Institute security
Carousel Digital Signage announces a new technology partnership with CrisisGo that enables K-12 schools and businesses to deliver emergency alerts and other safety messages to digital displays with immediacy. The integration is enabled through an open API that triggers visual alerts, interactive maps and more to Carousel Cloud digital signage networks via the Common Alerting Protocol (CAP), a global standard that supports the digital exchange of emergency alerts and public warnings over multipl...
Award-winning global security manufacturer, Gallagher Security is gearing up to showcase the latest from its innovative technology suite at its annual Integrate 360 event in Durban next week. Bringing together Channel Partners, End Users, and consultants from across KwaZulu-Natal and wider South Africa, Gallagher’s Integrate 360 event offers attendees the chance to engage in knowledge sessions, presentations, live demonstrations, and valuable networking opportunities. Latest innovative s...
Security and threat intelligence technology company, Silobreaker announced its partnership with the Health Information Sharing and Analysis Centre (Health-ISAC) as a Community Services Partner. Health-ISAC is a global non-profit organisation dedicated to improving the security and resilience of the healthcare sector. It connects thousands of health security professionals worldwide to share real-time insights, alerts, and best practices. This enables healthcare organisations to better detect, mi...
Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced that the Commvault Cloud Platform can be easily deployed from major cloud marketplaces utilising CIS-hardened images. These CIS-hardened images are pre-configured with CIS-recommended settings and controls and are available on the following marketplaces: Amazon Web Services (AWS), Microsoft Azure, Google Cloud, and VMware. Commvault’s CIS-hardened images CIS-hardened images...
Xtract One Technologies announced its Xtract One Gateway (“Gateway”) has been selected to protect key hospital locations in Manitoba, including the province’s Health Sciences Centre and Crisis Response Centre locations operated by Shared Health. The system will redefine the security experience by balancing powerful threat detection with the seamless flow for individuals, enhancing safety standards, and optimising operational efficiency. Securing health facilities "Healthcare...
The British Retail Consortium (BRC) published its annual Retail Crime Survey last week. It found that each day, retailers in the UK are victim to 55,000 thefts, while violent incidents have rocketed from 1,300 per day to over 2,000. The figures from the report are shocking enough when viewed in isolation; however, reviewing the same report, published in 2015 and 2020, forces the difficult question -- what progress has been made, and when will we turn the corner? Cost of crime In 2015, the BRC...
News
Advanced Data Risk Management (ADRM), a provider of data-driven risk management solutions, proudly announces the launch of the innovative DEFENDER Managed Services Platform. The patented DEFENDER platform is currently in use across ADRM’s managed services client sites, improving, overseeing, and maintaining the reliability of their security systems. DEFENDER platform As a managed services provider, ADRM is entrusted with the critical task of managing and optimizing the IT infrastructure, software systems, and edge devices for a variety of clients on a global scale. The DEFENDER platform excels in the managed services sector by ensuring the seamless operation of integrated electronic security systems, including video management, access control, intrusion detection, key control, and visitor management systems. Proactive management This platform provides a comprehensive view of the security environment’s performance and health DEFENDER marks a significant advancement in the managed services space. This platform provides a comprehensive view of the security environment’s performance and health, delivering real-time events, metrics, and alerts. This functionality allows for proactive management of system components, predicts issues, mitigates risk, and significantly enhances the robustness and resiliency of networks and systems. Streamlined access The platform also manages abstract components, such as system licenses, support agreements, software packages, inventory, maintenance tasks, projects, proposals, meeting notes, and support tickets, facilitating streamlined access to pivotal information for both the ADRM Team and clients. DEFENDER also tracks installation projects and scores vendor, software, and product performance worldwide! Valuable insights Dan O’Neill, President and CEO of ADRM, stated, “DEFENDER is a significant differentiator for ADRM in the managed services space." "This powerful platform provides valuable insights into the health of our client’s environment and equips users to take proactive measures to ensure all systems and components are optimized." Matt Isgur He is supported by ADRM’s diverse team who are experts in IT, systems engineering, security operations DEFENDER’s chief architect is Matt Isgur, who was responsible for Massachusetts Institute of Technology’s electronic security systems for 15 years. He is supported by ADRM’s diverse team who are experts in IT, systems engineering, security operations, emergency management, system integration and managed services. An essential hub Matt Isgur, ADRM CTO, reflecting on his past role as an end-user, notes, "Managing data from various sources can be a significant challenge." "It is essential to transform complexity into clear, actionable insights, and this is where DEFENDER excels, by utilizing proprietary algorithms to spot trends and address system health proactively. DEFENDER is more than a monitoring tool; it is an essential hub for all components of a security infrastructure." Peak performance In an era where system integrity is of utmost importance, the DEFENDER Managed Services Platform by ADRM emerges as a forward-thinking solution, ensuring the resilience and protection of essential systems across vast global networks. It offers a unified perspective on system health, alerts, and monthly reports, ensuring the peak performance of clients’ security systems.
ASIS International and the Security Industry Association (SIA) the pioneering membership association for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Centre in Detroit, Michigan. Security LeadHER sessions 2025 Security LeadHER is seeking engaging, informative and motivational speakers and sessions for conference Born of a need to effect change and create a more enriching and inclusive security community, Security LeadHER offers impactful keynotes, lively networking, small group breakouts and many opportunities to help Security LeadHERs develop their skills, connect and collaborate. Security LeadHER is seeking engaging, informative and motivational speakers and sessions for the 2025 conference. Session proposals are wanted on topics such as: Strategies for career growth and advancement Crafting the personal leadership style Harnessing artificial intelligence for strategic advantage Overcoming mindset blocks to achieve success Navigating work-life balance to prevent burnout Embracing digital transformation for women in tech Managing teams and mentoring next-generation pioneers Cultivating male allyship and the future of diversity, equity and inclusion Advancing the security landscape "Mark your calendars and lend your voice! Security LeadHER 2025 is calling for speakers who inspire, empower and innovate,” said Alice DiSanto, chair of the SIA Women in Security Forum community. “After an incredible attendance growth last year, this year promises to be our most impactful yet. Join an exceptional gathering of women and men shaping the security industry’s future – pioneers, change-makers and visionaries. From front-line responders to business owners and everyone in between, this is your chance to contribute to a dynamic conversation, share your expertise and connect with a diverse network dedicated to advancing the security landscape. Don’t miss the opportunity to make your mark – register to attend and submit a speaker proposal today!" Future of security "Security LeadHER is more than just a conference – it's a movement that empowers, inspires, and connects women across the security industry." "It’s about building a community where we support each other, share our experiences, and champion the next generation of pioneers,” said Mary Gamble, Esq., MBA, CPP, ASIS Women in Security Community chair. “Together, we’re shaping the future of security with confidence and collaboration." Speaking proposals are due Friday, Jan. 31; learn more and share the idea. Key leadership issues and topics Security LeadHER has been designed to be an open, friendly and welcoming environment Security LeadHER welcomes individuals of all backgrounds and genders. If they support the mission of advancing women in the global security industry, then this event is for them! Security LeadHER has been designed to be an open, friendly and welcoming environment, and attendees will have access to top-quality educational programming on key leadership issues and topics, impactful presentations from industry-pioneering experts and numerous opportunities for participants to connect, collaborate and experience lively social events and networking opportunities. Security LeadHER 2025 Registration is now open for the 2025 Security LeadHER conference, and ASIS and SIA members save $200 on registration. Attendees can also access a discounted rate at the conference hotel, the Detroit Marriott Renaissance Centre. Space for this one-of-a-kind event is limited and was sold out in 2023 and 2024. To learn more about Security LeadHER 2025, sign up for event updates, learn how the organisation can support the conference and save the seat.
Salto is proud and excited to unveil a new advance in access control technology: Salto Orion. Requiring only the user’s face as an access credential, Orion bridges access control and face recognition technology. With Orion, Salto is putting the user experience front and centre for a faster, safer, more convenient, and private keyless door access experience. Face credential Each user gains access effortlessly through a genuinely unique access credential – their face – eliminating the need for physical keys or keycards. This innovative technology both streamlines the access process and enhances security by removing the risk of lost or stolen credentials entirely. In addition, Salto Orion provides fast, frictionless door unlocking. The user simply walks up to the access point, looks at the Orion-C terminal, and the door unlocks. Simple to use and install Orion delivers rapid response times and high levels of security, with uncompromised brand trust and confidence Salto Orion is a complete access control solution. Combining its range of innovative algorithms, hardware, and software solutions, Orion delivers rapid response times and high levels of security, with uncompromised brand trust and confidence. Groundbreaking tech, maximum security, modern appearance - Salto Orion is more than a security device. Simple to use and install, and leveraging Salto Space's pioneering SVN access control solution, Orion is the cutting edge of convenient, streamlined, and secure access. Quick and easy onboarding Orion provides an intuitive face-recognition enrollment service, making onboarding users quick and easy – without the need to download an app. Furthermore, onboarding can be done from anywhere, on any device. Users do not need to come to a central point to register their faces. Instead, Orion guides them through an easy mobile self-enrollment process, ensuring a frictionless onboarding experience. Contactless terminal Salto Orion offers a level of control that empowers businesses to enhance safety The Orion-C face recognition terminal is minimalist in design. This ensures ease of installation and integration and allows the device to fit into any property discreetly. Small yet powerful, Salto Orion grants or denies access in under a second, using a clear red or green LED light to display the status. It is also completely contactless, and no special positioning of the user’s face is necessary. From corporate offices to healthcare facilities and educational establishments, Salto Orion offers a level of control that empowers businesses to enhance safety while optimising user experience. Orion, the next evolution of access control Salto Orion represents a new kind of smart access experience for organisations of any size. Secure, connected, contactless, and simple to install, configure, and operate, it leverages Salto’s advanced face recognition technology for improved access control across all doors. With this innovation, Salto is redefining how people access spaces. Salto Orion is the best-in-class solution that prioritises convenience, privacy, security, and seamless user experiences.
Skills for Security is attending the National Apprenticeship Show – London & South East, a key event connecting young people, school leavers, and college graduates with apprenticeship opportunities across various sectors. Role of apprenticeships The show will take place during National Apprenticeship Week 2025 and provides a unique opportunity to highlight the transformative role apprenticeships play in equipping young adults with the skills needed for successful careers. By participating, Skills for Security aims to shine a spotlight on the fire and security industry, a sector that is integral to public safety yet often underrepresented in career conversations. Building a skilled and diverse workforce Says David Scott, Managing Director of Skills for Security, “We are looking forward to the National Apprenticeship Show. This event is a fantastic opportunity to showcase the many rewarding careers available in the fire and security sector while connecting with young people eager to take their first steps into the industry." "Our goal is to inspire the next generation of talent and highlight the vital role apprenticeships play in building a skilled and diverse workforce for the future.” Live apprenticeship vacancies Individuals can explore immediate opportunities to join a dynamic and growing industry The National Apprenticeship Show allows Skills for Security to engage directly with potential apprentices, their families, and educators. Attendees will learn about the breadth of career paths available, ranging from hands-on installation roles to technical support and management positions. With live apprenticeship vacancies being advertised, individuals can explore immediate opportunities to join a dynamic and growing industry. Skills for Security will provide in-depth information on the latest industry developments and technologies. Smart security, AI and ML From advancements in smart security systems and the use of AI and machine learning to innovations in fire prevention, visitors will gain insights into how the industry continues to evolve and the exciting career potential it offers. David concludes, “We are looking forward to having the conversations and supporting young people to discover apprenticeship opportunities in fire and security." National Apprenticeship Show "We hope it will encourage them to see how they can build meaningful and successful careers in this essential sector.” Skills for Security is attending the National Apprenticeship Show in Surrey, taking place Tuesday 11 – Wednesday 12 February 2025.
VITEC, a pioneer in the Intelligence, Surveillance and Reconnaissance (ISR) technology community, will showcase its enhanced streaming technologies at IDEX 2025, ADNEC Centre Abu Dhabi, 17-21 February 2025. In the UAE Pavilion at 01-B03, VITEC will spotlight its advanced and versatile ruggedised TOUGH encoder family dedicated to video acquisition in harsh environments, as well as the new MGW Diamond-H, a 4K & Dual-Channel SD/HD HDMI Encoder. EZ TV ISR – VITEC’s video content management solution designed for rapid deployment in the field – will also be demonstrated. ISR video streaming solutions “VITEC is committed to delivering reliable, high-performance ISR video streaming solutions tailored for the most challenging military environments,” says Fadi Jumaa, Business Development Director - ME at VITEC. “Our encoders endure harsh environments while providing exceptional video quality at low bitrates, essential for bandwidth-constrained missions. This ensures that mission-critical information is securely and reliably transmitted, enabling informed decision-making and rapid response." MGW Diamond-H’s screen-sharing capabilities MGW Diamond-H’s screen-sharing abilities enable seamless union and coordination among fellows On show at IDEX for the first time, the MGW Diamond-H streams Intelligence, Surveillance, and Reconnaissance (ISR) video feeds over RF or satellite links providing real-time situational awareness and enhancing tactical decision-making. MGW Diamond-H’s screen-sharing capabilities enable seamless collaboration and coordination among team members, able to share mission-critical information in real-time. Power over Ethernet (PoE) functionality With stream protection technologies, including Zixi™, SRT, RIST, and Pro-MPEG, it ensures secure and reliable transmission of critical data, maintaining operational integrity. Additionally, Power over Ethernet (PoE) functionality simplifies deployment by delivering both power and data over a single Ethernet cable, reducing the need for additional power sources and making it ideal for rapid, flexible installations in dynamic field environments. Overlay capabilities for camera identification The encoder ensures optimal video quality at low bitrates, offers overlay abilities for timestamping Also showcased on the VITEC stand will be the MGW Pico+ TOUGH, a compact and power-efficient video encoder for unmanned and manned vehicles across land, sea, or air. It features an ultra-small, airborne and marine-certified enclosure, designed to operate in all environmental conditions. The encoder ensures optimal video quality at low bitrates, offers overlay capabilities for timestamping and camera identification, and can dynamically adjust its bitrate to match available bandwidth. Weighing less than 400g, it is the smallest and most power-efficient HEVC and H.264 HD/SD video encoder on the market. Integrated tactical IPTV system Another member of the TOUGH family is the MGW Diamond TOUGH, a quad-channel HEVC and H.264 HD/SD encoder. It provides multi-channel low latency streaming with High Dynamic Range (HDR) for exceptional video contrast and brightness. The HEVC (H.265) compression reduces network bandwidth usage by up to 50% compared to H.264 standards. Rounding out VITEC’s offering is the EZ TV ISR, a fully integrated tactical IPTV system. It allows users to process, archive, index, manage, and share tactical video and metadata content. Its secure and reliable architecture meets information assurance and cyber-security requirements, enabling rapid exploitation and processing of live and recorded video assets. EZ TV ISR can be quickly deployed in the field or at a secure site to serve as the central interface for managing live and tactical video feeds.
Experia Events has announced a stellar line-up of exhibitors for the inaugural Business Aviation Asia Forum and Expo (BAAFEx) taking place 4-6 March 2025 at Singapore’s Changi Exhibition Centre. Aircraft maker Boeing Business Jets intend to have aircraft on static display, while aircraft operators VistaJet and Amber Aviation have confirmed to have aircraft on static display. VistaJet will have its flagship Bombardier Global 7500 on static display, while Amber Aviation will display a Gulfstream G450. First three quarters of 2024 Vista saw total number of flights increase by 20% year-on-year in the first three quarters of 2024 The business aviation market in Asia Pacific continues to soar, driven by increasing travel demand and investment in the region. There were around 1,200 business jets based in Asia Pacific, as of the end of 2023; solidifying the region as the world’s third-largest market behind North America and Europe. Vista, a pioneering global business aviation group and parent company of VistaJet, saw total number of flights increase by 20% year-on-year in the first three quarters of 2024. Southeast Asia has been a particular hotspot for growth, with its business jet fleet expanding by approximately 5% per annum in recent years. Business aviation ecosystem “The response from the major aircraft manufacturers, aircraft management and aircraft operators to BAAFEx 2025 has been very positive. The consensus is that Asia Pacific, being the third largest market for business jets, warrants having its own show dedicated to business aviation,” says Leck Chet Lam, Managing Director of Experia Events. “Besides the major aircraft manufacturers, aircraft, management companies and operators, we have worked to sign up companies representing the entire business aviation ecosystem,” adds Leck. Other companies signed up for a show Other companies that have signed on for the show include: maintenance, repair and overhaul (MRO) company Lufthansa Technik; aircraft management and maintenance company Gama Aviation; aircraft management, charter, maintenance, training and fixed-based operator TAG Aviation aircraft regulatory body, Bermuda Aircraft Registry; pioneering manufacturer of interconnect solutions Glenair; satellite services provider Viasat; integrated travel risk management company MedAire and many more. These companies’ presence shows their commitment to Asia Pacific’s business aviation sector and their willingness to cater to this fast-growing region. Advantages of reliable business jets Joe Benson, President of Boeing Business Jets, expressed enthusiasm for the event, saying, “Whether it’s connecting with someone interested in purchasing their first Boeing Business Jet or a long-time customer, building and strengthening our relationships is at the core of our business." "With the continued growth across Asia, we look forward to engaging with our customers and showcasing the advantages of operating the largest, most capable and reliable business jets in the world.” Key role in Vista’s expansion Ian Moore, Chief Commercial Officer at Vista, says: "We have been waiting for half a decade to finally have a dedicated business aviation show back in Asia. Asia Pacific is one of the fastest growing regions at Vista, and Southeast Asia is playing a key role in Vista’s expansion in the region." "With a global fleet of aircraft from short range, all the way to the ultra-long-haul Global 7500, Vista not only connects clients within Asia Pacific, but also across all continents, covering 96% of the world for point-to-point travel. With the increasing demand we have been seeing coming out from Asia Pacific, we are excited BAAFEx will provide us with the best platform to showcase our product and services, and give us the opportunity to host our global clientele and business partners." Future of business aviation BAAFEx aims to manage the growing need for a loyal platform that unites stakeholders With participation from across the industry spectrum, BAAFEx 2025 is poised to be the ultimate gathering for stakeholders, shaping the future of business aviation. BAAFEx aims to address the growing demand for a dedicated platform that unites stakeholders, fosters collaboration and drives growth in this dynamic sector. With its robust lineup of exhibitors and participants, BAAFEx 2025 is poised to be a transformative event, bringing together key stakeholders to explore the latest innovations, forge partnerships and address the sector's challenges and opportunities. Latest innovations and services from BAAFEx BAAFEx will offer a dynamic programme that includes: Exhibition: The exhibition will feature the latest innovations, and services from pioneering companies in the aviation sector, offering a comprehensive view of the industry’s future. Expert Panels and Keynote Speakers: BAAFEx will have a conference where industry luminaries will share their insights on the latest trends, challenges and opportunities in business aviation. Aircraft Displays: Attendees will have the opportunity to explore a stunning array of state-of-the-art business jets from pioneering manufacturers. These aircraft represent the pinnacle of engineering, comfort and performance. Networking Opportunities: The show will offer unparalleled networking opportunities to foster collaboration and partnerships.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Access control solutions will continue their evolution in 2025 as organisations assess and adapt to dynamic and increasingly dangerous threats. Trends to watch include the growing adoption of mobile access credentials and digital IDs, and the integration of digital and physical security and other technologies. Other ongoing trends include the integration of AI into access control solutions and the increasing adoption of contactless biometrics for enhanced convenience. New access control innovations As these trends gather momentum, they highlight the pivotal role access control systems play in combining security and convenience, every hour of every day. Organisations must strike the ideal balance between a secure environment and satisfying user experience if they are to meet increasingly vocal demands for both. Achieving this balance not only delivers the expected user experience but also delivers multi-layered threat protection while introducing exciting new access control innovations. Digital technologies and open standards Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities Modern access control solutions deliver a faster pace of innovation and dramatically improved capabilities as compared to what was possible in the past. The primary objective is no longer simply to secure places and assets so they are beyond the reach of the wrong people. Now it also must be as easy as possible for authorised individuals to enter a building or access digital assets. Mobile access credentials and digital IDs are increasingly a preferred solution for achieving this seamless and convenient access experience. Technology convergence is happening at a rapid pace and this convergence makes it possible to integrate digital and physical security with real-time location systems and other technologies. Together, these converged technologies provide multi-layered protection against both cyber and physical threats while also enabling valuable new capabilities. 2024 State of Physical Access Control Report As AI is increasingly incorporated into access-control solutions, we will see even more powerful ways to leverage access control data for analytics use cases. Almost 40% of respondents to our 2024 State of Physical Access Control Report said they were looking to do this. Equally consequential is the rise of fast, frictionless and easy contactless biometrics solutions in a wide range of applications including healthcare, where 32% of respondents to our recent 2024 State of Healthcare Security Report said their facilities have already implemented this technology for authentication. Looking at the broader marketplace, nearly one in four (23%) respondents to our 2024 State of Physical Access Control Report cited biometrics when asked to “name the top three trends shaping the wider access control industry in the near future.” Evolution of access control solutions As access control solutions become increasingly central to secure and convenient daily life, these and other trends will have an ongoing impact on all market sectors from healthcare and banking to the corporate real estate enterprise and business and college campuses. At the same time, those responsible for a facility’s digital and physical assets know that these trends – and security in general – will never be a static proposition. The only constant is change. Threats will never stop evolving, and those tasked with protecting organisations against these threats must never stand still. The evolution of access control solutions that we saw during 2024 will continue through 2025 and beyond, and organisations will need to remain thorough and vigilant as they address today’s ever-expanding attack surfaces and ever-evolving attack schemes.
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Security beat
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
Case studies
Tenerife Norte-Ciudad de La Laguna Airport has significantly improved its safety by installing state-of-the-art video technology from German manufacturer Dallmeier. The Panomera® multifocal sensor cameras are used for comprehensive monitoring of the movement area. A major hub for domestic flights Tenerife Norte-Ciudad de La Laguna Airport (TFN) is located about 10 kilometres west of the capital, Santa Cruz de Tenerife, in the municipality of San Cristóbal de La Laguna. It mainly handles domestic flights: connecting flights to the other Canary Islands, such as Gran Canaria or Lanzarote, as well as scheduled flights to the Spanish mainland. The main destination is Madrid-Barajas, with over one million passengers, followed by Barcelona, Seville, and Bilbao. Tender for detection, supervision, and recording The tender documents specified the installation of a monitoring and control system to detect To further increase safety at Tenerife Norte-Ciudad de La Laguna Airport and to improve airport operations, the entire movement area was to be covered. The tender documents specified the installation of a monitoring and control system to detect, supervise, and record operations in that area in high resolution. Installation sites as critical points The total area to be monitored is huge, with the runway (with the focus at both ends), apron, taxiways, and service roads adjacent to the apron. The main challenge was that it was not possible to place camera masts randomly on the movement area, so existing buildings had to be used as installation points. Simplified maintenance “We wanted to minimise the number of installation points and camera systems to avoid the need for additional infrastructure such as masts, cabling, communication interfaces, etc., and to simplify subsequent maintenance processes,” says Carlos Jesús Delgado Gómez, Head of the Director’s Office at TFN. “And, of course, airports have strict regulations for any type of installation, especially in the movement area. That’s why there were very limited options when it came to selecting installation points. Nevertheless, the desired area had to be monitored at the highest resolution and the recording always had to be at maximum resolution.” High-resolution coverage High-resolution coverage of large areas under these conditions could not be satisfactorily achieved High-resolution coverage of large areas under these conditions – a minimum number of installation points and camera systems – could not be satisfactorily achieved with conventional single-sensor cameras. Tenerife Norte-Ciudad de La Laguna Airport therefore decided to use Dallmeier’s patented Panomera® multifocal sensor technology. Maximum resolution at long distances By combining multiple lenses and sensors with different focal lengths in a single optical unit, multifocal sensor technology offers high resolution across the entire object space. This means that even distant objects can be captured clearly, and significantly fewer systems are required overall than with conventional single-sensor cameras. “We were able to install the Panomera® on existing building facades and roofs without any problems”, says Carlos Jesús Delgado Gómez. “No other camera system was able to cover such a large area with so few cameras and installation points at such a high resolution.” Increasing operational safety and optimising processes The installed video technology not only increases operational safety but also allows processes to be optimised and disputes to be resolved quickly and clearly. One of the areas monitored is the aprons, where aircraft park and are prepared for the next flight. Since every minute spent parking is money for the airport company, there are always disputes about who is responsible for delays and the resulting additional parking fees. Was the fuel truck there on time? Did the catering arrive on time? Damage management can now be carried out quickly and objectively thanks to clear video recordings. For example, did the damage occur while the aircraft was parked or docked, or was it already there? The advantage of multi-user capability Any number of operators can access the image at the same time, each zooming in on the area of interest In addition to its ability to cover large areas, multifocal sensor technology is characterised by its multi-user capability. Panomera® works like a virtual combination of any number of PTZ cameras with the key advantage that the operator moves virtually in the image, rather than moving the camera mechanically as with PTZ cameras. As a result, any number of operators can access the image at the same time, each zooming in on the area of interest. Unlike conventional PTZ cameras, the entire image is always recorded. Bandwidth savings thanks to multicast capability As several users always need to access the live stream at the same time, the so-called multicast capability was also a decisive advantage of the Panomera®. Multicast capability allows data from a single source to be sent to multiple recipients simultaneously. This means that the video stream can be efficiently distributed to multiple devices or users without having to send the data multiple times. Multicast reduces network load and makes more efficient use of bandwidth. 3D simulation of the project, “CamCards” The entire project was precisely planned by Dallmeier with the help of a 3D simulation and pre-configured and tested in the company‘s own FAT Centre according to the customer‘s specifications. So-called CamCards, created by the Dallmeier 3D team, made the installation easier for the installer on site, as they show exactly where and at what angle the individual Panomera® cameras are to be mounted. Mountera® mounting system The Mountera® mounting system also proved its worth in practice, as Miguel Ángel Rodríguez Domínguez The Mountera® mounting system also proved its worth in practice, as Miguel Ángel Rodríguez Domínguez, project manager at installer Cobra Instalaciones y Servicios, Delegación Canarias, confirms, “The biggest challenge for us as installers was the high humidity and salt content due to the island location." "We therefore had to have bespoke, rust-proof, and robust masts and brackets made for the cameras. The actual installation of the Panomera® cameras with the Mountera® wall bracket and mast adapter was very easy.” Satisfied with the solution The video system has lived up to expectations and Tenerife North Airport is happy with its choice. Both the installer and the end customer are also satisfied with the support provided during the project. “We are very grateful for the support and solution-oriented assistance from Dallmeier Spain throughout the entire process, but especially during the implementation,” says Carlos Jesús Delgado Gómez. With the Dallmeier solution, consisting of a camera, recorder, and video management system, Tenerife Norte-Ciudad de La Laguna Airport is also well equipped for the future: The system is modular and can therefore be easily expanded or adapted to new challenges at any time.
Genetec Inc., the global pioneer in enterprise physical security software, announced The City of Edinburgh Council is using Genetec™ Security Centre as the backbone of its Smart City Strategy. The software is transforming public safety, city services and urban planning by allowing the council to manage all smart city technologies from a single interface. New applications and technologies The council’s Smart City Strategy focuses on introducing innovative technologies to manage aids The council’s Smart City Strategy focuses on introducing innovative technologies to manage resources more efficiently and improve public services. A key barrier to this vision was the city's outdated public space security system, which lacked the ability to integrate new applications and technologies. With funding from the European Regional Development Fund (ERDF) and in partnership with North, Edinburgh has launched a state-of-the-art Smart City Operations Centre built on Genetec Security Centre, a unified platform that combines video surveillance, analytics and IoT sensors, through one platform. Open hybrid-cloud architecture “All truly connected Smart Cities start with unified security as success depends on centralising your operations under one platform. Otherwise, every new IoT device deployed will make you data-rich but information poor,” comments Ben Durrant, Account Executive, Genetec Inc. "Our platform differs from conventional alternatives because of its open hybrid-cloud architecture that offers the flexibility and functionality needed to evolve and keep pace with new requirements.” Capabilities beyond physical security The system not only supports day-to-day functions and the control of large-scale events With a unified platform in place, Edinburgh has been able to expand CCTV coverage in public spaces and enable secure data sharing with partners like Police Scotland, the Fire Service, and Transport for Edinburgh. The system not only supports day-to-day operations and the management of large-scale events such as the Edinburgh Fringe, the Royal Military Tattoo, and the Hogmanay celebrations, but it also extends its capabilities beyond physical security. Security Centre ecosystem Andrew Foster, MD, Public Services at North comments: "The Security Centre ecosystem allows us to gather and visualise useful data sets from advanced analytics IoT sensors on how the city is actually being used by residents and visitors." "This enables the council to make more informed decision making on how Edinburgh can become even safer, greener and better maintained." Improved quality of footage The council credits the software with saving hundreds of man hours that were yet spent manually The council credits the software with saving hundreds of man hours that were previously spent manually trawling through surveillance footage. As well as with helping it to more than double the number of viewing requests from Police Scotland that it can positively respond to. The improved quality of footage submitted as evidence is also expected to increase the number of early guilty pleas, reducing the time police officers must spend attending court to give evidence. Smart City strategy “The benefits for Edinburgh residents are massive. Enhanced public safety, improved services, optimised traffic flow, better infrastructure and city planning,” concludes Gavin Brown, Head of Network Management & Enforcement, Edinburgh City Council. “Genetec and North have proved instrumental in helping deliver our Smart City strategy.”
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programmes and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organisations like Allied Universal allows us to build on shared expertise and advance this important mission.”
Video wall systems installed by Ultimate Visual Solutions (UVS) at a major transport and security hub in the Midlands are approaching 50,000 hours of continuous 24/7 operation. UVS supplied and installed all equipment via its systems integrator partner TIS, which specialises in driving digital transformation and integration across the life safety, security and communications industry. Driving digital transformation The Transport for West Midlands Regional Transport Coordination Centre (RTCC) in Birmingham uses live data feeds and CCTV to monitor the transport network. It helps manage disruptions and is a hub for Transport for West Midlands, transport operators, emergency services and local authorities and played a key role in monitoring traffic and keeping people safe during the 2022 Commonwealth Games in Birmingham. Additional data sources In 2019, UVS installed 6x3 and 4x2 screen LCD video walls in the RTCC In 2019, UVS installed 6x3 and 4x2 screen LCD video walls in the RTCC. Both were supplied with a UVS Lucidity WBC video wall controller to allow the display of multiple IP CCTV feeds from around the region, in addition to multiple workstation inputs and web pages as additional data sources. UVS included a 65-inch interactive touch table integrated to RTCC sources and to the Lucidity video wall solutions, allowing data from the touch table to be displayed on the video wall. It also allows people to collaborate around the table and share data from various sources, in addition to controlling the video wall whilst there. Disaster recovery site UVS also included a desk mounted touch screen controller that allows fast launching of preset video wall layouts when needed for specific urgent incidents. In 2022 UVS added a third 4x2 video wall at the RTCC site, fed from one of the existing Lucidity controllers, which was expanded to deal with the additional outputs and inputs. Control of this remote video wall was provided via a Lucidity controller connected back to the RTCC At the same time, an identical 4x2 video wall was installed at a disaster recovery site approximately 15 miles from the RTCC site. This remote video wall is connected to the same outputs as the one at the RTCC, via HDMI-IP encoders. Control of this remote video wall was provided via a Lucidity controller connected back to the RTCC. Annual support contracts UVS Managing Director Steve Murphy said: “We are fortunate to have a great relationship with TIS which has enabled us to work together and with the client to provide a solution which has met their exact requirements and which is now on the verge of reaching 50,000 hours of continuous use in an environment where reliable 24/7 operation is vital.” “From the outset of the initial planning stages for the project, the client, TIS and UVS were also committed to system lifetime support. This consisted of annual support contracts for all technology by the TIS support team, with UVS providing a support contract for the complete video wall systems and accessories.” Complete video wall systems “This has ensured maximum operational uptime and efficiency and reassurance that all firmware and software updates and upgrades are provided on a regular basis, with priority support provided for any reported issues.” UVS, based in the Burnley First – Burnley Business Centre, is led by four senior colleagues who, between them, have more than 90 years’ combined Audio Visual, Control Room and Visual Solutions experience.
Axis Communications, the industry pioneer in video surveillance and network devices, announced the implementation of a custom surveillance solution developed in collaboration with the MetLife Stadium security team. This new, tailored solution will help the venue augment its security capabilities, providing high-quality video at unprecedented distances and allowing the security team to identify details from anywhere in the venue. Advanced video analytics solutions “As one of the world's largest stadiums, the safety of fans is our number one priority,” said Danny DeLorenzi, VP of Security and Safety Services, MetLife Stadium. “Unfortunately, none of the out-of-the-box solutions we tried could provide the desired coverage at the video quality we were looking for." "Axis worked with us to build a custom solution where our needs were taken into consideration from the concept phase all the way through implementation. The result was an innovative new camera capable of providing full visibility throughout the entire bowl of the stadium while also allowing us to take advantage of advanced video analytics solutions.” Forefront of stadium security MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games Located in East Rutherford, NJ and serving the New York City metropolitan area, MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games—and the venue has been at the forefront of stadium security since it was built. The stadium is consistently rated one of the safest in the NFL, and in 2013 it was the first NFL stadium to achieve SAFETY Act certification from the US Department of Homeland Security. Implementing modern security solutions MetLife Stadium has twice been named a Facility of Merit by the prestigious National Centre for Spectator Sports Safety and Security (NCS4) and has established a reputation for implementing modern security solutions. In keeping with this reputation, MetLife Stadium refused to compromise on a surveillance solution, choosing instead to work directly with Axis on a device tailored to the venue’s unique needs. Innovate and design a tailored solution “MetLife Stadium has always been committed to strong security, and it holds its partners to a very high standard,” Fredrik Nilsson, VP, Axis Communications. “When the security team explained to us that they were having a hard time finding an off-the-shelf device that met their needs, we viewed it as an opportunity to innovate and design a more tailored solution." "As a result, the MetLife Stadium security team will be well positioned to detect, investigate, and respond to any security challenges that come its way.” Advanced and complex video analytics The new device has a number of parts specifically tailored to improve version in a stadium setting The new device includes a number of features specifically tailored to improve performance in a stadium setting. It provides optimal performance in a variety of lighting conditions, and electronic image stabilisation (EIS) capabilities that help keep the image steady even amid the raucous crowds and turbulent weather of an open-air stadium. It also features a custom-made lens that enables 8K resolution, and is capable of recording images in a wide dynamic range, capturing a broad spectrum of colour hues in sharp, high-contrast video. Because the camera can more accurately identify and catalogue identifying features it is able to run more advanced and complex video analytics. Existing surveillance devices The device adheres to a form factor consistent with existing surveillance devices, enabling compatibility with the pressed concrete structure’s existing camera mounts. Additionally, MetLife Stadium ensured the device could be easily integrated with the venue’s current security stack, including its Video Management System (VMS), current technology partners, and local public safety agencies. MetLife Stadium’s security capabilities Venue officials are working to identify ways to leverage the devices to enhance security With the new surveillance solution in place, MetLife Stadium’s security capabilities are more advanced than ever—but the security team is already planning for new enhancements. Venue officials are working to identify ways to leverage the devices to enhance security while also exploring different video analytics solutions. The ultimate goal is to not just improve security but streamline entry to the stadium, create easier access to amenities, and improve staffing efficiency. Highest Grossing Stadium of the Year MetLife Stadium, located in East Rutherford, NJ, is the home of the New York Jets and New York Giants and is one of the largest stadiums in the NFL (82,500). The stadium hosts the world’s biggest events on the world’s biggest stage and will host the FIFA World Cup 26™ Final and 7 other matches throughout the tournament. The venue annually ranks as one of the busiest stadiums in the world and has been named “Highest Grossing Stadium of the Year” 9 times by Billboard. Event highlights include Super Bowl XLVIII, NHL Stadium Series, WrestleMania, Copa America Centenario Final, 2021 Army-Navy Game, and many concerts, college football games, and international soccer matches.
In 2024, Hualien, Taiwan experienced devastating earthquakes and typhoons, necessitating rebuilding efforts and tourism revitalisation. VIVOTEK (3454-TW), the global pioneer security solution provider, has stepped in to support the local economy by organising the 4th "Safety Map" sustainability event. This year, the event was held in the historically significant Dachen New Village in Hualien, home to over 400 households. Model safe-tourism destination With 2025 marking the 75th anniversary of the migration of Dachen Island residents from Zhejiang, China, to Taiwan, the area is promoting tourism despite challenges like an aging population and increasing environmental risks. VIVOTEK’s team devised diverse solutions to address safety concerns, aiming to combine smart security with local revitalisation efforts. Their goal is to transform Dachen New Village, the largest settlement of Dachen residents in Taiwan, into a model safe-tourism destination that attracts visitors to experience its unique culture. Caring is the core Expanding Social Impact Through a "Safety Map" “VIVOTEK is dedicated to becoming the most trusted security brand in society. We aim to use our expertise to improve safety and forge a unique path of corporate sustainability. In its fourth year, the scale of our ‘Safety Map’ initiative continues to grow,” stated Alex Liao, VIVOTEK’s President. "This time, our work in Dachen New Village benefits over 1,500 residents and ensures that visiting tourists can explore without safety concerns. Additionally, having our team directly observe and address safety issues helps refine our product design to meet users' needs better." Local revitalisation and tourism Boosting the Tourism Economy Through Immersive Experiences The VIVOTEK team also had an immersive theatrical experience created by Lamb Social Innovation Studio The VIVOTEK security team also had an immersive theatrical experience created by Lamb Social Innovation Studio that delved into Dachen’s history. By understanding the area’s unique needs, they developed tailored safety solutions. “VIVOTEK incorporates “concern for others’ cares” as a core value in our sustainability efforts,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the Global Marketing Division. Enhancing safety "Over the years, our ‘Safety Map’ events have spanned neighborhoods, mental retardation training institutions, and schools, fostering a friendlier environment and expanding social impact." "After the natural disasters that recently struck Hualien, leaving behind numerous safety hazards and declining tourist numbers, we hope to use our security expertise to collaborate with residents in enhancing safety and revitalising Hualien’s tourism industry for a win-win outcome." Safety awareness “This is the first in-depth collaboration between Dachen New Village and a corporation. The VIVOTEK security team genuinely considered the needs of the community’s residents." "The event was a co-creation process where everyone brainstormed together, raising safety awareness among residents and inspiring optimism for the community's future transformation,” said Chao Hsiao-Yen, Social Innovation Lamb studio founder. Customised security solutions with AI Building a Safer Dachen New Village At the Ruan Bi Zhenjun Temple, the team explored ways to protect temple assets and visitor donations VIVOTEK’s security team, in collaboration with the local revitalisation group Social Innovation Lamb Studio, worked with residents and elders to identify areas where safety could be enhanced. At the iconic tourist hotspot Ruan Bi Zhenjun Temple, the team explored ways to protect temple assets and visitor donations better while enhancing environmental friendliness, allowing elderly or mobility-impaired individuals to enter and exit freely. Preserving nostalgic charm In the local park, they aimed to reduce disturbances caused by stray animals, improving the overall environment for residents. In the narrow alleys that showcase the history of Dachen’s settlers, the goal was to preserve the nostalgic charm of the village while optimising the environment to make landmarks more recognisable for visitors. For family members living away from home, the community explored innovative technological solutions to enable remote monitoring of loved ones, strengthening familial bonds and care. Various security solutions To address these challenges, VIVOTEK proposed a variety of security solutions. They included installing accessible spaces at the temple to accommodate visitors with mobility challenges, implementing smart lighting systems to enhance nighttime safety, and utilising AI cameras for real-time image analysis and stranger identification. Security solutions included installing accessible spaces at the temple to accommodate visitors The team also designed shared activity spaces to promote intergenerational interactions between the youth and seniors, fostering a sense of community. Emphasising the importance of safety education, the team worked to raise awareness among residents. Generative AI tools Additionally, the project incorporated cutting-edge generative AI tools from the Taiwan Design Research Institute, which visualised proposed solutions quickly and effectively. This approach made it easier for residents to understand and implement the ideas, to transform Dachen New Village into a safer, more livable community, fully prepared to welcome tourists.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Considering the growing role of security technology in the higher education market, we asked this week’s Expert Panel Roundtable: What are the new applications for security technology in the college and university markets?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Institute security: Manufacturers & Suppliers
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download