Incident Management
Passbolt, a new type of credential and access manager for organisations of all sizes announced it has raised $8 million in Series A financing for its all-in-one open source-based collaborative password and access software. The company was founded in December 2016. Previous funding was pre-seed of $620,000 in December 2018 and $3.1 million seed funding that closed in January 2021. Series A The Series A round was led by new investor Airbridge Equity Partners (Netherlands). Existing investors th...
Omnilert, a pioneer in gun detection technology released its compilation of Gun Violence Statistics for 2024 summarising gun violence tragedies and their adverse effects on Americans and the economy. 2024 gun violence statistics While research showed a decrease in overall deaths and injuries, the rising number of school shootings and fatalities and a high number of mass shootings underscored the need to keep more people safe in schools as well as places of worship, healthcare, government,...
Global security manufacturer, Gallagher Security continues to strengthen its presence in the newly amalgamated NSW/ACT region, with the appointment of Jon Liaros as Business Development Manager (BDM). Joining the team earlier this month on 13 January, Jon brings 25 years of experience in the security industry, contributing to the continued growth in the NSW/ACT region. Time for the NSW/ACT region Jon has worked for some of the industry’s most notable organisations, including HID Global...
Global cyber security and corporate intelligence consultancy S-RM has announced a new channel distribution partnership with cyber security solutions provider and distributor, Distology. Distology represents best-in-class cyber security vendors and supports an extensive network of resellers across the EMEA region. This partnership will enable Distology’s network to access S-RM’s global, award-winning, cyber incident response services. Incident response team S-RM has the...
iDenfy, a global pioneer in RegTech services, has filed its first patent for an innovative address verification technology. The patent, published in 158 countries by the World Intellectual Property Organisation (WIPO), introduces a novel method for verifying a user’s address data. It aims to set a new standard for reliability and security, help businesses combat fraud, and more effectively prevent document forgery. Traditional address verification methods Traditional address verificatio...
The most common file formats for hiding malware are .exe and .zip, according to research by NordVPN. These are also the file formats that frequently land on employees' computers and end up posing great security risks to organisations. To address the issue, NordLayer, a provider of flexible cybersecurity tools for businesses, has just launched Download Protection, a robust security feature that automatically scans and instantly removes various types of malware-infected files from user-initiated...
News
Bromsgrove-based security and monitoring company, Ecl-ips, is celebrating its win at the North Worcestershire Business Awards 2024. Best use of Technology Ecl-ips was a winner in the ‘Best use of Technology’ award category at the event at Hogarths Stone Manor near Kidderminster. Ecl-ips beat two other finalists: Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer to win. The security installer was among the 30 local businesses that were shortlisted for an award. HALO Smart Sensor The entry from Ecl-ips centred on the advanced technology that is provided by its vape detector offering, the HALO Smart Sensor manufactured by IPVideo in the USA. Ecl-ips was one of the first companies in the UK to identify the potential of the technology that provides real-time alerts of vaping as well as providing indoor air quality monitoring. Addressing the vaping problem This smart sensor has supported schools in the UK to tackle the problem of young people who are vaping With all its solutions Ecl-ips aims to find the best partners to help meet the needs of its clients. This smart sensor has supported schools in the UK to tackle the problem of the rising numbers of young people who are vaping. Schools are finding that students are disrupting lessons by asking to go to the toilet and creating an intimidating atmosphere in the school toilets because more students are gathering in them to vape. Vape detector When combined with strengthened behaviour policies and the use of CCTV outside the toilets to confirm the identities of students, the vape detector has proved to be very effective at improving pupil behaviour and reducing vaping at school. Ecl-ips customer, Charlotte Slattery Deputy Head Teacher at St Joseph’s College in Stoke-on-Trent, said, “I had dithered about it for over 12 months due to the cost but it has been transformational for us. We started with only 2 devices in our worst areas and have now ordered another 5 to go into more toilets.” North Worcestershire Business Awards The North Worcestershire Business Awards were judged by an independent panel that said the finalists reflect “an impressive range of diverse businesses, all showcasing their commitment to growth, sustainability and adding extra value for customers.” In their sixth year, the awards are organised by North Worcestershire Business Leaders (NWBL) and the local authorities in North Worcestershire in partnership with Hogarths Stone Manor.
iDenfy, a pioneer in identity verification and compliance solutions, has announced its new partnership with Portugal Residency Advisors, a consulting firm specialising in comprehensive relocation and investment services in Portugal. The partnership aims to automate the onboarding process and strengthen security measure regulations for the new clients. Identity verification solutions The challenges related to identity fraud and regulatory compliance have increased as well As digital and cross-border transactions continue to grow. The challenges related to identity fraud and regulatory compliance have increased as well. According to Statista, in 2022, global financial fraud losses reached an estimated $41 billion, highlighting the need for robust, automated identity verification solutions. This collaboration allows Portugal Residency Advisors to verify the legitimacy of their global client list swiftly and securely while reducing compliance risks and manual verification work. Relocation and investment process Portugal Residency Advisors has been a trusted partner for individuals, families, and businesses looking for information about residency, property acquisition, tax compliance, and relocation in Portugal. The firm’s unique value lies in its ability to offer peace of mind throughout the relocation and investment process, tailored to the client’s individual needs as well as doing business. Client verification standards The firm is not only using an identity verification key to onboard singular users but also AML For this reason, the company is not only using an identity verification solution to onboard singular users but also anti-money laundering services (AML), together with near-field communication (NFC) verification, to exploit the latest features and optimise users' onboarding journey. As the company expands its operations to serve a diverse, international customer base, maintaining rigorous client verification standards is critical. Advanced biometric algorithm iDenfy’s identity verification system, already trusted globally, is equipped to recognise over 3,000 types of identity documents across 200 countries and territories. Advanced biometric and face recognition algorithms ensure that the analysed faces are real, helping to prevent the use of pictures of faces, 3D masks, and other fake fraudster tricks during the identity verification process. iDenfy’s advanced AML Screening Software iDenfy’s advanced AML Screening and Ongoing Monitoring Software offers a powerful solution Furthermore, iDenfy’s advanced AML Screening and Ongoing Monitoring Software offers a powerful solution to help Portugal Residency Advisors streamline their onboarding process and enhance compliance measures. By seamlessly scanning users against international sanctions, politically exposed persons, and law enforcement watchlists, iDenfy enables the detection and blocking of potential fraudsters or illegal applicants seeking residency permits. Advanced AML filtering algorithm Additionally, with an advanced AML filtering algorithm, the platform distinguishes genuine threats from adverse media, reducing recognition and getting most of the information about the individual. The software connects global enforcement authorities such as Interpol, Europol, and the FBI and empowers Portugal Residency Advisors to safeguard national security while delivering a smooth onboarding experience for valid applicants. NFC chip data iDenfy offers NFC verification, held by eIDAS, which brings unparalleled convenience Alongside its advanced AML screening and ongoing monitoring software, iDenfy offers NFC verification, regulated by electronic identification, authentication, and trust services (eIDAS), which brings unparalleled convenience and security, providing a seamless and stress-free experience for applicants. With instant NFC chip data reading and identity verification completed in as little as 40 seconds, the feature ensures a faster and more user-friendly process. Cross-checking security certificates Also, Public Key Infrastructure (PKI) guarantees spoof-proof verification by cross-checking security certificates with global authorities, further enhancing reliability. The function is fully compatible with Android and iOS devices, “We chose iDenfy because their solution stands out for its reliability and simplicity in onboarding, making it an ideal partner as we prioritise our clients' experience. iDenfy’s technology helps us ensure full compliance while maintaining trust and efficiency in our processes,” said Pedro Branco, Managing Director of Portugal Residency Advisors. Advanced identity verification solutions PKI guarantees spoof-proof verification by cross-checking security certificates “We’re excited to work with Portugal Residency Advisors in their mission to simplify relocation and investment processes for their clients." "Our advanced identity verification and compliance solutions will empower them to expand confidently while protecting against fraudulent activities,” said Domantas Ciulde, the CEO of iDenfy. Integrating iDenfy’s technologies By integrating iDenfy’s technologies, Portugal Residency Advisors will enhance their ability to conduct due diligence, meeting both internal security standards and global compliance requirements. This partnership marks a step forward in providing a safer, more efficient onboarding process that builds international trust for clients worldwide.
artius.iD, the global pioneer in secure, self-managed identity and decentralised ID management, has appointed Burton M. Goldfield, former President and CEO of TriNet Group Inc. (NYSE: TNET), to its Board of Strategic Advisors. Bringing more than three decades of cutting-edge technology expertise to the business, Goldfield will provide high-level strategic advice to artius.iD as it continues to rapidly scale its cross-sector digital identity and cybersecurity offering to multinational corporations and small- and medium-sized businesses (SMBs). Prior roles of Goldfield A renowned business executive, Goldfield brings more than 25 years of expertise in technology A renowned business executive, Goldfield brings more than 25 years of expertise in technology. He most recently served as President and CEO of TriNet Group for 15 years, steering the company to become a premier provider of comprehensive human resources solutions for more than 22,000 customers of small and medium-sized businesses (SMBs). Prior to TriNet, Goldfield held pivotal leadership roles at companies including Rational Software (RATL), Hyperion Solutions (HYSL), and IBM Corporation (IBM). He holds a bachelor’s degree in biomedical engineering from Syracuse University and an MBA from Villanova University. Demand for digital identity solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing increasingly sophisticated and multidimensional cybersecurity threats, with HR systems being an especially popular attack vector. His deep understanding of the small- and medium-sized business ecosystem will put artius.iD in an unrivalled position to tap into the accelerating demand for digital identity solutions among SMBs. Michael Marcotte, founder, Chairman, and CEO of artius.iD, said: "This is a pivotal appointment for artius.iD as we continue to pursue our strategic plan, and I'm thrilled to welcome Burton to our Board of Strategic Advisors. Our collaboration spans decades, including impactful initiatives on SlingTV, and is built on mutual trust and admiration." Decentralised ID management solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing sophisticated Marcotte added: "As a steadfast advocate and champion for SMBs and entrepreneurs, Burton has a profound understanding of the challenges companies face in safeguarding customer and employee data. His expertise and insight will be invaluable as artius.iD continues to deliver groundbreaking solutions to address these critical needs.” Burton Goldfield, Strategic Board Advisor at artius.iD, added: "artius.iD’s advanced quantum encryption resilience and decentralised ID management solutions provide SMBs with the confidence needed to safeguard their customer and employee relationships." Advanced groundbreaking software Goldfield added: "This transformative technology is akin to the advanced groundbreaking software tools created by Rational for the Department of Defense and Hyperion’s breakthrough with Essbase using OLAP for analytics." "SMBs are the driving force behind the U.S. economy, and it is vital that we continue to support their success. I'm eager to help bring this transformative technology to the organisations that need it most."
Cloudbrink has won a major endorsement from Japanese system integrator NEC Networks & System Integration Corporation (NESIC), which is to use Cloudbrink’s personal SASE service as the foundation of its Virtual Trusted Overlay Network. Virtual Trusted Overlay Network facilitates high-performance zero-trust networking using Cloudbrink’s ultra-low-latency global edge mesh. NESIC is also integrating other services including end-point security and identity management, enabling accelerated connectivity and security to be brought together in a fully managed service. Development of the NESIC service NESIC chose Cloudbrink’s technology for its performance, integrated security and ease of deployment and management, and for its willingness to collaborate on the development of the NESIC service. Osamu Kikuchi, Senior Vice President of NEC Networks & System Integration Corporation said: “Our partnership with Cloudbrink began over a year ago, and we have successfully introduced their award-winning service to businesses in the Japanese market. With this new game-changing service, we look forward to disrupting the traditional enterprise networking and security architecture to deliver enhanced security, simplicity and speed to our global customers and partners.” Advanced security functions Key to the Virtual Trusted Overlay Network is the ability to deliver ultra-high version network access Key to the Virtual Trusted Overlay Network is the ability to deliver ultra-high performance secure network access. Independent testing has verified Cloudbrink’s claim to accelerate applications by a factor of 30x for mobile and remote users on consumer-grade broadband and wireless connections, without the additional costs and operational headaches of installing additional hardware. Routing and advanced security functions are provided by a global network of virtual PoPs called FAST edges, which use AI to locate the closest access point – typically less than 10ms away. Cloudbrink service Prakash Mana, CEO of Cloudbrink, said: “We feel honoured to play a significant role in the Virtual Trusted Overlay Network initiative. NEC has been an outstanding partner and we share the same vision of making SASE work for everyone – less to manage for the network and security teams, a better experience for end users, and better value for the enterprise.” NESIC, a subsidiary of Japan’s pioneering provider of cloud computing and network services, NEC Corporation, signed as a reseller of the Cloudbrink service in early 2023, later becoming a design partner to develop the Virtual Trusted Overlay Network. NESIC will offer services based on the Virtual Trusted Overlay Network starting in January 2025 as part of its Symphonict cloud service infrastructure.
The Smart City Expo World Congress (SCEWC) 2024 recently concluded in Barcelona, bringing together experts, innovators, and city pioneers from around the world to explore the future of urban transformation. Dahua Technology took centre stage with its comprehensive lineup of smart city solutions under the theme “Together For A Sustainable Future”, demonstrating how advanced AI, IoT, and big data technologies are driving more sustainable, efficient urban environments. AIoT-powered solutions Dahua’s showcase featured a full suite of AIoT-powered solutions tailored for Urban Safety, Urban Governance, Urban Traffic, and Green Mobility, along with collaborative solutions developed with ecosystem partners to promote digital city growth. The presentation demonstrated Dahua’s commitment to a future where cities are not only more secure but also greener and more liveable. Dahua’s solutions Dahua’s solutions enable seamless integration across various city roles, giving municipal rules In urban governance, Dahua’s solutions enable seamless integration across various city functions, empowering municipal authorities with real-time data to enhance operational efficiency and public service. By creating a unified city-level management and command platform to integrate data from diverse city systems, Dahua’s solution enables faster responses to incidents, optimised resource allocation, and more informed decision-making for city planners. Dahua’s intelligent traffic management Additionally, Dahua’s scenario-based algorithms, such as elderly fall detection, high-rise littering, and garbage classification detection, further support the construction of digital communities, bringing convenience and peace of mind to citizens. To tackle congestion and improve road safety, Dahua’s intelligent traffic management solutions provide real-time traffic analysis, adaptive signal control, and AI-driven violation detection, reducing traffic bottlenecks and supporting smoother commutes. City planners can utilise these tools to build more efficient transportation networks, enhancing both safety and convenience for commuters. Range of smart transport solutions Dahua offers a range of smart transport solutions for both public transit and commercial fleets In support of green mobility, Dahua offers a range of smart transport solutions for both public transit and commercial fleets. Its public bus solution integrates onboard CCTV, passenger counting, and route optimisation to improve both safety and service quality. For commercial vehicles, Dahua’s school bus solution tracks student attendance and safety, while its truck management system includes fuel monitoring to promote energy efficiency. Dahua’s smart parking solutions Dahua’s smart parking solutions also contribute to green mobility by using automated licence plate recognition, intelligent parking space detection, and EV charging stations, enhancing parking experience and promoting sustainable urban mobility. Dahua furthered its sustainability commitment with technologies for natural resource management and biodiversity conservation. By harnessing multi-dimensional monitoring and situational analysis, these technologies offer early warnings for forest fire risks, detect illegal fishing activities, and prevent farmland vandalism, enabling proactive resource management to help cities build resilience against natural disasters. Sustainable urban environment Dahua remains at the forefront, pioneering keys that address these issues with an on-looking vision Additionally, Dahua’s solutions also offer pollution monitoring, hydrological monitoring, wildlife movement tracking, and endangered species identification. With these intelligent tools, cities can address environmental challenges more proactively, contributing to a balanced urban ecosystem. As cities worldwide face challenges like congestion, environmental degradation, public safety concerns, and climate resilience, Dahua remains at the forefront, pioneering solutions that address these issues with a forward-looking vision for a sustainable urban environment. Dahua’s approach Dahua’s approach emphasises building smart cities that are both digitally advanced and deeply human-centered, where safety, efficiency, and ecological harmony are seamlessly integrated into the urban landscape. Driven by its mission to enable a smarter society and better living, Dahua continues to empower smart cities globally together with ecosystem partners, helping municipalities use digital tools to build safer, more connected, and more sustainable urban environments.
LearnPro Group, supported by Apiary Capital, is excited to announce the acquisition of Infographics UK Ltd., enhancing the portfolio through the addition of the market-pioneering FireWatch, FloSuite and Prevent + Protect products. This move complements their existing software offerings, including XVR Simulation, pdrPro, and learnPro. The acquisition of Infographics further demonstrates LearnPro Group’s position as a pioneering software provider to the global emergency services and critical infrastructure sectors. New Prevent + Protect tool Costi Karayannis, CEO of LearnPro Group, stated: “The addition of Infographics to LearnPro Group allows us to offer a broader ecosystem of management tools to the global emergency services and critical infrastructure market, while addressing emerging needs around risk prevention." “The acquisition will expand our product ecosystem to include HR, resource planning, asset management, availability, learning management, competency management and virtual reality simulation. In addition, the new Prevent + Protect tool enables fire services to comply with increasing responsibilities around fire prevention." Power of the combined group Karayannis added: “As an organisation, we are passionate about the sectors we support and believe the power of the combined group can drive even more value for our customers.” Russell Wood of Infographics said: “Joining LearnPro Group is an exciting opportunity. The synergies between our organisations are evident, and we look forward to leveraging our combined resources to better serve our emergency services user base.” As part of the acquisition, Russell will be joining the LearnPro Group leadership team.
Expert commentary
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
The City of Centennial, Colorado, operates a state-of-the-art Traffic Management Centre (TMC) to monitor regional traffic conditions. Serving a population of over 108,000, Centennial’s TMC ensures smooth traffic flow, supports city operations such as snow management, and engages the public with initiatives like Centennial 101, which provides residents with a behind-the-scenes look at city departments. In August 2023, Centennial installed RGB Spectrum’s Galileo® video wall processor to address its operational needs. The city sought a solution that would enable operators to monitor live feeds from 60 CCTV cameras, improve situational awareness, and facilitate content management for real-time operations and training purposes. The challenge The Momentum Group provided exceptional service and support throughout the project Centennial’s Traffic Management Centre required a reliable, flexible system capable of displaying numerous video streams simultaneously. Operators needed the ability to monitor critical intersections and road conditions in real-time. Beyond daily operations, the TMC needed a tool to support public presentations and internal reviews, offering intuitive control of the video wall through a desktop interface. Planning for the new operational centre began in 2021. After evaluating various options, Centennial chose to follow the example of neighbouring Douglas County, which had successfully implemented RGB Spectrum’s Galileo system in its TMC. This decision was influenced by positive feedback on Galileo’s reliability, flexibility, and performance. The city collaborated with the Momentum Group, a nationally recognised and award-winning manufacturer’s representative firm in the Rocky Mountain region. The Momentum Group provided exceptional service and support throughout the project. “We’ve been very happy with the system reliability and functionality. The Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform,” Libby Nordeen, Traffic Management Centre Operator, City of Centennial. Why RGB Spectrum RGB Spectrum’s Galileo video wall processor met Centennial’s needs on multiple fronts. It offered a seamless solution for monitoring multiple video streams in real-time and allowed operators to move content effortlessly between a desktop interface and the video wall. The city appreciated Galileo’s robust design, which ensures 24/7 reliability, and its scalability to accommodate future operational growth. Libby Nordeen, Traffic Management Centre Operator, described the decision: “We really liked that Douglas County uses Galileo and has been happy with it. It made sense for us to go with RGB Spectrum to align with our region and ensure seamless communication with other jurisdictions.” How the City of Centennial uses RGB Spectrum The Galileo processor also supports Centennial’s broader goals of public engagement and education At the heart of Centennial’s TMC is RGB Spectrum’s Galileo processor, which powers a Planar display that showcases live video feeds from 60 CCTV cameras. Operators, including Nordeen and her team, use the system daily to monitor traffic conditions and enhance citywide situational awareness. This capability has been especially beneficial during inclement weather, allowing snow crews to assess road conditions and prioritise their efforts using live video feeds. The Galileo processor also supports Centennial’s broader goals of public engagement and education. During events like Centennial 101, a program designed to familiarise residents with city operations, the TMC uses the video wall to demonstrate how the department monitors traffic and supports real-time operations. The ability to move content from the desktop to the video wall enables operators to create dynamic and engaging presentations for visitors and city officials alike. Looking ahead, Centennial plans to expand the TMC’s capabilities to include enhanced incident management and greater system-to-system communication with neighbouring jurisdictions such as Englewood, Greenwood Village, and Littleton, all of which use the same traffic signal platform. Results and benefits Since installing RGB Spectrum’s Galileo video wall processor, the City of Centennial has seen significant improvements in traffic monitoring operations. Operators now benefit from enhanced situational awareness and streamlined decision-making. Galileo’s seamless integration with desktop control has simplified workflows, enabling more efficient management of daily monitoring and presentations. Libby Nordeen highlighted the system’s impact: “We’ve been very happy with the system reliability and functionality. Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform.” The TMC’s enhanced operations provide a solid foundation for future growth. As Centennial expands its capabilities to include incident management and regional collaboration, the Galileo processor will continue to be a cornerstone of efficient traffic monitoring and control.
To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Deter, detect, and apprehend criminals Fenton is a small city with 12,000 permanent residents, but Chief of Police Jeffery Cross estimates that 60,000 people pass through the town daily. Located off Highway US-23, it is a popular shopping and restaurant district for commuters and people from neighbouring cities. Unfortunately, retail criminals also frequent the area. The new video surveillance system is designed to deter, detect, and apprehend retail criminals. Live security camera footage Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access The new system, housed in a rugged, weatherproof cabinet and mounted on a telephone pole with two cameras, includes Eagle Eye 911 Camera Sharing technology. Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access to view live security camera footage during an emergency. “With 911 Camera Sharing, the 911 operator can see the situation unfold and give law enforcement direct, quality information and immediate feedback about what happened and the direction the suspect is headed in,” Cross explained. “That enhances safety for first responders and our community.” Smart Video Search In addition, the security cameras have built-in AI-powered Eagle Eye Smart Video Search, which enables Fenton’s authorised law enforcement officials to quickly search security camera footage for vehicles, people, or objects of interest. “With Smart Video Search you can search for a ‘person wearing a red shirt and black pants’ a ‘blue Honda truck’ or ‘person with a backpack’ and quickly find a shoplifting suspect or determine when a certain vehicle, person, or group of people entered a shopping centre parking lot, which can be critical information for law enforcement,” said Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions. This Novi, Mich.-based security integrator is working on the project with the City of Fenton. AI-powered video surveillance “Fenton’s new system with 911 Camera Sharing and AI features such as Smart Video Search is like having a virtual patrol in the Fenton business district,” he added. “Last month the National Retail Federation reported a 93% increase in the average number of shoplifting incidents per year in 2023 versus 2019 and a 90% increase in dollar loss,” said Dean Drako, CEO of Eagle Eye Networks. “AI-powered video surveillance can now be deployed in more areas than ever, offering communities new ways to contend with rising retail crime.”
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
With the common goal of improving security and emergency response in the event of a critical incident, community members in Livingston County have deployed technology that turns their standard security cameras into a powerful resource for 911 Emergency Communications Centre telecommunicators (911 professionals). Response time “It’s all about response time: The key to saving lives, curtailing damage, and rapidly resolving an emergency of any kind–whether it’s a natural disaster, fire, mass shooting, or other criminal activity–is getting accurate information to first responders so they can take quick, decisive action,” said Mike Murphy, Livingston County Sheriff. While security cameras are ubiquitous at schools and businesses, 911 telecommunicators typically cannot access them in an emergency. Eagle Eye 911 Camera Sharing With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather information Eagle Eye 911 Camera Sharing changes that by giving telecommunicators instant access to live video from one or multiple security cameras when a 911-triggered emergency occurs, empowering them to quickly deliver critical incident information to first responders through a partnership with RapidSOS. Telecommunicators generally rely on verbal information from 911 callers. With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather an immense amount of information. Real-time situational awareness “Camera Sharing gives us a real-time view of the situation at hand as it’s unfolding,” said Kecia Williams, 911 Director, Livingston County 911 Central Dispatch. “Lots of times it takes a while to attain pertinent information from a 911 caller because they’re distraught or not clear. With Camera Sharing, we can instantly see for ourselves what’s going on, and we can get this information to the fire department, EMS, or law enforcement much quicker.” Camera Sharing technology This organisation works with local school districts to provide educational services Livingston County is the first county in Michigan to demo the new technology at the Livingston Educational Service Agency in Howell. This organisation works with local school districts to provide educational services and support to 26,000 students throughout the county. “I am impressed with the Camera Sharing technology and can see the potential for improving response times by first responders to critical events in our community,” said Michael Hubert, Superintendent of Livingston Educational Service Agency. Cybersecurity and privacy protection Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions, a security integrator based in Novi, Michigan, said, “Most businesses and schools already have security cameras that can easily be connected to Eagle Eye 911 Camera Sharing, which is a first-of-its-kind technology that has cybersecurity and privacy protections built in." "As a former law enforcement officer, I believe camera sharing can significantly improve the outcome of emergencies and improve safety and security for first responders.” Dean Drako, CEO of Eagle Eye Networks said, “Livingston County is a prime example of a growing trend we’re seeing in the U.S. where entire communities - schools, businesses, public safety officials, and community pioneers are working together to ensure they are prepared as possible for emergencies.”
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
IDEMIA Public Security North America, the premium provider of convenient and trusted biometric-based solutions, has announced the launch of the Iowa mobile ID to Samsung Wallet, in collaboration with the Iowa Department of Transportation (Iowa DOT) and Samsung. Iowa residents can now securely store their mobile ID in their Samsung Wallet and start using it to easily assert their identity from their mobile phone at TSA checkpoints at the Des Moines and Eastern Iowa airports, as well as 25 other participating airports in the country and other participating businesses. Free Iowa Mobile ID app Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone The launch of Iowa mobile ID in the Samsung Wallet brings elevated convenience and security for Iowans with Samsung smartphones for airport security screening, age-restricted products, and other identity checks. Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone near the mobile ID reader or having the mobile ID reader scan the QR code. Iowans can also continue to access their mobile ID through the free Iowa Mobile ID app, which IDEMIA built and rolled out for Iowa in October 2023. "We are pleased to add the Iowa mobile ID in the Samsung Wallet to the list of acceptable IDs at our security checkpoints. Travellers who want to take advantage of this new capability will find that their Iowa mobile ID is a convenient option when going through the security process. TSA will continue to embrace technology that improves security effectiveness while streamlining the passenger experience at airports," John Bright, TSA Iowa Federal Security Director. Partnership with Samsung "We are proud to expand our partnership with Samsung and the Iowa Department of Transportation (Iowa DOT) to bring mobile driver’s licences and state IDs to Samsung Wallet in Iowa and help accelerate the adoption of mobile ID in the state." Mobile IDs are authenticated and issued by state DMVs or MVDs" "As a convenient and highly secure way to store state-issued IDs and drivers licenses, mobile IDs are authenticated and issued by state DMVs or MVDs and ensure personal information is securely stored on the user’s device, with only the user having control over what personal information is shared," Donnie Scott, CEO of IDEMIA Public Security North America. Long-standing partnership As a pioneer in identity solutions and credentials issuance with a long-standing partnership with government agencies and a commitment to privacy by design, end-to-end security and interoperability, the Iowa DOT partnered with IDEMIA to launch mobile ID in Iowa in October 2023. Later that year, in December 2023, Samsung collaborated with IDEMIA, alongside the Arizona Department of Transportation Motor Vehicle Division (AZ MVD), to roll out mobile ID to the Samsung Wallet in Arizona.
Round table discussion
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department transfers. In fact, connecting HR and information technology (IT) systems to physical security can provide many significant benefits in terms of access control, incident response, compliance, cost savings, and employee experience. We asked this week’s Expert Panel Roundtable: How can organisations integrate physical security with other systems, such as IT and HR?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
Products
Maximising security and performance
DownloadVerkada workplace safety survey
DownloadAccess control system planning phase 2
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
Download