their communities. In one instance, the Walworth County Public Works Department in Wisconsin implemented a new KeyWatcher Touch system after the original key box system failed to adequately support the county’s hundreds of keys for government buildings and county fleet vehicles. KeyWatcher Touch solution After seeing the success of the KeyWatcher Touch solution at the Department of Public Works, other departments within Walworth County have also begun installing their own KeyWatcher Systems. “These boxes are starting to catch on, and departments are really thinking about how they will use them for vehicles and building keys,” said John Miller, Senior Project Manager, Walworth County Public Works. The operational efficiencies of the KeyWatcher Touch solution are also appreciated Across the globe, the operational efficiencies of the KeyWatcher Touch solution are also appreciated. Blacktown City, a suburban community located approximately 22 miles west of Sydney, Australia, implemented a KeyWatcher Touch system at their Main Works Depot to help maintain usage accountability and eliminate the problem of missing or overdue vehicles, machinery, and building keys. KeyWatcher Touch automated control “We manage keys for at least 500 vehicles and machines here at the Depot and each of them has at least two to three sets of keys,” said Joe Haddad, Facility Manager, Blacktown City Main Works Depot. “Without the KeyWatcher Touch automated control and tracking, the job of accurately keeping track of these many keys would be almost impossible.”
Screencastify, the end-to-end video creation platform announced its partnership with Modern Classrooms Project, a nonprofit organisation that empowers educators to build classrooms that respond to every student’s needs. Student-centered learning Screencastify’s video creation tools will enable MCP educators with fresh resources to improve teaching outcomes and fuel the future of K-12 learning. The partnership provides all educators who are enrolled in Modern Classrooms Project’s Virtual Mentorship programme with unlimited premium access to Screencastify, helping more teachers open new possibilities by creating dynamic, differentiated instruction and student-centered learning. End-to-end platform An end-to-end platform that makes recording, editing, sharing, assessing, and viewing video simple and accessible Screencastify, an original video creation tool via an internet browser, has become an end-to-end platform that makes recording, editing, sharing, assessing, and viewing video simple and accessible, so anyone can become a more effective communicator. Nearly 13 million users worldwide have used Screencastify to make nearly 500 million videos since 2016. Full access to creative tools “Screencastify has always had a singular goal of empowering teachers and students of all kinds to improve learning through the power of video,” said Vishal Shah, CEO of Screencastify. “This next evolution of our partnership with Modern Classrooms Project ensures that teachers and mentors within their programme will have full access to our entire suite of creative tools to create the best video possible for students. We’re excited to continue to build on our partnership with Modern Classrooms Project and do our part in building the modern classroom and helping shape the classroom of the future.” Modern Classrooms Project Modern Classrooms Project has trained and certified over 700 Expert Mentors and Distinguished Educators Modern Classrooms Project is a nonprofit organisation that leads a movement of educators in implementing video to drive blended instruction in a self-paced, mastery-based instructional model that leverages technology to foster human connection, authentic learning, and social-emotional growth. Modern Classrooms Project has trained and certified over 700 Expert Mentors and Distinguished Educators who implement its instructional model effectively in classrooms all around the world. New methods “Anyone who has spent time in the classroom knows that the task at hand perpetually feels unconquerable. But one place to start is in equipping educators with new methods that fundamentally restructure how they use space and time in the classrooms,” said Kareem Farah, CEO and co-founder of Modern Classrooms Project. According to a 2021 survey, the Modern Classrooms Project has helped 85% of teachers enjoy teaching more and feel more optimistic about their future in education and has made 72% more likely to continue teaching as a career. Video creation tools “With our partnership with Screencastify, the Modern Classrooms Project is investing in supporting teachers and unleashing their capacity." The partnership puts simple yet powerful video creation tools into the hands of leading K -12 educators who will implement the classroom of the future. Seamless assignments Each educator chosen was allowed to learn how to use instructional videos to carry on the mission “Screencastify is very intuitive. So, going into the Modern Classrooms Project mentoring programme having already used Screencastify, it just made the assignments flow seamlessly,” said Cecelia Gillam, a teacher at St. Charles Parish School Board and MCP expert mentor. In 2021, Screencastify used $25,000 to recognise and sponsor 50 educators to learn the nonprofit organisation’s innovative and research-backed instructional model. Each educator chosen was allowed to learn how to use instructional videos to carry on the Modern Classrooms Project’s mission to improve learning outcomes for every student and give them more control over their education. Flexibility to pause and rewind “Screencastify does a great job of giving students the flexibility to pause and rewind the video and make notes … and give them a sense of control of their own pace of learning,” said Monte Woodard, Science Teacher at The Field School in Washington, D.C. and MCP expert mentor. Screencastify has remained laser-focused on helping empower K -12 educators with the right tools to implement blended and hybrid classroom environments that are necessary today. Screencastify is used by educators in more than 70% of U.S. school districts.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution is deployed at the University of New Haven. This integration marks the first time a Connecticut university has adopted ZeroEyes, enhancing the safety and security measures across the campus and surrounding areas. University of New Haven The University of New Haven, located on a suburban campus near New Haven, Connecticut, serves a community of over 10,000 students, faculty, and staff. Its comprehensive, multilayered safety and security strategy ensures protection 24/7/365 with features such as electronic card access gates, CCTV cameras, emergency phones, and the LiveSafe app, which facilitates real-time communication with the University Police Department that patrols the entire campus. Threat identify, assess, and respond With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify, assess, and respond to potential gun-related threats. “The security of our campus and the safety of our students, faculty, staff, and visitors are our paramount priority,” said Adam Brown, chief of the University of New Haven Police Department. AI-based gun-detection system “From our first conversations with ZeroEyes, it was clear they could help enrich the safety and security of our community by offering an AI-based gun-detection system that uses the most advanced technology – supported by a specially trained operations center – to identify and analyze the presence of a firearm." "Testing, implementing, and integrating ZeroEyes into our safety and security systems and protocols has been seamless. ZeroEyes’ expertise in this critical area of public safety provides an important tool that enhances the safety and security of our community.” Situational awareness software If a gun is identified, images are instantly shared with the ZOC which is staffed 24/7/365 ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location, to local law enforcement and university security as quickly as 3 to 5 seconds from detection. Campus safety “Our collaboration with the University of New Haven underscores their unwavering dedication to campus safety in Connecticut,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “By integrating our AI gun detection solution, the university is taking a significant step forward in safeguarding its students, faculty, and staff. We are honored to support their mission to create a secure educational environment.”
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
The client functions as a prominent producer of phosphate fertilisers in Sub-Saharan Africa. They began mining phosphate rock in the early 1960s and started producing phosphoric acid in the late 1980s. Their extensive industrial facility, located in Senegal, includes various sites such as Mining, an Acid Plant, a Fertiliser site, and a power plant. They mainly export their phosphoric acid to India and distribute their fertiliser products within West Africa and globally. Client's requirements The client had a pressing requirement to connect multiple sites and consolidate them using a single communication platform. Additionally, they were in search of a hybrid communication solution that could support both modern and traditional networks. Their needs can be outlined as follows: Hybrid Communication Solution: Deploy a blend of Voice over Internet Protocol (VoIP) and conventional networks to enhance communication efficiency. Multilocation Solution: Create connectivity among various locations and merge them onto a unified platform to streamline communication effectively. Additional Features: Specifically desired functionalities like Call Accounting and Billing to streamline daily administrative duties and operations across multiple sites. Moreover, the integration of a public address system through the CO line at the power plant was crucial to guarantee the prompt communication of vital instructions to workers, whether in routine activities or emergencies. Hybrid communication solution The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks Matrix, collaborating with Bintech, developed a Hybrid Communication solution tailored for this industrial pioneer. The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks preferred by the industry. While there was an opportunity to modernise through VoIP connectivity, analogue terminals were also essential components of the solution. The Matrix solution includes: Two SETU VTEPs and a PRI Gateway extended an IP Connection to the ANANT, a server-based PBX, located at both the MINE and ACID sites. At the MINE, there were five ETERNITY GENX platforms, and at the ACID site, there were two, all connected over LAN to the ANANT. Various analog phones were linked to these GENX platforms, and each GENX platform at the ACID site featured a GSM trunk extension. At the Fertiliser site, the primary ANANT was linked to the WAN. A single GENX platform, connected via LAN, facilitated connections to numerous analog phones on-site. Furthermore, this GENX Platform supported a GSM trunk. At the power plant, an ETERNITY PENX was linked to the WAN, supporting a public address system over CO. Furthermore, 28 analog phones were incorporated into the network at the power plant. At Senchim, a SETU VFXTH, a VoIP-FXS gateway, was linked to the WAN. This gateway provided connectivity to several analog phones as well. Results The Hybrid Communication solution effectively integrated disparate sites onto a common communication platform, utilising both contemporary and conventional networks. Moreover, it enhanced communication through a range of features. The solution delivered: Smooth Multi-site Connectivity: With the support of SETU VTEP, capable of handling up to 2100 IP users, and ANANT, accommodating up to 5000 IP users, seamless connectivity across numerous sites was accomplished. Hybrid Communication Solution: A tailored Matrix solution integrated products capable of harnessing both contemporary and conventional networks. VoIP, GSM, and analog networks were effectively amalgamated to ensure efficient communication among various sites. Contemporary Features: The solution facilitated public address capabilities over CO via ETERNITY PENX at the power plant, allowing for vital information dissemination during emergencies. Integration of Call Accounting software, as requested by the client, was seamlessly integrated into Matrix PBXs. By combining contemporary and conventional networks, the Matrix solution distinguishes itself for its effectiveness, efficiency, distinctiveness, and readiness for the future.


Round table discussion
New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
Products


Videos
Hybrid security: Manufacturers & Suppliers

A modern guide to data loss prevention
Download
The truth behind 9 mobile access myths
Download
7 proven solutions for law enforcement key control and asset management
Download
Access control system planning phase 2
Download
Security practices for hotels
Download