Incident Management
With the recent update of its Document Reader SDK, Regula became the first identity verification (IDV) vendor to make it possible to verify all the dynamic security features of documents in real time. With the latest addition of Dynaprint® checks, the solution ensures more robust physical document authentication during remote onboarding. The innovation has arrived at a time when 58% of businesses globally face fake or modified IDs during digital onboarding. Dynamic se...
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised...
Radiant Security launches the industry’s first Adaptive AI Security Operations Centre (SOC) platform. The announcement marks a major step for cybersecurity automation in a landscape flooded with alert fatigue, static playbooks, and analyst burnout. Now, security analyst teams can instantly and transparently triage, investigate, and remediate 100% of alerts from any source, at machine speed. Proactive defence strategies Radiant eliminates false-positive noise, escalating only suspi...
Allied Universal®, the world’s pioneering security and facility services company, announced its Unified Command Centre solution was recognised as an honourable mention in the 2025 Security Industry Association (SIA) New Products + Solutions (NPS) Awards - less than 30% of nominations received this recognition. The solution was honoured in the Managed Services category at the awards ceremony held at the ISC West conference this week in Las Vegas. Advancing security solutions &l...
Restrata, the pioneering provider of operational resilience technology, has partnered with MAX Security to integrate MAX’s Intel Portal into resilienceOS, an end-to-end platform designed to unify security, risk, and operational resilience. By bringing MAX Security’s world-class intelligence and global reach into the resilienceOS Risk Hub, Restrata ensures that businesses can respond rapidly to emerging threats and protect their people, assets, and operations. This strategic integrat...
Advanced Data Risk Management (ADRM), a pioneer in security consulting and managed security services and EyeOTmonitor, a pioneer in network and systems health management for the security industry, are proud to announce a strategic partnership. This collaboration will integrate EyeOTmonitor’s advanced health monitoring capabilities into ADRM’s Security Management Platform, DEFENDER, providing clients with enhanced system health monitoring and real-time change management awareness wi...
News
Continuing its global expansion plan Integrity360 has acquired pioneer cyber security specialist Holiseum headquartered in Paris, France. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to accelerate its growth in France and continental Europe and significantly provide a new and exciting services practice focused on Operational Technology (“OT”) and Internet of Things (“IoT”) technologies which complement Integrity360’s existing service practices. Partnering for cybersecurity Those include cyber risk and assurance, cyber security testing, incident response, infrastructure, Microsoft cyber, payments compliance, and a highly comprehensive range of cyber security managed services including managed detection and response (“MDR”) solutions. Holiseum will continue to operate from its existing three facilities in France but with the benefit of the full resources and capability of the wider Integrity360 business. Protecting industrial systems Holiseum is a consultancy specialises in industrial infrastructureHoliseum, founded in 2018, is a highly respected and well-established cybersecurity consultancy that specialises in critical and industrial infrastructure. It serves approximately 80 customers throughout France and selected international locations from facilities in Paris and Nimes including organisations operating in the energy, infrastructure, manufacturing, transport and financial sectors. Trusted in OT protection In particular Holiseum is an expert in OT technology and has helped many global corporate and infrastructure organisations secure and evolve their OT environment and associated IT estates. Holiseum’s reputation is underpinned by several security accreditations from ANSSI – the National Cybersecurity Agency of France – including PASSI (cybersecurity audit services) and PACS (cybersecurity support and consulting) – where Holiseum is one of the first three certified organisations in France. Securing critical infrastructure Holiseum’s portfolio of services include audit, training, investigation and a full suite of OT consulting solutions. Securing critical infrastructures is a high priority for many governments and corporate organisations across the globe due to the alarming rise in attacks on industrial and energy infrastructure. Pioneer industry analyst Gartner has commented that such attacks could result in the weaponisation of OT environments to seriously harm human life. Despite the tightening of the regulatory environment with the introduction of cyber security frameworks including NIS2 (Network and Information Security 2) and DORA (Digital Operational Resilience Act) the challenge of continuously securing critical infrastructure remains acute. Holiseum will form a major new practice within Integrity360 dedicated to the mission of aiding, protecting and supporting both government and industrial infrastructure. The existing Holiseum team of 32, will be rapidly expanded in France and across all other Integrity360 markets in support of this mission. Strengthening cybersecurity Integrity360’s innovative range of services have been recognised on multiple occasions by GartnerIn addition, Holiseum’s headquarters in Paris will form a new regional hub for the group from which it will deliver the full suite of Integrity360 services, and during 2025 an additional Paris based SOC (Security Operations Centre) will be launched to join the existing network of six SOC’s across EMEA (Dublin, Stockholm, Naples, Sofia, Madrid and Cape Town). The SOC teams deliver a wide ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360’s innovative range of services have been recognised on multiple occasions by Gartner, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services. Driving innovation in security The addition of Holiseum brings group revenues to over €160m and a dedicated cybersecurity team of over 700 employees. Further innovation and demand for its services across the EMEA region will expand group revenues in 2025 across all territories. Ian Brown, Executive Chairman at Integrity360 commented “We are very excited to be welcoming the team from Holiseum to Integrity360. We are highly impressed with the track record, achievements and skills of the Holiseum team in critical and industrial infrastructure which will be highly complementary to the existing capabilities of the group." "Both organisations share the same passion for technical excellence, customer service and innovation. The enhanced group will significantly expand Holiseum’s considerable expertise in OT/IoT environments for the benefit of customers both in France and across all other EMEA locations. Paris will also serve as an additional Integrity360 key regional hub from which we will deliver an expanded set of services for the benefit of our combined customers over the coming months and years”. Holiseum’s next chapter An Nguyen and Faiz Djellouli Founders and Directors of Holiseum commented: “We are both really delighted that Holiseum is joining Integrity360 and continuing the journey that we started in 2018. Thanks to the support of our customers and employees Holiseum has grown to become one of the leading experts in cybersecurity for critical infrastructure within Europe.” “Holiseum is delighted to be continuing that journey but with Integrity360’s support, allowing us to further expand our team, our services and our market coverage. Our skills combined with those of Integrity360 will provide an extension of our portfolio of services for OT environments. This is really great news for our employees, and customers, and the whole team at Holiseum are really looking forward to working closely with Ian and the wider Integrity360 team over the coming years."
Sumsub, a full cycle verification platform, announces it is working with Duolingo English Test (DET) to help further safeguard the integrity of the English-language test-taking process. Sumsub’s user verification and fraud prevention tools will add multi-layered security on the platform to uphold the legitimacy of the examination process. Identity verification processes Sumsub’s solution provides an added layer of security, enhancing DET’s defences to stay ahead Much like other widely recognised and accepted high stakes tests, DET is a target for fraud. While some examinees try to bypass identity verification processes through methods such as deepfakes, forged documents, and fraud networks, DET’s systems are actively catching and preventing these efforts. Sumsub’s solution now provides an added layer of security, enhancing DET’s defences to stay ahead of increasingly sophisticated methods of fraud. Sumsub’s advanced verification technology The legitimacy of the DET is crucial for institutions that rely on the test to make decisions about higher education admissions; for some employment and visa applications; and for the legitimate users whose livelihoods rely on proving their English proficiency. As demand for online testing grows, so does the complexity of fraud. Helping institutions stay ahead of fraudsters, Sumsub’s advanced verification technology includes AI-powered document verification, Liveness checks and deepfake detection. Sumsub’s Fraud Prevention technology Sumsub’s Fraud Prevention technology plays a critical role in identifying these for DET According to internal data from Sumsub’s annual Identity Fraud Report 2024, AI-powered fraud is on the rise, with deepfakes surging by 4x globally from 2023 to 2024. In addition, the report reveals that 1 in 100 online users are linked to fraud networks – organised criminal groups that work in tandem to circumvent security measures. Fraud rings threaten verification processes and the integrity of online testing platforms, and Sumsub’s Fraud Prevention technology plays a critical role in identifying these for DET. Integrity of the Duolingo English Test “The integrity of the Duolingo English Test is vital to the trust our users and partnered organisations place in our platform. By teaming up with Sumsub, we’re combining two cutting-edge security systems with distinct core competencies to enhance our defences," said Basim Baig, Head of Test Security for the Duolingo English Test. “This collaboration ensures we stay one step ahead of increasingly sophisticated fraud attempts, reinforcing the strong security foundation we’ve already built. We remain committed to maintaining the highest security standards, which ultimately protects the interests of both our test-takers and the institutions that rely on our test results.” Expansion for Sumsub Collaboration marks a notable growth for Sumsub, which has set itself as a key player in anti-fraud solutions This collaboration marks a significant expansion for Sumsub, which has established itself as a key player in providing anti-fraud solutions to industries like crypto, fintech, and iGaming. Now, with the rise of online education and the global demand for secure language proficiency tests, Sumsub aims to bring its expertise into the education sector, working alongside one of the world’s most prominent language learning platforms. AI-powered verification technology "The rise of online assessments has made identity fraud and test manipulation more sophisticated than ever. Protecting the integrity of these tests is critical – not just for test-takers, but for the institutions and employers that rely on their results,” said Inna Lyubashevskaya, Chief Customer Officer at Sumsub. “Our AI-powered verification technology is built to tackle evolving threats like deepfakes and impersonation without adding unnecessary friction for genuine users. By working with Duolingo English Test, we’re reinforcing security and setting a higher standard for trust, fairness, and accessibility in digital learning." Duolingo’s entire suite of services Looking ahead, both companies aim to expand their collaboration to provide even more robust verification solutions for Duolingo’s entire suite of services. Sumsub continues to develop its Non-Doc Verification product, a fast and secure solution that can verify identities in as little as 4.5 seconds, further improving the speed and accuracy of online verification. Additionally, both companies are exploring opportunities to raise awareness of the importance of test security through campaigns designed to educate Duolingo users and institutions about the growing risks of fraud in the education space.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, has announced its plans for Security & Policing, where it will demonstrate its latest solutions for high-security environments. Hosted by the Home Office’s Joint Security & Resilience Centre (JSaRC), Security & Policing offers an opportunity to meet and discuss the latest advances in delivering national security and resilience. Physical security platform The platform gives operators the ability to manage their security plans, including access control Visitors to booth #B101 will have the opportunity to experience live demonstrations of Genetec Security Centre, the company’s unified and open-architecture physical security platform. Available in the cloud, fully on premises or as part of hybrid deployment, the platform gives operators the ability to manage all their security systems, including video surveillance, access control, intrusion detection and other sensors through one single interface. Genetec Synergis Cloud Link Genetec is currently the only security manufacturer to hold a valid CAPSS (Cyber Assurance of Physical Security Systems) certification for unified video management, access control and operator decision management within a single application. The solutions granted CAPSS approved status are Genetec Security Centre and the Genetec Synergis Cloud Link. This means they can be used with confidence in high security government projects and other critical infrastructure sectors such as telecoms. Genetec Mission Control Genetec Mission Control, a decision control system that helps users understand unfolding events Also on display will be Genetec Mission Control, a decision management system that helps users understand unfolding events and coordinate responses more effectively during critical incident management situations. It operates entirely within the Security Centre platform, allowing users to manage and access all incidents, alarms and data in one place. Hostile digital landscape "Our commitment to cybersecurity and compliance ensures that every solution we develop meets the highest standards." "We are excited to connect with the industry at Security and Policing and demonstrate how our solutions are empowering law enforcement, government agencies and critical sites to operate with confidence in an increasingly complex and hostile digital landscape,” comments Dan Meyrick, Senior Manager Consultant A&E (CDE Program Europe).
MERON will be demonstrating its innovative physical identity, access, and incident management solution by appointment only at ISC West 2025 in Las Vegas, April 2-4. MERON PIAM+ leverages the latest advancements in data science, AI and microservices architecture, setting new benchmarks in performance and cost efficiency for large enterprise applications. Transforming access management “MERON PIAM+ has experienced an extremely high level of interest from large enterprise organisations since its public debut in the fall of 2024,” said Sharad Shekhar, Principal at MERON. “Our solution resolves the significant shortfalls of older generation PIAM applications related to scalability, integration, security and cost savings.” Advanced AI integration The unique PIAM+ solution employs the latest concepts in computer science including in-memory data structures MERON PIAM+ integrates advanced AI technologies, automation and analytics to provide enhanced security, efficiency, and adaptability. The unique PIAM+ solution employs the latest concepts in computer science including in-memory data structures, infinitely scalable microservices, data management architecture, streaming data analytics and integration, and a highly advanced AI engine that drives intelligent Co-pilots to automate tasks and workloads. All this combines to provide fast transactional performance and automatic self-healing processes with 99.9% uptime. Enhanced security & efficiency MERON PIAM+ key benefits include: Comprehensive identity lifecycle management Automated Co-pilots to eliminate error laden manual processes Layered cybersecurity across microservice applications Real-time analytics to derive actionable insights and detect anomalies Easily scalable, maintainable and upgradable architecture Integrated visitor and incident management Up to 50% reduction in ID management cost Distributed data and event streaming up to 300% faster Extensive API support for efficient integrations Fast and easy implementation
Sumsub, a full-cycle verification platform, is launching its Reusable Digital Identity product suite. It will effectively mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings are set to reduce applicant onboarding times by 50% and boost conversion rates by 30%, on average. Identity multiple services All of the checks required for ensuring a compliant verification must still take place KYC is essential for security, fraud prevention and compliance. However, when users need to verify their identity repeatedly across multiple services – especially when seeking critical access to financial or transportation apps – it creates friction and frustration. This repetitive process often leads to high drop-off rates and less user interest, impacting both user experience and business conversion rates. At the same time, all of the checks required for ensuring a compliant verification must still take place. Sumsub compliance and security Sumsub is processing millions of identity checks weekly, and aggregated data analysis reveals that one in three applicants have verified previously with Sumsub, highlighting the recurring KYC issue. To address this, Sumsub has launched a combined product to help both individuals and firms alike avoid repetitive verification steps while ensuring full compliance and security. Reusable Digital Identity product Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC The Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC. Both of them enable end-users to skip cumbersome verification steps such as document uploads, while at the same time ensuring that all checks required for regulatory adherence for businesses still take place. Sumsub ID enables end-users to securely store and re-use their verified documents for multiple verifications across Sumsub client platforms, whereas Reusable KYC allows companies in the Sumsub ecosystem to agree to share applicants’ data upon receiving their consent. Reusable Digital Identity While each product has a unique approach to the same challenge, both of them further enhance customer experience while ensuring full compliance and adding an extra layer of security. By offering faster and more efficient ways to verify identities, Reusable Digital Identity is designed to help users avoid unnecessary document uploads and repetitive data input procedures–while, at the same time, speeding up applicant onboarding and enhancing conversion rates for companies. Redefining digital ID verification Reusable Digital Identity is designed to help users avoid unnecessary document uploads “With a decade of experience in the market, our vision remains clear – to provide global businesses digital identity checks with the speed and convenience of payments, without sacrificing on compliance and security”, comments Vyacheslav Zholudev, CTO and co-founder of Sumsub. “With Sumsub ID and Reusable KYC, we are redefining digital ID verification by helping businesses improve onboarding efficiency and also giving users full control over their documents and data, respectively. This marks a significant milestone in our mission to make identity verification faster, safer, and more reliable for everyone.” Key benefits of Sumsub Identity products Key benefits of Sumsub Reusable Digital Identity products for businesses are: Higher pass rates: businesses see up to 30% improvement in successful user verifications. Faster KYC processes: Sumsub ID reduces onboarding time by 50%, improving conversion rates. Full Compliance & Security: Both Reusable KYC and Sumsub ID are GDPR-compliant and built to enhance fraud prevention. Main benefits for users are: Seamless verification: individuals can breeze through KYC by re-using their documents from previous verifications with Sumsub. Full privacy and security of personal data stored or shared by third parties for verification purposes. Less time spent on getting access to the platforms and services people use, as both Sumsub ID and Reusable KYC make the onboarding process faster by eliminating redundant document uploads. How Sumsub reusable digital identity product suite works Sumsub ID allows applicants to onboard onto a platform within the Sumsub ecosystem, securely store their verified documents, and reuse them for future verifications across 4000+ companies which also use Sumsub; Reusable KYC enables companies to share users’ personal data with their explicit consent, ensuring quicker onboarding, which benefits companies and individuals alike. Sumsub ID is now available for anyone to sign up and benefit from seamless verification and onboarding across crypto, fintech, banking, e-commerce, traditional finance, security, regtech, and fraud prevention industries.
Colt Technology Services (Colt), the global digital infrastructure company, announced the successful completion of a groundbreaking quantum-secured encryption trial across its optical wave network. Colt collaborated with a number of technology partners for the trial including Adtran, Ciena, ID Quantique (IDQ), Nokia and Toshiba, with a view to Colt offering a suite of services for global businesses to prepare for a quantum-secured future. Secured encryption solutions Quantum-secured encryption solutions are designed and delivered to meet Colt customers’ individual requirements Following the successful completion of the trial, Colt is developing new customised solutions which protect businesses from the risks posed by quantum computers in deciphering classical encryption keys. The new quantum-secured encryption solutions - which can be designed and delivered to meet Colt customers’ individual requirements – will expand and complement Colt’s existing Optical Encryption portfolio. Secure with quantum Quantum-secured Encryption will include: Quantum-secured Encryption for Colt's Wave Services across Metro, National and International networks Quantum-secured Encryption for a customer's private network across Metro, National and International networks For Colt, the trial was a significant step forward in piloting new technologies which solve future problems for its global customers, as well as testing the capabilities and integration of a number of different partners. This means it can offer quantum-secured networking capabilities in a vendor-agnostic environment, giving Colt’s customers a wider choice of solutions to meet their current and future needs. Quantum growth and risks The quantum market is forecast to grow at a CAGR of 23-25% from 2023 to 2035The quantum market is forecast to grow at a CAGR of 23-25% from 2023 to 2035, with industries including financial services, defence and healthcare companies being some of the first to benefit from its complex problem-solving potential. At the same time, organisations must protect themselves from risks expected to be presented by quantum computers, including ‘harvest now, decrypt later’, in which adversaries collect and store data with the intention of decrypting it as quantum technology matures; and Q-Day, the point at which quantum computers are expected to be able to break classical encryption methods. Facing the quantum future Buddy Bayer, chief operating officer, Colt Technology Services said, “Safeguarding data from future risk is a huge challenge for businesses, particularly when the threat comes from a technology as complex and unknown as quantum.” “Our trial brought together some of the most exceptional partners, advanced technologies and the greatest technical minds in the industry with a single shared goal: to find a solution so our customers can face a quantum future with confidence. Together, we’ve achieved that goal.” Next-gen network security Technical specifications of the trial are below: The trial evaluated different quantum-secured encryption methods on data traffic across Colt’s optical wave network, including Quantum Key Distribution (QKD); Pre-Shared Key (PSK) with symmetric key distribution; and Post Quantum Cryptography (PQC) technology. Colt tested these different yet complementary quantum-secured capabilities in its long-distance network between London to Frankfurt with a span length of 1,361 km and in its metro network across two Colt Points of Presence (PoPs) in London city and one PoP in Slough with a span length of 88km. The Quantum Key Distribution trial ran between London City and Slough in the UK. Multiple partner solutions evaluated quantum key distribution scenarios in both point to point and trusted node topologies. Colt also tested the scenarios using both dual fibre pair and single fibre pair networks. In the single fibre scenario, Colt transported both quantum channel and data services on the same fibre pair. Secured financial services Colt anticipates its financial services customers will be some of the first to benefit from its new solutions, with the financial services industry seeing some of the earliest adoption of quantum. Deloitte insights anticipates the financial services industry’s investment in quantum computing capabilities to grow at a 10-year CAGR of 72% from 2022 through to 2032, from US$80 million in 2022 to US$19 billion in 2032. Securing with innovation Use cases across the industry include quantum in risk management; fraud detection and mitigation; portfolio optimisation and market analysis; complex derivative pricing; high frequency trading and securing financial operations. Buddy added, “With this successful trial, we’re not just keeping pace with the future of cybersecurity, we are taking the charge. Our commitment to innovation and security ensures that our customers can confidently navigate the quantum era, knowing their data is protected by the most advanced encryption technologies available.”
Continuing its global expansion plan Integrity360 has acquired pioneer cyber security specialist Holiseum headquartered in Paris, France. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to accelerate its growth in France and continental Europe and significantly provide a new and exciting services practice focused on Operational Technology (“OT”) and Internet of Things (“IoT”) technologies which complement Integrity360’s existing service practices. Partnering for cybersecurity Those include cyber risk and assurance, cyber security testing, incident response, infrastructure, Microsoft cyber, payments compliance, and a highly comprehensive range of cyber security managed services including managed detection and response (“MDR”) solutions. Holiseum will continue to operate from its existing three facilities in France but with the benefit of the full resources and capability of the wider Integrity360 business. Protecting industrial systems Holiseum is a consultancy specialises in industrial infrastructureHoliseum, founded in 2018, is a highly respected and well-established cybersecurity consultancy that specialises in critical and industrial infrastructure. It serves approximately 80 customers throughout France and selected international locations from facilities in Paris and Nimes including organisations operating in the energy, infrastructure, manufacturing, transport and financial sectors. Trusted in OT protection In particular Holiseum is an expert in OT technology and has helped many global corporate and infrastructure organisations secure and evolve their OT environment and associated IT estates. Holiseum’s reputation is underpinned by several security accreditations from ANSSI – the National Cybersecurity Agency of France – including PASSI (cybersecurity audit services) and PACS (cybersecurity support and consulting) – where Holiseum is one of the first three certified organisations in France. Securing critical infrastructure Holiseum’s portfolio of services include audit, training, investigation and a full suite of OT consulting solutions. Securing critical infrastructures is a high priority for many governments and corporate organisations across the globe due to the alarming rise in attacks on industrial and energy infrastructure. Pioneer industry analyst Gartner has commented that such attacks could result in the weaponisation of OT environments to seriously harm human life. Despite the tightening of the regulatory environment with the introduction of cyber security frameworks including NIS2 (Network and Information Security 2) and DORA (Digital Operational Resilience Act) the challenge of continuously securing critical infrastructure remains acute. Holiseum will form a major new practice within Integrity360 dedicated to the mission of aiding, protecting and supporting both government and industrial infrastructure. The existing Holiseum team of 32, will be rapidly expanded in France and across all other Integrity360 markets in support of this mission. Strengthening cybersecurity Integrity360’s innovative range of services have been recognised on multiple occasions by GartnerIn addition, Holiseum’s headquarters in Paris will form a new regional hub for the group from which it will deliver the full suite of Integrity360 services, and during 2025 an additional Paris based SOC (Security Operations Centre) will be launched to join the existing network of six SOC’s across EMEA (Dublin, Stockholm, Naples, Sofia, Madrid and Cape Town). The SOC teams deliver a wide ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360’s innovative range of services have been recognised on multiple occasions by Gartner, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services. Driving innovation in security The addition of Holiseum brings group revenues to over €160m and a dedicated cybersecurity team of over 700 employees. Further innovation and demand for its services across the EMEA region will expand group revenues in 2025 across all territories. Ian Brown, Executive Chairman at Integrity360 commented “We are very excited to be welcoming the team from Holiseum to Integrity360. We are highly impressed with the track record, achievements and skills of the Holiseum team in critical and industrial infrastructure which will be highly complementary to the existing capabilities of the group." "Both organisations share the same passion for technical excellence, customer service and innovation. The enhanced group will significantly expand Holiseum’s considerable expertise in OT/IoT environments for the benefit of customers both in France and across all other EMEA locations. Paris will also serve as an additional Integrity360 key regional hub from which we will deliver an expanded set of services for the benefit of our combined customers over the coming months and years”. Holiseum’s next chapter An Nguyen and Faiz Djellouli Founders and Directors of Holiseum commented: “We are both really delighted that Holiseum is joining Integrity360 and continuing the journey that we started in 2018. Thanks to the support of our customers and employees Holiseum has grown to become one of the leading experts in cybersecurity for critical infrastructure within Europe.” “Holiseum is delighted to be continuing that journey but with Integrity360’s support, allowing us to further expand our team, our services and our market coverage. Our skills combined with those of Integrity360 will provide an extension of our portfolio of services for OT environments. This is really great news for our employees, and customers, and the whole team at Holiseum are really looking forward to working closely with Ian and the wider Integrity360 team over the coming years."
Sumsub, a full cycle verification platform, announces it is working with Duolingo English Test (DET) to help further safeguard the integrity of the English-language test-taking process. Sumsub’s user verification and fraud prevention tools will add multi-layered security on the platform to uphold the legitimacy of the examination process. Identity verification processes Sumsub’s solution provides an added layer of security, enhancing DET’s defences to stay ahead Much like other widely recognised and accepted high stakes tests, DET is a target for fraud. While some examinees try to bypass identity verification processes through methods such as deepfakes, forged documents, and fraud networks, DET’s systems are actively catching and preventing these efforts. Sumsub’s solution now provides an added layer of security, enhancing DET’s defences to stay ahead of increasingly sophisticated methods of fraud. Sumsub’s advanced verification technology The legitimacy of the DET is crucial for institutions that rely on the test to make decisions about higher education admissions; for some employment and visa applications; and for the legitimate users whose livelihoods rely on proving their English proficiency. As demand for online testing grows, so does the complexity of fraud. Helping institutions stay ahead of fraudsters, Sumsub’s advanced verification technology includes AI-powered document verification, Liveness checks and deepfake detection. Sumsub’s Fraud Prevention technology Sumsub’s Fraud Prevention technology plays a critical role in identifying these for DET According to internal data from Sumsub’s annual Identity Fraud Report 2024, AI-powered fraud is on the rise, with deepfakes surging by 4x globally from 2023 to 2024. In addition, the report reveals that 1 in 100 online users are linked to fraud networks – organised criminal groups that work in tandem to circumvent security measures. Fraud rings threaten verification processes and the integrity of online testing platforms, and Sumsub’s Fraud Prevention technology plays a critical role in identifying these for DET. Integrity of the Duolingo English Test “The integrity of the Duolingo English Test is vital to the trust our users and partnered organisations place in our platform. By teaming up with Sumsub, we’re combining two cutting-edge security systems with distinct core competencies to enhance our defences," said Basim Baig, Head of Test Security for the Duolingo English Test. “This collaboration ensures we stay one step ahead of increasingly sophisticated fraud attempts, reinforcing the strong security foundation we’ve already built. We remain committed to maintaining the highest security standards, which ultimately protects the interests of both our test-takers and the institutions that rely on our test results.” Expansion for Sumsub Collaboration marks a notable growth for Sumsub, which has set itself as a key player in anti-fraud solutions This collaboration marks a significant expansion for Sumsub, which has established itself as a key player in providing anti-fraud solutions to industries like crypto, fintech, and iGaming. Now, with the rise of online education and the global demand for secure language proficiency tests, Sumsub aims to bring its expertise into the education sector, working alongside one of the world’s most prominent language learning platforms. AI-powered verification technology "The rise of online assessments has made identity fraud and test manipulation more sophisticated than ever. Protecting the integrity of these tests is critical – not just for test-takers, but for the institutions and employers that rely on their results,” said Inna Lyubashevskaya, Chief Customer Officer at Sumsub. “Our AI-powered verification technology is built to tackle evolving threats like deepfakes and impersonation without adding unnecessary friction for genuine users. By working with Duolingo English Test, we’re reinforcing security and setting a higher standard for trust, fairness, and accessibility in digital learning." Duolingo’s entire suite of services Looking ahead, both companies aim to expand their collaboration to provide even more robust verification solutions for Duolingo’s entire suite of services. Sumsub continues to develop its Non-Doc Verification product, a fast and secure solution that can verify identities in as little as 4.5 seconds, further improving the speed and accuracy of online verification. Additionally, both companies are exploring opportunities to raise awareness of the importance of test security through campaigns designed to educate Duolingo users and institutions about the growing risks of fraud in the education space.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, has announced its plans for Security & Policing, where it will demonstrate its latest solutions for high-security environments. Hosted by the Home Office’s Joint Security & Resilience Centre (JSaRC), Security & Policing offers an opportunity to meet and discuss the latest advances in delivering national security and resilience. Physical security platform The platform gives operators the ability to manage their security plans, including access control Visitors to booth #B101 will have the opportunity to experience live demonstrations of Genetec Security Centre, the company’s unified and open-architecture physical security platform. Available in the cloud, fully on premises or as part of hybrid deployment, the platform gives operators the ability to manage all their security systems, including video surveillance, access control, intrusion detection and other sensors through one single interface. Genetec Synergis Cloud Link Genetec is currently the only security manufacturer to hold a valid CAPSS (Cyber Assurance of Physical Security Systems) certification for unified video management, access control and operator decision management within a single application. The solutions granted CAPSS approved status are Genetec Security Centre and the Genetec Synergis Cloud Link. This means they can be used with confidence in high security government projects and other critical infrastructure sectors such as telecoms. Genetec Mission Control Genetec Mission Control, a decision control system that helps users understand unfolding events Also on display will be Genetec Mission Control, a decision management system that helps users understand unfolding events and coordinate responses more effectively during critical incident management situations. It operates entirely within the Security Centre platform, allowing users to manage and access all incidents, alarms and data in one place. Hostile digital landscape "Our commitment to cybersecurity and compliance ensures that every solution we develop meets the highest standards." "We are excited to connect with the industry at Security and Policing and demonstrate how our solutions are empowering law enforcement, government agencies and critical sites to operate with confidence in an increasingly complex and hostile digital landscape,” comments Dan Meyrick, Senior Manager Consultant A&E (CDE Program Europe).
MERON will be demonstrating its innovative physical identity, access, and incident management solution by appointment only at ISC West 2025 in Las Vegas, April 2-4. MERON PIAM+ leverages the latest advancements in data science, AI and microservices architecture, setting new benchmarks in performance and cost efficiency for large enterprise applications. Transforming access management “MERON PIAM+ has experienced an extremely high level of interest from large enterprise organisations since its public debut in the fall of 2024,” said Sharad Shekhar, Principal at MERON. “Our solution resolves the significant shortfalls of older generation PIAM applications related to scalability, integration, security and cost savings.” Advanced AI integration The unique PIAM+ solution employs the latest concepts in computer science including in-memory data structures MERON PIAM+ integrates advanced AI technologies, automation and analytics to provide enhanced security, efficiency, and adaptability. The unique PIAM+ solution employs the latest concepts in computer science including in-memory data structures, infinitely scalable microservices, data management architecture, streaming data analytics and integration, and a highly advanced AI engine that drives intelligent Co-pilots to automate tasks and workloads. All this combines to provide fast transactional performance and automatic self-healing processes with 99.9% uptime. Enhanced security & efficiency MERON PIAM+ key benefits include: Comprehensive identity lifecycle management Automated Co-pilots to eliminate error laden manual processes Layered cybersecurity across microservice applications Real-time analytics to derive actionable insights and detect anomalies Easily scalable, maintainable and upgradable architecture Integrated visitor and incident management Up to 50% reduction in ID management cost Distributed data and event streaming up to 300% faster Extensive API support for efficient integrations Fast and easy implementation
Sumsub, a full-cycle verification platform, is launching its Reusable Digital Identity product suite. It will effectively mitigate repetitive verification and redundant Know Your Customer (KYC) checks that negatively impact user experience and conversion rates for businesses. The new offerings are set to reduce applicant onboarding times by 50% and boost conversion rates by 30%, on average. Identity multiple services All of the checks required for ensuring a compliant verification must still take place KYC is essential for security, fraud prevention and compliance. However, when users need to verify their identity repeatedly across multiple services – especially when seeking critical access to financial or transportation apps – it creates friction and frustration. This repetitive process often leads to high drop-off rates and less user interest, impacting both user experience and business conversion rates. At the same time, all of the checks required for ensuring a compliant verification must still take place. Sumsub compliance and security Sumsub is processing millions of identity checks weekly, and aggregated data analysis reveals that one in three applicants have verified previously with Sumsub, highlighting the recurring KYC issue. To address this, Sumsub has launched a combined product to help both individuals and firms alike avoid repetitive verification steps while ensuring full compliance and security. Reusable Digital Identity product Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC The Reusable Digital Identity product suite includes two products, Sumsub ID and Reusable KYC. Both of them enable end-users to skip cumbersome verification steps such as document uploads, while at the same time ensuring that all checks required for regulatory adherence for businesses still take place. Sumsub ID enables end-users to securely store and re-use their verified documents for multiple verifications across Sumsub client platforms, whereas Reusable KYC allows companies in the Sumsub ecosystem to agree to share applicants’ data upon receiving their consent. Reusable Digital Identity While each product has a unique approach to the same challenge, both of them further enhance customer experience while ensuring full compliance and adding an extra layer of security. By offering faster and more efficient ways to verify identities, Reusable Digital Identity is designed to help users avoid unnecessary document uploads and repetitive data input procedures–while, at the same time, speeding up applicant onboarding and enhancing conversion rates for companies. Redefining digital ID verification Reusable Digital Identity is designed to help users avoid unnecessary document uploads “With a decade of experience in the market, our vision remains clear – to provide global businesses digital identity checks with the speed and convenience of payments, without sacrificing on compliance and security”, comments Vyacheslav Zholudev, CTO and co-founder of Sumsub. “With Sumsub ID and Reusable KYC, we are redefining digital ID verification by helping businesses improve onboarding efficiency and also giving users full control over their documents and data, respectively. This marks a significant milestone in our mission to make identity verification faster, safer, and more reliable for everyone.” Key benefits of Sumsub Identity products Key benefits of Sumsub Reusable Digital Identity products for businesses are: Higher pass rates: businesses see up to 30% improvement in successful user verifications. Faster KYC processes: Sumsub ID reduces onboarding time by 50%, improving conversion rates. Full Compliance & Security: Both Reusable KYC and Sumsub ID are GDPR-compliant and built to enhance fraud prevention. Main benefits for users are: Seamless verification: individuals can breeze through KYC by re-using their documents from previous verifications with Sumsub. Full privacy and security of personal data stored or shared by third parties for verification purposes. Less time spent on getting access to the platforms and services people use, as both Sumsub ID and Reusable KYC make the onboarding process faster by eliminating redundant document uploads. How Sumsub reusable digital identity product suite works Sumsub ID allows applicants to onboard onto a platform within the Sumsub ecosystem, securely store their verified documents, and reuse them for future verifications across 4000+ companies which also use Sumsub; Reusable KYC enables companies to share users’ personal data with their explicit consent, ensuring quicker onboarding, which benefits companies and individuals alike. Sumsub ID is now available for anyone to sign up and benefit from seamless verification and onboarding across crypto, fintech, banking, e-commerce, traditional finance, security, regtech, and fraud prevention industries.
Colt Technology Services (Colt), the global digital infrastructure company, announced the successful completion of a groundbreaking quantum-secured encryption trial across its optical wave network. Colt collaborated with a number of technology partners for the trial including Adtran, Ciena, ID Quantique (IDQ), Nokia and Toshiba, with a view to Colt offering a suite of services for global businesses to prepare for a quantum-secured future. Secured encryption solutions Quantum-secured encryption solutions are designed and delivered to meet Colt customers’ individual requirements Following the successful completion of the trial, Colt is developing new customised solutions which protect businesses from the risks posed by quantum computers in deciphering classical encryption keys. The new quantum-secured encryption solutions - which can be designed and delivered to meet Colt customers’ individual requirements – will expand and complement Colt’s existing Optical Encryption portfolio. Secure with quantum Quantum-secured Encryption will include: Quantum-secured Encryption for Colt's Wave Services across Metro, National and International networks Quantum-secured Encryption for a customer's private network across Metro, National and International networks For Colt, the trial was a significant step forward in piloting new technologies which solve future problems for its global customers, as well as testing the capabilities and integration of a number of different partners. This means it can offer quantum-secured networking capabilities in a vendor-agnostic environment, giving Colt’s customers a wider choice of solutions to meet their current and future needs. Quantum growth and risks The quantum market is forecast to grow at a CAGR of 23-25% from 2023 to 2035The quantum market is forecast to grow at a CAGR of 23-25% from 2023 to 2035, with industries including financial services, defence and healthcare companies being some of the first to benefit from its complex problem-solving potential. At the same time, organisations must protect themselves from risks expected to be presented by quantum computers, including ‘harvest now, decrypt later’, in which adversaries collect and store data with the intention of decrypting it as quantum technology matures; and Q-Day, the point at which quantum computers are expected to be able to break classical encryption methods. Facing the quantum future Buddy Bayer, chief operating officer, Colt Technology Services said, “Safeguarding data from future risk is a huge challenge for businesses, particularly when the threat comes from a technology as complex and unknown as quantum.” “Our trial brought together some of the most exceptional partners, advanced technologies and the greatest technical minds in the industry with a single shared goal: to find a solution so our customers can face a quantum future with confidence. Together, we’ve achieved that goal.” Next-gen network security Technical specifications of the trial are below: The trial evaluated different quantum-secured encryption methods on data traffic across Colt’s optical wave network, including Quantum Key Distribution (QKD); Pre-Shared Key (PSK) with symmetric key distribution; and Post Quantum Cryptography (PQC) technology. Colt tested these different yet complementary quantum-secured capabilities in its long-distance network between London to Frankfurt with a span length of 1,361 km and in its metro network across two Colt Points of Presence (PoPs) in London city and one PoP in Slough with a span length of 88km. The Quantum Key Distribution trial ran between London City and Slough in the UK. Multiple partner solutions evaluated quantum key distribution scenarios in both point to point and trusted node topologies. Colt also tested the scenarios using both dual fibre pair and single fibre pair networks. In the single fibre scenario, Colt transported both quantum channel and data services on the same fibre pair. Secured financial services Colt anticipates its financial services customers will be some of the first to benefit from its new solutions, with the financial services industry seeing some of the earliest adoption of quantum. Deloitte insights anticipates the financial services industry’s investment in quantum computing capabilities to grow at a 10-year CAGR of 72% from 2022 through to 2032, from US$80 million in 2022 to US$19 billion in 2032. Securing with innovation Use cases across the industry include quantum in risk management; fraud detection and mitigation; portfolio optimisation and market analysis; complex derivative pricing; high frequency trading and securing financial operations. Buddy added, “With this successful trial, we’re not just keeping pace with the future of cybersecurity, we are taking the charge. Our commitment to innovation and security ensures that our customers can confidently navigate the quantum era, knowing their data is protected by the most advanced encryption technologies available.”


Expert commentary
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Deter, detect, and apprehend criminals Fenton is a small city with 12,000 permanent residents, but Chief of Police Jeffery Cross estimates that 60,000 people pass through the town daily. Located off Highway US-23, it is a popular shopping and restaurant district for commuters and people from neighbouring cities. Unfortunately, retail criminals also frequent the area. The new video surveillance system is designed to deter, detect, and apprehend retail criminals. Live security camera footage Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access The new system, housed in a rugged, weatherproof cabinet and mounted on a telephone pole with two cameras, includes Eagle Eye 911 Camera Sharing technology. Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access to view live security camera footage during an emergency. “With 911 Camera Sharing, the 911 operator can see the situation unfold and give law enforcement direct, quality information and immediate feedback about what happened and the direction the suspect is headed in,” Cross explained. “That enhances safety for first responders and our community.” Smart Video Search In addition, the security cameras have built-in AI-powered Eagle Eye Smart Video Search, which enables Fenton’s authorised law enforcement officials to quickly search security camera footage for vehicles, people, or objects of interest. “With Smart Video Search you can search for a ‘person wearing a red shirt and black pants’ a ‘blue Honda truck’ or ‘person with a backpack’ and quickly find a shoplifting suspect or determine when a certain vehicle, person, or group of people entered a shopping centre parking lot, which can be critical information for law enforcement,” said Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions. This Novi, Mich.-based security integrator is working on the project with the City of Fenton. AI-powered video surveillance “Fenton’s new system with 911 Camera Sharing and AI features such as Smart Video Search is like having a virtual patrol in the Fenton business district,” he added. “Last month the National Retail Federation reported a 93% increase in the average number of shoplifting incidents per year in 2023 versus 2019 and a 90% increase in dollar loss,” said Dean Drako, CEO of Eagle Eye Networks. “AI-powered video surveillance can now be deployed in more areas than ever, offering communities new ways to contend with rising retail crime.”
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
With the common goal of improving security and emergency response in the event of a critical incident, community members in Livingston County have deployed technology that turns their standard security cameras into a powerful resource for 911 Emergency Communications Centre telecommunicators (911 professionals). Response time “It’s all about response time: The key to saving lives, curtailing damage, and rapidly resolving an emergency of any kind–whether it’s a natural disaster, fire, mass shooting, or other criminal activity–is getting accurate information to first responders so they can take quick, decisive action,” said Mike Murphy, Livingston County Sheriff. While security cameras are ubiquitous at schools and businesses, 911 telecommunicators typically cannot access them in an emergency. Eagle Eye 911 Camera Sharing With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather information Eagle Eye 911 Camera Sharing changes that by giving telecommunicators instant access to live video from one or multiple security cameras when a 911-triggered emergency occurs, empowering them to quickly deliver critical incident information to first responders through a partnership with RapidSOS. Telecommunicators generally rely on verbal information from 911 callers. With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather an immense amount of information. Real-time situational awareness “Camera Sharing gives us a real-time view of the situation at hand as it’s unfolding,” said Kecia Williams, 911 Director, Livingston County 911 Central Dispatch. “Lots of times it takes a while to attain pertinent information from a 911 caller because they’re distraught or not clear. With Camera Sharing, we can instantly see for ourselves what’s going on, and we can get this information to the fire department, EMS, or law enforcement much quicker.” Camera Sharing technology This organisation works with local school districts to provide educational services Livingston County is the first county in Michigan to demo the new technology at the Livingston Educational Service Agency in Howell. This organisation works with local school districts to provide educational services and support to 26,000 students throughout the county. “I am impressed with the Camera Sharing technology and can see the potential for improving response times by first responders to critical events in our community,” said Michael Hubert, Superintendent of Livingston Educational Service Agency. Cybersecurity and privacy protection Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions, a security integrator based in Novi, Michigan, said, “Most businesses and schools already have security cameras that can easily be connected to Eagle Eye 911 Camera Sharing, which is a first-of-its-kind technology that has cybersecurity and privacy protections built in." "As a former law enforcement officer, I believe camera sharing can significantly improve the outcome of emergencies and improve safety and security for first responders.” Dean Drako, CEO of Eagle Eye Networks said, “Livingston County is a prime example of a growing trend we’re seeing in the U.S. where entire communities - schools, businesses, public safety officials, and community pioneers are working together to ensure they are prepared as possible for emergencies.”
The space-saving yet full-function video spectral comparator Regula 4306 has been deployed at Wattay International Airport in Vientiane, the Lao People’s Democratic Republic, to strengthen the country’s border security. This initiative aims to combat transnational crimes, including human trafficking, smuggling, and irregular migration. Forged identity documents Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents Like many countries, the Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents used by criminals and irregular migrants. Until recently, document verification at border checkpoints relied heavily on manual inspection, which was time-consuming, prone to errors, and less effective against increasingly sophisticated forgery techniques. Adopting a forensic solution In collaboration with International Organisation for Migration (IOM), the Lao immigration authorities began modernising their approach by adopting a forensic solution to strengthen document authentication and border security. In partnership with IOM in the Lao People’s Democratic Republic and the Australian Department of Home Affairs, the Lao immigration authorities deployed the Regula 4306 video spectral comparator at the country’s major airport in Vientiane. This step equipped border officials with advanced forensic tools for in-depth document authentication, and significantly automated the whole process. Array of features in the Regula 4306 With an array of features in the Regula 4306, ID proof at the Lao border earned much precision With a vast array of features in the Regula 4306, ID verification at the Lao border achieved much-needed high precision. For instance, the device’s high-resolution 8 MP camera with 60x optical zoom captures document images at up to 18,900 ppi and enables officials to analyse even the finest details, including printing techniques. Hyperspectral imaging module Additionally, with over 40 types of light sources and 18 light filters, the Regula 4306 allows authorities at the second line of border control to examine the most intricate document security features, such as holograms, watermarks, microprinting, and optically variable elements, ensuring a more reliable fraud detection process. Apart from that, 3D visualisation helps analyse a document’s surface relief and intersecting lines, and the hyperspectral imaging module enables forensic experts to detect document alterations, differentiate ink properties, or recover faded text. Regula Forensic Studio cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software. With RFS, an expert can perform a wide range of examinations, conduct precise measurements and comparisons, process images in various modes, and generate comprehensive examination reports without losing a single detail. Its powerful tools and intuitive interface ensure accuracy and reliability, enabling thorough and efficient forensic investigations. Regula’s identity document template database Integrated with Regula Document Reader SDK, RFS enables comprehensive, automated document checks, eliminating the need for additional equipment or software. Regula Document Reader SDK can instantly recognise and validate IDs’ machine-readable zones (MRZs), RFID chips, barcodes, and invisible personal information (IPI), significantly reducing manual workload and minimising human error. Also, as it is backed up by Regula’s identity document template database (the most comprehensive in the world), this software is able to verify a wide range of IDs from 251 countries and territories, even the rarest ones. Adoption of Regula 4306 Regula experts conducted specialised training sessions for the Lao immigration officials To ensure seamless adoption of Regula 4306 at Wattay International Airport, Regula experts conducted specialised training sessions for the Lao immigration officials. This ensured that they had hands-on experience and were fully equipped to handle advanced document verification. “Integrating Regula’s devices into the Lao border management operations is a vital step toward combating serious crimes such as human trafficking and irregular migration. This technology enables detection of fraudulent documents with higher accuracy, eliminating human errors,” says Shareen Tuladhar, Chief of Mission, IOM in the Lao People’s Democratic Republic. Lao immigration authorities “Border crossings are the frontline of many serious crimes, making border security crucial to the country's overall safety. We are honoured to contribute to strengthening Lao border security." "By equipping the Lao immigration authorities with our top-selling video spectral comparator, the Regula 4306, we are providing them with advanced forensic tools to precisely detect even the most sophisticated document forgeries and stop criminals before they can cause harm,” comments Alex Lewanowicz, Director of Hardware Engineering at Regula.
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organising a fast incident response. Camera-based detection Gradually introduced since the nineties, camera-based detection is well established. Both visual and thermal imaging cameras have proven to be a fail-proof solution for 24/7 automatic incident detection inside tunnels. With the latest camera technology upgrade of the Damsgård Tunnel in Bergen, Norway is premiering AI-enhanced dual-vision cameras as a new evolution in incident detection. Damsgård Tunnel technology upgrade In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement The Damsgård Tunnel is part of Norwegian National Road 555, which runs from Fjell to the city center of Bergen. The road tunnel opened in 1992 and has two tubes of around 2.3 kilometers in length, each carrying two lanes of traffic through the Damsgårdsfjellet mountain.In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement of ventilation systems, lighting, drainage, and camera technology. AI-enhanced dual-vision cameras Unique to this project is that, for the first time in Norway, AI-enhanced dual-vision cameras will be used. The traffic cameras from sensor specialist FLIR combine thermal and visual imaging technology in a ruggedised housing and rely on advanced deep learning algorithms that enable the camera to detect stopped vehicles, wrong-way drivers, queues, crossing pedestrians, and even smoke and fires in their early stages. Approximately 80 FLIR cameras are scheduled for installation in the second half of the year. The history of tunnel incident detection in Norway The Damsgård tunnel upgrade is another milestone in Norway’s long-standing efforts to secure the country’s vast number of tunnels. Due to Norway’s complex landscape, with fjords, mountains, and islands, road tunnels have always been a way to solve the region’s unique transportation challenges. Norway has embraced the use of automatic incident detection in its road tunnels ever since the technology came into being, with FLIR setting the pace of this evolution since the beginning. In 1995, FLIR cameras were already used in the 1,500-meter-long Ekeberg Tunnel near Oslo. FLIR automatic incident detection system In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems In August 1996, when a bus stopped and caught fire in that tunnel, the FLIR automatic incident detection system generated an alert to the tunnel operators, enabling them to close the tunnel entries and exits and activate warnings to oncoming motorists. In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems in tunnels continent-wide and since then the technology evolution has not stopped. Visual and thermal incident detection Initially, visual CCTV cameras were used to detect incidents. The technology enabled first response teams to be deployed minutes, even seconds after an incident or an irregularity (a fallen object, a pedestrian, a car slowing down) was detected. About ten years ago, FLIR introduced thermal incident detection cameras in tunnels. These cameras are established as critical assets that guarantee operators' accurate detection throughout the tunnel infrastructure. 24/7 traffic detection The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight can obstruct the view of visible-light cameras and therefore disturb traffic detection. Because thermal cameras detect heat, not light, they have no issues with these phenomena. As a result, thermal cameras can detect traffic 24/7 and in all weather conditions. Fire detection FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest One of the biggest advantages of thermal cameras in the field of tunnel safety is that they can effectively see through smoke. This makes them the ideal technology for tunnel safety operators or emergency response teams to find their way through a smoke-filled tunnel or for incident detection systems to spot issues in time. FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest and most reliable technology for fire detection inside road tunnels. The role of dual-vision cameras Both visual and thermal cameras have their merits. A visual camera may provide operators with more detail to assess the nature of an incident, while thermal cameras have proven to be unbeatable in detecting incidents in complete darkness and challenging weather conditions. Currently, both detection technologies can be combined into one system, hereby offering operators a more comprehensive view of the environment and improved accuracy compared to single-sensor systems. FLIR’s TrafiBot Dual AI camera is an example of such a combined system. ITS-Series Dual AID cameras In 2018, FLIR’s ITS-Series Dual AID cameras were installed at the entrance and exit of the Lyderhorn Tunnel near Bergen. In 2021, technology integrator Trafsys also installed 332 of FLIR’s dual-vision cameras in the Hundvåg and Eiganes tunnels, which are part of the extensive Ryfast project. The cameras’ fire detection functionality proved effective when a car fire occurred in the Hundvåg tunnel in July 2020; the FLIR ITS dual thermal AID camera detected the fire within 7 seconds of visible flames, following an initial alert for a stopped vehicle and pedestrians. Artificial Intelligence in incident detection AI algorithms embedded in the FLIR camera analyse captured images in real-time and full-resolution FLIR’s TrafiBot Dual AI, installed in the above-mentioned Damsgård Tunnel announces a new wave of incident detection cameras. The camera also combines a visual and a thermal camera in one unit, but what makes it stand out is the use of artificial intelligence and deep learning. AI algorithms embedded in the FLIR camera analyse captured images in real-time and full resolution. This latest addition to FLIR’s portfolio of AI cameras is setting a new standard for automatic incident detection in tunnels, generating extremely accurate traffic data, incident detection information, and live track data. Video image analysation Of course, analytics on traffic cameras are not new. Early cameras from decades ago already used some form of AI. So, what’s the difference with this new generation of AI cameras? Much has to do with how detection systems analyse video images. Early generations of smart cameras analysed the variation of gray levels in groups of pixels in successive video frames. Smart predictions When a vehicle enters a detection zone, the pixel value within that zone changes, and detection is activated. AI systems, however, look at the entire camera image and use object detection techniques to analyse the traffic scene. This results in much better presence detection, better classification of traffic users, and the ability to determine position, speed, and direction. These new AI systems can handle more complex traffic situations and they are much better at making smart predictions. Identification and classification of objects Computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked It’s not hard to see where this is coming from. Over the past decades, computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked as fuel for making AI better and more efficient. Instead of rule-based analytics—if x happens, then y—data-based systems are now in the lead. These systems can be trained on large datasets of images and learn how to identify and classify objects in an image. They use this knowledge to make decisions based on new images that they have never seen before. Benefits of AI-based detection systems AI-powered detection systems are much more accurate than their non-AI alternatives. For tunnel operators, this is a big deal. Nothing is a bigger nuisance for control room operators than having to pay attention to continuous unwanted alarms. AI can help filter out unwanted alarms by distinguishing between routine activity, weather phenomena, and actual incidents. High performance As an important aspect of their accuracy, AI-based systems are much more successful in detecting different vehicle classes. Detectors from FLIR will easily distinguish between a car and a van, or between a small and a large truck. It’s even possible to train a system to detect specific objects or incidents. And because cameras are so smart, installers nowadays are more flexible in installing their equipment. Even in less ideal camera positions, the detection performance of AI-based systems is high. Vehicle parameters Based on vehicle parameters such as speed and direction, they can easily see where a car is going FLIR’s AI detectors can also predict vehicle trajectories. Based on vehicle parameters such as speed and direction, they can easily see where a car is going, even if for part of that trajectory the view of that car is occluded by a passing truck. This makes detection much faster and more accurate. Operators can even be warned by so-called pre-alarms for cars that are slowing down and likely to cause a collision. Reduces human monitoring For traffic or security operators, AI offers many benefits. Since incidents can be detected much faster and with more accuracy, operators will be able to make better-informed decisions, especially in high-stress situations, and they will be able to deploy emergency teams more quickly. AI will also reduce the need for constant human monitoring, allowing operators to focus on other tasks.AI will benefit traffic planners too. Data collected from a camera can be analysed over time to identify trends, patterns, or areas with a higher potential for incidents. This can be valuable for proactive traffic planning, infrastructure improvements, or for overall risk management. Data as the cornerstone of AI performance AI-based detection systems will become the norm very swiftly. Since these systems depend on massive data sets, it’s easy to understand that the detection performance will soon be determined by the quality of the data it is trained with. High-performance systems will need a lot of data for training—in case video images of traffic—but not just any data that has been plucked from the internet will do. Challenges with publicly available datasets The problem with that approach is that, more often than not, publicly available datasets are limited Some camera manufacturers rely on publicly available datasets to train their AI systems. The problem with that approach is that, more often than not, these datasets are limited or of low quality. For example, internet data sets hardly have any thermal images, traffic images are mostly collected during sunny weather or friendly daytime conditions, and they are often taken from useless angles. FLIR model and prediction AI-based products from FLIR, on the other hand, are trained on datasets that have been collected in-house, over more than 30 years, with data samples that are relevant for practically any traffic scene you can think of. What’s more, FLIR’s datasets are continuously growing and with it the quality of its models and predictions. For FLIR, data is the true quality mark which stands for high-performance, accurate traffic detection. The future is AI Norway and FLIR share an interesting history of evolving incident detection technology. A lot has changed since the installation of the first FLIR automatic incident detection system in the Ekeberg tunnel in 1995. Currently, incident detection systems combine multiple sensors—visual and thermal—and, most importantly, they use AI, which enables them to improve their detection performance over time with every new video image they process. Artificial intelligence has a promising future in incident detection. Norwegian tunnels, and the average daily traffic of 40,000 vehicles in the Damsgård Tunnel, will only benefit from it.
The City of Centennial, Colorado, operates a state-of-the-art Traffic Management Centre (TMC) to monitor regional traffic conditions. Serving a population of over 108,000, Centennial’s TMC ensures smooth traffic flow, supports city operations such as snow management, and engages the public with initiatives like Centennial 101, which provides residents with a behind-the-scenes look at city departments. In August 2023, Centennial installed RGB Spectrum’s Galileo® video wall processor to address its operational needs. The city sought a solution that would enable operators to monitor live feeds from 60 CCTV cameras, improve situational awareness, and facilitate content management for real-time operations and training purposes. The challenge The Momentum Group provided exceptional service and support throughout the project Centennial’s Traffic Management Centre required a reliable, flexible system capable of displaying numerous video streams simultaneously. Operators needed the ability to monitor critical intersections and road conditions in real-time. Beyond daily operations, the TMC needed a tool to support public presentations and internal reviews, offering intuitive control of the video wall through a desktop interface. Planning for the new operational centre began in 2021. After evaluating various options, Centennial chose to follow the example of neighbouring Douglas County, which had successfully implemented RGB Spectrum’s Galileo system in its TMC. This decision was influenced by positive feedback on Galileo’s reliability, flexibility, and performance. The city collaborated with the Momentum Group, a nationally recognised and award-winning manufacturer’s representative firm in the Rocky Mountain region. The Momentum Group provided exceptional service and support throughout the project. “We’ve been very happy with the system reliability and functionality. The Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform,” Libby Nordeen, Traffic Management Centre Operator, City of Centennial. Why RGB Spectrum RGB Spectrum’s Galileo video wall processor met Centennial’s needs on multiple fronts. It offered a seamless solution for monitoring multiple video streams in real-time and allowed operators to move content effortlessly between a desktop interface and the video wall. The city appreciated Galileo’s robust design, which ensures 24/7 reliability, and its scalability to accommodate future operational growth. Libby Nordeen, Traffic Management Centre Operator, described the decision: “We really liked that Douglas County uses Galileo and has been happy with it. It made sense for us to go with RGB Spectrum to align with our region and ensure seamless communication with other jurisdictions.” How the City of Centennial uses RGB Spectrum The Galileo processor also supports Centennial’s broader goals of public engagement and education At the heart of Centennial’s TMC is RGB Spectrum’s Galileo processor, which powers a Planar display that showcases live video feeds from 60 CCTV cameras. Operators, including Nordeen and her team, use the system daily to monitor traffic conditions and enhance citywide situational awareness. This capability has been especially beneficial during inclement weather, allowing snow crews to assess road conditions and prioritise their efforts using live video feeds. The Galileo processor also supports Centennial’s broader goals of public engagement and education. During events like Centennial 101, a program designed to familiarise residents with city operations, the TMC uses the video wall to demonstrate how the department monitors traffic and supports real-time operations. The ability to move content from the desktop to the video wall enables operators to create dynamic and engaging presentations for visitors and city officials alike. Looking ahead, Centennial plans to expand the TMC’s capabilities to include enhanced incident management and greater system-to-system communication with neighbouring jurisdictions such as Englewood, Greenwood Village, and Littleton, all of which use the same traffic signal platform. Results and benefits Since installing RGB Spectrum’s Galileo video wall processor, the City of Centennial has seen significant improvements in traffic monitoring operations. Operators now benefit from enhanced situational awareness and streamlined decision-making. Galileo’s seamless integration with desktop control has simplified workflows, enabling more efficient management of daily monitoring and presentations. Libby Nordeen highlighted the system’s impact: “We’ve been very happy with the system reliability and functionality. Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform.” The TMC’s enhanced operations provide a solid foundation for future growth. As Centennial expands its capabilities to include incident management and regional collaboration, the Galileo processor will continue to be a cornerstone of efficient traffic monitoring and control.
To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Deter, detect, and apprehend criminals Fenton is a small city with 12,000 permanent residents, but Chief of Police Jeffery Cross estimates that 60,000 people pass through the town daily. Located off Highway US-23, it is a popular shopping and restaurant district for commuters and people from neighbouring cities. Unfortunately, retail criminals also frequent the area. The new video surveillance system is designed to deter, detect, and apprehend retail criminals. Live security camera footage Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access The new system, housed in a rugged, weatherproof cabinet and mounted on a telephone pole with two cameras, includes Eagle Eye 911 Camera Sharing technology. Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access to view live security camera footage during an emergency. “With 911 Camera Sharing, the 911 operator can see the situation unfold and give law enforcement direct, quality information and immediate feedback about what happened and the direction the suspect is headed in,” Cross explained. “That enhances safety for first responders and our community.” Smart Video Search In addition, the security cameras have built-in AI-powered Eagle Eye Smart Video Search, which enables Fenton’s authorised law enforcement officials to quickly search security camera footage for vehicles, people, or objects of interest. “With Smart Video Search you can search for a ‘person wearing a red shirt and black pants’ a ‘blue Honda truck’ or ‘person with a backpack’ and quickly find a shoplifting suspect or determine when a certain vehicle, person, or group of people entered a shopping centre parking lot, which can be critical information for law enforcement,” said Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions. This Novi, Mich.-based security integrator is working on the project with the City of Fenton. AI-powered video surveillance “Fenton’s new system with 911 Camera Sharing and AI features such as Smart Video Search is like having a virtual patrol in the Fenton business district,” he added. “Last month the National Retail Federation reported a 93% increase in the average number of shoplifting incidents per year in 2023 versus 2019 and a 90% increase in dollar loss,” said Dean Drako, CEO of Eagle Eye Networks. “AI-powered video surveillance can now be deployed in more areas than ever, offering communities new ways to contend with rising retail crime.”
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
With the common goal of improving security and emergency response in the event of a critical incident, community members in Livingston County have deployed technology that turns their standard security cameras into a powerful resource for 911 Emergency Communications Centre telecommunicators (911 professionals). Response time “It’s all about response time: The key to saving lives, curtailing damage, and rapidly resolving an emergency of any kind–whether it’s a natural disaster, fire, mass shooting, or other criminal activity–is getting accurate information to first responders so they can take quick, decisive action,” said Mike Murphy, Livingston County Sheriff. While security cameras are ubiquitous at schools and businesses, 911 telecommunicators typically cannot access them in an emergency. Eagle Eye 911 Camera Sharing With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather information Eagle Eye 911 Camera Sharing changes that by giving telecommunicators instant access to live video from one or multiple security cameras when a 911-triggered emergency occurs, empowering them to quickly deliver critical incident information to first responders through a partnership with RapidSOS. Telecommunicators generally rely on verbal information from 911 callers. With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather an immense amount of information. Real-time situational awareness “Camera Sharing gives us a real-time view of the situation at hand as it’s unfolding,” said Kecia Williams, 911 Director, Livingston County 911 Central Dispatch. “Lots of times it takes a while to attain pertinent information from a 911 caller because they’re distraught or not clear. With Camera Sharing, we can instantly see for ourselves what’s going on, and we can get this information to the fire department, EMS, or law enforcement much quicker.” Camera Sharing technology This organisation works with local school districts to provide educational services Livingston County is the first county in Michigan to demo the new technology at the Livingston Educational Service Agency in Howell. This organisation works with local school districts to provide educational services and support to 26,000 students throughout the county. “I am impressed with the Camera Sharing technology and can see the potential for improving response times by first responders to critical events in our community,” said Michael Hubert, Superintendent of Livingston Educational Service Agency. Cybersecurity and privacy protection Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions, a security integrator based in Novi, Michigan, said, “Most businesses and schools already have security cameras that can easily be connected to Eagle Eye 911 Camera Sharing, which is a first-of-its-kind technology that has cybersecurity and privacy protections built in." "As a former law enforcement officer, I believe camera sharing can significantly improve the outcome of emergencies and improve safety and security for first responders.” Dean Drako, CEO of Eagle Eye Networks said, “Livingston County is a prime example of a growing trend we’re seeing in the U.S. where entire communities - schools, businesses, public safety officials, and community pioneers are working together to ensure they are prepared as possible for emergencies.”
The space-saving yet full-function video spectral comparator Regula 4306 has been deployed at Wattay International Airport in Vientiane, the Lao People’s Democratic Republic, to strengthen the country’s border security. This initiative aims to combat transnational crimes, including human trafficking, smuggling, and irregular migration. Forged identity documents Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents Like many countries, the Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents used by criminals and irregular migrants. Until recently, document verification at border checkpoints relied heavily on manual inspection, which was time-consuming, prone to errors, and less effective against increasingly sophisticated forgery techniques. Adopting a forensic solution In collaboration with International Organisation for Migration (IOM), the Lao immigration authorities began modernising their approach by adopting a forensic solution to strengthen document authentication and border security. In partnership with IOM in the Lao People’s Democratic Republic and the Australian Department of Home Affairs, the Lao immigration authorities deployed the Regula 4306 video spectral comparator at the country’s major airport in Vientiane. This step equipped border officials with advanced forensic tools for in-depth document authentication, and significantly automated the whole process. Array of features in the Regula 4306 With an array of features in the Regula 4306, ID proof at the Lao border earned much precision With a vast array of features in the Regula 4306, ID verification at the Lao border achieved much-needed high precision. For instance, the device’s high-resolution 8 MP camera with 60x optical zoom captures document images at up to 18,900 ppi and enables officials to analyse even the finest details, including printing techniques. Hyperspectral imaging module Additionally, with over 40 types of light sources and 18 light filters, the Regula 4306 allows authorities at the second line of border control to examine the most intricate document security features, such as holograms, watermarks, microprinting, and optically variable elements, ensuring a more reliable fraud detection process. Apart from that, 3D visualisation helps analyse a document’s surface relief and intersecting lines, and the hyperspectral imaging module enables forensic experts to detect document alterations, differentiate ink properties, or recover faded text. Regula Forensic Studio cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software. With RFS, an expert can perform a wide range of examinations, conduct precise measurements and comparisons, process images in various modes, and generate comprehensive examination reports without losing a single detail. Its powerful tools and intuitive interface ensure accuracy and reliability, enabling thorough and efficient forensic investigations. Regula’s identity document template database Integrated with Regula Document Reader SDK, RFS enables comprehensive, automated document checks, eliminating the need for additional equipment or software. Regula Document Reader SDK can instantly recognise and validate IDs’ machine-readable zones (MRZs), RFID chips, barcodes, and invisible personal information (IPI), significantly reducing manual workload and minimising human error. Also, as it is backed up by Regula’s identity document template database (the most comprehensive in the world), this software is able to verify a wide range of IDs from 251 countries and territories, even the rarest ones. Adoption of Regula 4306 Regula experts conducted specialised training sessions for the Lao immigration officials To ensure seamless adoption of Regula 4306 at Wattay International Airport, Regula experts conducted specialised training sessions for the Lao immigration officials. This ensured that they had hands-on experience and were fully equipped to handle advanced document verification. “Integrating Regula’s devices into the Lao border management operations is a vital step toward combating serious crimes such as human trafficking and irregular migration. This technology enables detection of fraudulent documents with higher accuracy, eliminating human errors,” says Shareen Tuladhar, Chief of Mission, IOM in the Lao People’s Democratic Republic. Lao immigration authorities “Border crossings are the frontline of many serious crimes, making border security crucial to the country's overall safety. We are honoured to contribute to strengthening Lao border security." "By equipping the Lao immigration authorities with our top-selling video spectral comparator, the Regula 4306, we are providing them with advanced forensic tools to precisely detect even the most sophisticated document forgeries and stop criminals before they can cause harm,” comments Alex Lewanowicz, Director of Hardware Engineering at Regula.
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organising a fast incident response. Camera-based detection Gradually introduced since the nineties, camera-based detection is well established. Both visual and thermal imaging cameras have proven to be a fail-proof solution for 24/7 automatic incident detection inside tunnels. With the latest camera technology upgrade of the Damsgård Tunnel in Bergen, Norway is premiering AI-enhanced dual-vision cameras as a new evolution in incident detection. Damsgård Tunnel technology upgrade In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement The Damsgård Tunnel is part of Norwegian National Road 555, which runs from Fjell to the city center of Bergen. The road tunnel opened in 1992 and has two tubes of around 2.3 kilometers in length, each carrying two lanes of traffic through the Damsgårdsfjellet mountain.In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement of ventilation systems, lighting, drainage, and camera technology. AI-enhanced dual-vision cameras Unique to this project is that, for the first time in Norway, AI-enhanced dual-vision cameras will be used. The traffic cameras from sensor specialist FLIR combine thermal and visual imaging technology in a ruggedised housing and rely on advanced deep learning algorithms that enable the camera to detect stopped vehicles, wrong-way drivers, queues, crossing pedestrians, and even smoke and fires in their early stages. Approximately 80 FLIR cameras are scheduled for installation in the second half of the year. The history of tunnel incident detection in Norway The Damsgård tunnel upgrade is another milestone in Norway’s long-standing efforts to secure the country’s vast number of tunnels. Due to Norway’s complex landscape, with fjords, mountains, and islands, road tunnels have always been a way to solve the region’s unique transportation challenges. Norway has embraced the use of automatic incident detection in its road tunnels ever since the technology came into being, with FLIR setting the pace of this evolution since the beginning. In 1995, FLIR cameras were already used in the 1,500-meter-long Ekeberg Tunnel near Oslo. FLIR automatic incident detection system In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems In August 1996, when a bus stopped and caught fire in that tunnel, the FLIR automatic incident detection system generated an alert to the tunnel operators, enabling them to close the tunnel entries and exits and activate warnings to oncoming motorists. In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems in tunnels continent-wide and since then the technology evolution has not stopped. Visual and thermal incident detection Initially, visual CCTV cameras were used to detect incidents. The technology enabled first response teams to be deployed minutes, even seconds after an incident or an irregularity (a fallen object, a pedestrian, a car slowing down) was detected. About ten years ago, FLIR introduced thermal incident detection cameras in tunnels. These cameras are established as critical assets that guarantee operators' accurate detection throughout the tunnel infrastructure. 24/7 traffic detection The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight can obstruct the view of visible-light cameras and therefore disturb traffic detection. Because thermal cameras detect heat, not light, they have no issues with these phenomena. As a result, thermal cameras can detect traffic 24/7 and in all weather conditions. Fire detection FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest One of the biggest advantages of thermal cameras in the field of tunnel safety is that they can effectively see through smoke. This makes them the ideal technology for tunnel safety operators or emergency response teams to find their way through a smoke-filled tunnel or for incident detection systems to spot issues in time. FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest and most reliable technology for fire detection inside road tunnels. The role of dual-vision cameras Both visual and thermal cameras have their merits. A visual camera may provide operators with more detail to assess the nature of an incident, while thermal cameras have proven to be unbeatable in detecting incidents in complete darkness and challenging weather conditions. Currently, both detection technologies can be combined into one system, hereby offering operators a more comprehensive view of the environment and improved accuracy compared to single-sensor systems. FLIR’s TrafiBot Dual AI camera is an example of such a combined system. ITS-Series Dual AID cameras In 2018, FLIR’s ITS-Series Dual AID cameras were installed at the entrance and exit of the Lyderhorn Tunnel near Bergen. In 2021, technology integrator Trafsys also installed 332 of FLIR’s dual-vision cameras in the Hundvåg and Eiganes tunnels, which are part of the extensive Ryfast project. The cameras’ fire detection functionality proved effective when a car fire occurred in the Hundvåg tunnel in July 2020; the FLIR ITS dual thermal AID camera detected the fire within 7 seconds of visible flames, following an initial alert for a stopped vehicle and pedestrians. Artificial Intelligence in incident detection AI algorithms embedded in the FLIR camera analyse captured images in real-time and full-resolution FLIR’s TrafiBot Dual AI, installed in the above-mentioned Damsgård Tunnel announces a new wave of incident detection cameras. The camera also combines a visual and a thermal camera in one unit, but what makes it stand out is the use of artificial intelligence and deep learning. AI algorithms embedded in the FLIR camera analyse captured images in real-time and full resolution. This latest addition to FLIR’s portfolio of AI cameras is setting a new standard for automatic incident detection in tunnels, generating extremely accurate traffic data, incident detection information, and live track data. Video image analysation Of course, analytics on traffic cameras are not new. Early cameras from decades ago already used some form of AI. So, what’s the difference with this new generation of AI cameras? Much has to do with how detection systems analyse video images. Early generations of smart cameras analysed the variation of gray levels in groups of pixels in successive video frames. Smart predictions When a vehicle enters a detection zone, the pixel value within that zone changes, and detection is activated. AI systems, however, look at the entire camera image and use object detection techniques to analyse the traffic scene. This results in much better presence detection, better classification of traffic users, and the ability to determine position, speed, and direction. These new AI systems can handle more complex traffic situations and they are much better at making smart predictions. Identification and classification of objects Computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked It’s not hard to see where this is coming from. Over the past decades, computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked as fuel for making AI better and more efficient. Instead of rule-based analytics—if x happens, then y—data-based systems are now in the lead. These systems can be trained on large datasets of images and learn how to identify and classify objects in an image. They use this knowledge to make decisions based on new images that they have never seen before. Benefits of AI-based detection systems AI-powered detection systems are much more accurate than their non-AI alternatives. For tunnel operators, this is a big deal. Nothing is a bigger nuisance for control room operators than having to pay attention to continuous unwanted alarms. AI can help filter out unwanted alarms by distinguishing between routine activity, weather phenomena, and actual incidents. High performance As an important aspect of their accuracy, AI-based systems are much more successful in detecting different vehicle classes. Detectors from FLIR will easily distinguish between a car and a van, or between a small and a large truck. It’s even possible to train a system to detect specific objects or incidents. And because cameras are so smart, installers nowadays are more flexible in installing their equipment. Even in less ideal camera positions, the detection performance of AI-based systems is high. Vehicle parameters Based on vehicle parameters such as speed and direction, they can easily see where a car is going FLIR’s AI detectors can also predict vehicle trajectories. Based on vehicle parameters such as speed and direction, they can easily see where a car is going, even if for part of that trajectory the view of that car is occluded by a passing truck. This makes detection much faster and more accurate. Operators can even be warned by so-called pre-alarms for cars that are slowing down and likely to cause a collision. Reduces human monitoring For traffic or security operators, AI offers many benefits. Since incidents can be detected much faster and with more accuracy, operators will be able to make better-informed decisions, especially in high-stress situations, and they will be able to deploy emergency teams more quickly. AI will also reduce the need for constant human monitoring, allowing operators to focus on other tasks.AI will benefit traffic planners too. Data collected from a camera can be analysed over time to identify trends, patterns, or areas with a higher potential for incidents. This can be valuable for proactive traffic planning, infrastructure improvements, or for overall risk management. Data as the cornerstone of AI performance AI-based detection systems will become the norm very swiftly. Since these systems depend on massive data sets, it’s easy to understand that the detection performance will soon be determined by the quality of the data it is trained with. High-performance systems will need a lot of data for training—in case video images of traffic—but not just any data that has been plucked from the internet will do. Challenges with publicly available datasets The problem with that approach is that, more often than not, publicly available datasets are limited Some camera manufacturers rely on publicly available datasets to train their AI systems. The problem with that approach is that, more often than not, these datasets are limited or of low quality. For example, internet data sets hardly have any thermal images, traffic images are mostly collected during sunny weather or friendly daytime conditions, and they are often taken from useless angles. FLIR model and prediction AI-based products from FLIR, on the other hand, are trained on datasets that have been collected in-house, over more than 30 years, with data samples that are relevant for practically any traffic scene you can think of. What’s more, FLIR’s datasets are continuously growing and with it the quality of its models and predictions. For FLIR, data is the true quality mark which stands for high-performance, accurate traffic detection. The future is AI Norway and FLIR share an interesting history of evolving incident detection technology. A lot has changed since the installation of the first FLIR automatic incident detection system in the Ekeberg tunnel in 1995. Currently, incident detection systems combine multiple sensors—visual and thermal—and, most importantly, they use AI, which enables them to improve their detection performance over time with every new video image they process. Artificial intelligence has a promising future in incident detection. Norwegian tunnels, and the average daily traffic of 40,000 vehicles in the Damsgård Tunnel, will only benefit from it.
The City of Centennial, Colorado, operates a state-of-the-art Traffic Management Centre (TMC) to monitor regional traffic conditions. Serving a population of over 108,000, Centennial’s TMC ensures smooth traffic flow, supports city operations such as snow management, and engages the public with initiatives like Centennial 101, which provides residents with a behind-the-scenes look at city departments. In August 2023, Centennial installed RGB Spectrum’s Galileo® video wall processor to address its operational needs. The city sought a solution that would enable operators to monitor live feeds from 60 CCTV cameras, improve situational awareness, and facilitate content management for real-time operations and training purposes. The challenge The Momentum Group provided exceptional service and support throughout the project Centennial’s Traffic Management Centre required a reliable, flexible system capable of displaying numerous video streams simultaneously. Operators needed the ability to monitor critical intersections and road conditions in real-time. Beyond daily operations, the TMC needed a tool to support public presentations and internal reviews, offering intuitive control of the video wall through a desktop interface. Planning for the new operational centre began in 2021. After evaluating various options, Centennial chose to follow the example of neighbouring Douglas County, which had successfully implemented RGB Spectrum’s Galileo system in its TMC. This decision was influenced by positive feedback on Galileo’s reliability, flexibility, and performance. The city collaborated with the Momentum Group, a nationally recognised and award-winning manufacturer’s representative firm in the Rocky Mountain region. The Momentum Group provided exceptional service and support throughout the project. “We’ve been very happy with the system reliability and functionality. The Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform,” Libby Nordeen, Traffic Management Centre Operator, City of Centennial. Why RGB Spectrum RGB Spectrum’s Galileo video wall processor met Centennial’s needs on multiple fronts. It offered a seamless solution for monitoring multiple video streams in real-time and allowed operators to move content effortlessly between a desktop interface and the video wall. The city appreciated Galileo’s robust design, which ensures 24/7 reliability, and its scalability to accommodate future operational growth. Libby Nordeen, Traffic Management Centre Operator, described the decision: “We really liked that Douglas County uses Galileo and has been happy with it. It made sense for us to go with RGB Spectrum to align with our region and ensure seamless communication with other jurisdictions.” How the City of Centennial uses RGB Spectrum The Galileo processor also supports Centennial’s broader goals of public engagement and education At the heart of Centennial’s TMC is RGB Spectrum’s Galileo processor, which powers a Planar display that showcases live video feeds from 60 CCTV cameras. Operators, including Nordeen and her team, use the system daily to monitor traffic conditions and enhance citywide situational awareness. This capability has been especially beneficial during inclement weather, allowing snow crews to assess road conditions and prioritise their efforts using live video feeds. The Galileo processor also supports Centennial’s broader goals of public engagement and education. During events like Centennial 101, a program designed to familiarise residents with city operations, the TMC uses the video wall to demonstrate how the department monitors traffic and supports real-time operations. The ability to move content from the desktop to the video wall enables operators to create dynamic and engaging presentations for visitors and city officials alike. Looking ahead, Centennial plans to expand the TMC’s capabilities to include enhanced incident management and greater system-to-system communication with neighbouring jurisdictions such as Englewood, Greenwood Village, and Littleton, all of which use the same traffic signal platform. Results and benefits Since installing RGB Spectrum’s Galileo video wall processor, the City of Centennial has seen significant improvements in traffic monitoring operations. Operators now benefit from enhanced situational awareness and streamlined decision-making. Galileo’s seamless integration with desktop control has simplified workflows, enabling more efficient management of daily monitoring and presentations. Libby Nordeen highlighted the system’s impact: “We’ve been very happy with the system reliability and functionality. Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform.” The TMC’s enhanced operations provide a solid foundation for future growth. As Centennial expands its capabilities to include incident management and regional collaboration, the Galileo processor will continue to be a cornerstone of efficient traffic monitoring and control.


Round table discussion
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department transfers. In fact, connecting HR and information technology (IT) systems to physical security can provide many significant benefits in terms of access control, incident response, compliance, cost savings, and employee experience. We asked this week’s Expert Panel Roundtable: How can organisations integrate physical security with other systems, such as IT and HR?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
Products



Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download