Integration software
5G Standalone (5G SA) and 5G Advanced are expected to be a key focus for communications service providers (CSPs) for the remainder of the decade as they deploy new capabilities to create offerings centred on value delivery rather than data volume. The analysis is included among a wealth of statistical network insights in the November 2024 edition of the Ericsson (NASDAQ: ERIC) Mobility Report, which extends the forecast period until the end of 2030. Network traffic data growth 5G networks ar...
Teledyne FLIR, part of Teledyne Technologies Incorporated announced it has been selected by Red Cat Holdings, Inc., to provide thermal imaging and Artificial Intelligence (AI) embedded software for its Black Widow™ small unmanned aircraft system (sUAS). SRR Program Red Cat was selected as the winner of the U.S. Army’s Short Range Reconnaissance (SRR) Program of Record after an evaluation process completed by the Army Project Management Office for Uncrewed Aircraft Systems...
Cohesity, a pioneer in AI-powered data security, now supports the Haute-Garonne Departmental Council with Cohesity DataProtect. This allows the organisation to drastically reduce the time and resources needed to manage its backups, both on-premises and in the cloud and significantly accelerate the data recovery processes to enhance its cyber resilience. The Haute-Garonne Departmental Council manages a vast collection of data covering different functions, including building plans, architectural...
The Nemetschek Group has announced its participation in a Series B funding round for Document Crunch, a technology company dedicated to transforming document compliance and risk management for the construction industry. The investment and partnership with Nemetschek will enable Document Crunch to accelerate growth, expand its platform, enhance the technology, and increase its market reach. AI-driven solutions Document Crunch’s AI-driven solutions are designed to streamline compliance ta...
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
iDenfy, a pioneer in identity verification and compliance solutions, has announced its new partnership with Portugal Residency Advisors, a consulting firm specialising in comprehensive relocation and investment services in Portugal. The partnership aims to automate the onboarding process and strengthen security measure regulations for the new clients. Identity verification solutions The challenges related to identity fraud and regulatory compliance have increased as well As digital and cross...
News
artius.iD, the global pioneer in secure, self-managed identity and decentralised ID management, has appointed Burton M. Goldfield, former President and CEO of TriNet Group Inc. (NYSE: TNET), to its Board of Strategic Advisors. Bringing more than three decades of cutting-edge technology expertise to the business, Goldfield will provide high-level strategic advice to artius.iD as it continues to rapidly scale its cross-sector digital identity and cybersecurity offering to multinational corporations and small- and medium-sized businesses (SMBs). Prior roles of Goldfield A renowned business executive, Goldfield brings more than 25 years of expertise in technology A renowned business executive, Goldfield brings more than 25 years of expertise in technology. He most recently served as President and CEO of TriNet Group for 15 years, steering the company to become a premier provider of comprehensive human resources solutions for more than 22,000 customers of small and medium-sized businesses (SMBs). Prior to TriNet, Goldfield held pivotal leadership roles at companies including Rational Software (RATL), Hyperion Solutions (HYSL), and IBM Corporation (IBM). He holds a bachelor’s degree in biomedical engineering from Syracuse University and an MBA from Villanova University. Demand for digital identity solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing increasingly sophisticated and multidimensional cybersecurity threats, with HR systems being an especially popular attack vector. His deep understanding of the small- and medium-sized business ecosystem will put artius.iD in an unrivalled position to tap into the accelerating demand for digital identity solutions among SMBs. Michael Marcotte, founder, Chairman, and CEO of artius.iD, said: "This is a pivotal appointment for artius.iD as we continue to pursue our strategic plan, and I'm thrilled to welcome Burton to our Board of Strategic Advisors. Our collaboration spans decades, including impactful initiatives on SlingTV, and is built on mutual trust and admiration." Decentralised ID management solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing sophisticated Marcotte added: "As a steadfast advocate and champion for SMBs and entrepreneurs, Burton has a profound understanding of the challenges companies face in safeguarding customer and employee data. His expertise and insight will be invaluable as artius.iD continues to deliver groundbreaking solutions to address these critical needs.” Burton Goldfield, Strategic Board Advisor at artius.iD, added: "artius.iD’s advanced quantum encryption resilience and decentralised ID management solutions provide SMBs with the confidence needed to safeguard their customer and employee relationships." Advanced groundbreaking software Goldfield added: "This transformative technology is akin to the advanced groundbreaking software tools created by Rational for the Department of Defense and Hyperion’s breakthrough with Essbase using OLAP for analytics." "SMBs are the driving force behind the U.S. economy, and it is vital that we continue to support their success. I'm eager to help bring this transformative technology to the organisations that need it most."
DigiCert, a pioneering global provider of digital trust, released its annual forecast of cybersecurity predictions for identity, technology, and digital trust expected to shape the landscape in 2025 and beyond. These predictions provide a snapshot of the cybersecurity challenges and opportunities enterprises will encounter in the months ahead. DigiCert’s full predictions and outlook for the new year can be found at DigiCert’s blog. Prediction 1: Post-Quantum Cryptography Takes Off 2025 marks a pivotal year when post-quantum cryptography (PQC) shifts from theoretical frameworks to real-world deployments. With impending announcements from the U.S. National Security Agency (NSA) and growing compliance pressures, PQC adoption will surge, empowering industries to embrace quantum-resistant solutions. Prediction 2: Chief Trust Officers Take Centre Stage Digital trust becomes a boardroom priority, pioneering to a continued rise of Chief Trust Officers (CTrOs) who will oversee ethical AI, secure digital experiences, and compliance in an increasingly regulated environment. Prediction 3: Automation and Crypto-Agility Become a Necessity With industry shifts toward shorter SSL/TLS certificate lifespans, automation and crypto-agility will emerge as critical capabilities for organisations aiming to maintain secure operations amidst evolving standards. Prediction 4: Content Provenance Goes Mainstream In an era of deepfakes and digital misinformation, the Coalition for Content Provenance and Authenticity (C2PA) is set to redefine how we verify digital content. Expect to see C2PA’s Content Credential icon become commonplace on images and videos to enhance trust across media platforms. Prediction 5: Organisations Will Demand Resilience and Zero Outages The CrowdStrike outage this summer underscored the need for better testing of automated updates and stronger digital trust. As IoT adoption grows, concerns about the safety of over-the-air updates, particularly for self-driving cars, are prompting calls for greater transparency in security practices. The E.U.’s Cyber Resilience Act, effective in 2027, will drive stricter cybersecurity standards, fostering a more secure and trustworthy IoT ecosystem. Prediction 6: AI-Driven Phishing Attacks Will Surge The proliferation of AI will fuel an unprecedented surge in sophisticated phishing attacks, making them harder to detect. Attackers will leverage AI to craft highly personalised and convincing phishing campaigns, while automated tools will enable them to scale attacks at an alarming rate, targeting individuals and organisations with precision. Prediction 7: New Private PKI Standards Like ASC X9 Will Gain Momentum ASC X9 is poised to gain momentum as industries like finance and healthcare increasingly require customised security frameworks to meet stringent regulatory demands and unique operational needs. Unlike public PKI, ASC X9 offers greater flexibility by enabling tailored policies and trust models, addressing critical areas such as data integrity and authentication. This ability to foster secure, scalable, and interoperable frameworks will make ASC X9 a preferred standard for organisations prioritising trust and collaboration. Prediction 8: Cryptography Bill of Materials (CBOM) Gains Traction In response to escalating cybersecurity threats, CBOMs will become a vital tool for ensuring digital trust by cataloging cryptographic assets and dependencies, enabling better risk assessments. Prediction 9: The Era of Manual Certificate Management Ends Manual management of certificates, still common in nearly a quarter of enterprises, will phase out as automation becomes indispensable for handling shorter certificate lifespans and stricter security protocols. Prediction 10: Organisations Will Continue to Prioritise Fewer Vendors Despite concerns about single-vendor risks and a peak of venture capital funding for AI startups, enterprises will continue to consolidate vendors to simplify management, improve integration, and enhance overall security practices. Future digital innovation “The relentless pace of innovation is not just reshaping our digital lives—it’s exposing new vulnerabilities faster than we can secure them, demanding a bold rethinking of how we approach cybersecurity,” said Jason Sabin, CTO at DigiCert. “The predictions for 2025 underscore the urgent need to stay ahead of these vulnerabilities by driving quantum readiness, enhancing transparency, and reinforcing trust as the bedrock of our rapidly changing digital ecosystem. DigiCert remains committed to shaping and securing future digital innovation to remain ahead of the vulnerability curve.”
On November 21, Ajax Systems hosted its sixth Ajax Special Event, an annual showcase of the company’s latest technologies and devices, which previously attracted over 2,000,000 online views. Moreover, 2024's offline events gather together professionals at 132 events in 43 countries. Product updates and releases The presentation focused on the product updates and releases across all Ajax portfolios: IndoorCam DoorBell MotionCam Outdoor HighMount (PhOD) Jeweller Hub BP Jeweller SpeakerPhone Jeweller Curtain Outdoor Jeweller Superior MotionCam HD (PhOD) Jeweller Superior MotionCam AM (PhOD) Jeweller LightSwitch (1-gang, 3-way, and 4-way) series The company also introduced a suite of software and service updates, improving integration, usability, and overall performance across the Ajax security ecosystem. Fire and life safety, comfort, and automation Ajax Systems has demonstrated that the products of different categories seamlessly integrate Ajax Systems has proven that it not only continues to take new heights in intrusion protection but also confidently navigates relatively new horizons of fire and life safety, comfort, and automation, as well as video surveillance. More so, Ajax Systems has demonstrated that the products of different categories seamlessly integrate into one Ajax system and enhance each other. Strategic changes Strategic changes in the Ajax portfolio segmentation were also unveiled. As a result, four new product categories were revealed: Intrusion protection, Fire and life safety, Comfort and automation, and Video surveillance. Such a comprehensive solution offers numerous benefits to end users and infinite business opportunities to professionals. Ajax Systems updates the segmentation of its portfolio Ajax Systems is a fast-growing company with a remarkable pace of releases. The portfolio grows by 30 unique products each year. However, such a remarkable pace has its side effects. The portfolio is becoming less clear as it grows. For this reason, it introduces its new segmentation - simpler, clearer, and intuitive. Several key changes Superior covers wireless Jeweller devices and wired Fibra devices intended for high-profile projects There are several key changes. First of all, there are four new product categories - Intrusion protection, Fire and life safety, Comfort and automation, and Video surveillance. Intrusion protection is further subdivided. It has two product lines: Baseline and Superior. Baseline encompasses wireless Jeweller devices; for intrusion only. Superior covers wireless Jeweller devices and wired Fibra devices intended for high-profile projects. The line also has dedicated hub models: Hub Hybrid (2G) and Hub Hybrid (4G). IndoorCam: a domesticated professional security Ajax Systems announces one of the most awaited Ajax products ever - IndoorCam, a Wi-Fi security camera with a PIR sensor, built-in AI, and a fallback communication channel. It is perfect for homes, restaurants, shops, or any other sites where using wired solutions would be an inconvenience. Equipped with a 4 MP camera, HDR, and IR illumination of up to 8 m, the device ensures a rich-in-detail image quality both day and night. The PIR sensor detects movement at a distance of up to 4 m, while built-in AI recognises people, pets, or vehicles. The camera also features a highly sensitive microphone and a top-notch speaker for two-way communication without echo or background noises. Availability: IndoorCam will be available to order in Q1 2025. DoorBell: Professional security at the front door While the video surveillance category is on the rise, it receives an obvious addition - Ajax DoorBell, a video doorbell with built-in AI, PIR sensor, and control via apps. DoorBell delivers excellent video and audio quality. Thanks to a 4 MP camera with HDR and IR illumination of up to 6 m, images are clear and sharp regardless of lighting conditions. In-house noise and echo canceling solutions and enhanced sound output enable users to talk and hear clearly, even in noisy environments. Communication range If the Wi-Fi connection is lost, DoorBell has a fallback communication channel with an Ajax hub What the Ajax team takes the most pride in is the doorbell’s communication capabilities. The main communication channel is the usual Wi-Fi but with an unrivaled communication range - up to 500 m in line of sight. It is up to 5 times more in comparison with the competitors’ solutions. If the Wi-Fi connection is lost, DoorBell has a fallback communication channel with an Ajax hub - Jeweller and Wings. The device never turns into a brick. Availability: DoorBell will be available to order in Q1 2025. Introducing MotionCam Outdoor HighMount (PhoD) Jeweller MotionCam Outdoor HighMount (PhOD) Jeweller is a versatile outdoor motion detector designed with exceptional installation flexibility. Due to the mounting height ranging from 2 to 4 m, wide horizontal and vertical viewing angles, and no blind spots, the device ensures comprehensive area coverage. It is a perfect fit for industrial facilities, construction sites, warehouses, office buildings, or private residences. Availability: MotionCam Outdoor HighMount (PhOD) Jeweller will be available to order in Q4 2024. Hub BP Jeweller: off-grid security made simple Protecting vacant property becomes even easier with the release of Hub BP Jeweller. It is a battery-powered control panel. It's ideal for protecting vacant houses, construction sites, empty office buildings, and other facilities that do not have a constant power supply. The device is available in two versions - with or without casing. The hub can be powered by internal batteries from Ajax or internal and external batteries from third-party manufacturers. Rechargeable or non-chargeable, they offer extended autonomy, especially in an advanced battery power saver (BPS) mode. ExternalAntenna Hub BP Jeweller is compatible with ExternalAntenna, an external antenna that helps to overcome barriers Hub BP Jeweller is compatible with ExternalAntenna, an external antenna that helps to overcome barriers to radio signals in challenging environments, such as reinforced concrete rooms. It ensures stable connection via Jeweller and Wings, as well as a cellular network. Availability: Hub BP Jeweller and ExternalAntenna are already available to order. Meet SpeakerPhone Jeweller, a module for audio alarm verification One of the brand-new products introduced at this year’s Ajax Special Event is SpeakerPhone Jeweller, the first voice module in the Ajax ecosystem. It is designed to help CMS operators assess the situation on a site in case of an alarm and respond swiftly if necessary. The operator can call the secured facility to talk to people on-site or listen to the background noises. Availability: SpeakerPhone is already available to order. Curtain Outdoor Jeweller: Keep false alarms at bay Curtain Outdoor Jeweller is a wireless curtain-type motion detector for outdoor perimeter protection. The device features a new optical system, three detection modes, and dual motion detection technology, all of which together mean a near-zero chance of false alarms. The movement is detected by a new optical system based on a Fresnel lens, two PIR sensors, and the latest generation of SmartDetect algorithm. Availability: Curtain Outdoor Jeweller is already available to order. News flash for the North American market Lately, the Ajax team has been focused on catering to the needs of the North American partners. In this pursuit, the company introduced the LightSwitch (1-gang, 3-way, and 4-way) series and Socket (type B) Jeweller to the market. These products offer all the benefits of the European versions but in a familiar form factor. Availability: LightSwitch [120] Jeweller will soon be available to order in Q1 2025. Other major announcements MotionCam Jeweller and MotionCam (PhOD) Jeweller delivers images of higher quality thanks to HDR technology, an improved optical system, and a CMOS sensor. The MotionCam series is also enriched with a new motion detector — Superior MotionCam HD (PhOD) Jeweller. Thanks to HDR, HD, and the new TurboWings protocol, users and PROs can receive outstanding-quality photos in less than five seconds. Yet another addition to Ajax's portfolio is Superior MotionCam AM (PhOD) Jeweller, a wireless motion detector with a top-notch anti-masing system, advanced photo verification, and a reduced blind spot. The portfolio of 19 fire and life safety devices is certified according to the most stringent standards worldwide and adapts to specific regulatory requirements. This way, Ajax has become the third manufacturer in the world to offer a Bukhoor mode. Dozens of Ajax devices have received French NFA2P certification, which makes them suitable for installation even in high-risk facilities. This certificate is a quality mark for consumers, insurance companies, and regulators. The video surveillance category has been expanded with JunctionBox, 12V PSU for NVR, and several significant software updates were released: Customizable video wall in the PRO Desktop app. Notification of object recognition by AI Direct video export feature for downloading videos up to 24 hours long. Temporary access rights for PRO accounts Video storage calculator and video device calculator for PROs. LightSwitch series is LightSwitch (Dimmer) Jeweller The new basic and smart outlets offer users even greater flexibility in controlling appliances The latest addition to the LightSwitch series is LightSwitch (Dimmer) Jeweller which allows for adjusting lighting brightness and setting the right mood in a room. The new basic and smart outlets offer users even greater flexibility in controlling appliances. And thanks to SurfaceBox [55], there are almost no limits as to where the devices can be installed. EN 50131 (Grade 3) certification Superior wired devices have obtained the EN 50131 (Grade 3) certification, which means that they can protect jewelry and arms stores, banks and financial institutions, ATMs, and other facilities. The number of Fibra installations is increasing by 30% each quarter, and the positive trend is bound to be reinforced thanks to the following wired Grade 3 releases. Superior DoorProtect G3 Fibra Superior MotionProtect G3 Fibra Superior SeismoProtect G3 Fibra Superior MultiTransmitter IO (4X4) Fibra Superior KeyPad Outdoor Fibra KeyPad Outdoor Jeweller Business opportunities in protecting remote sites Besides cutting-edge technologies, Ajax solutions can give rise to new business models. First, Ajax partners can sell and install security systems and outsource their maintenance. Second, they can provide turnkey security solutions and receive recurring revenue throughout the system's lifecycle. Lastly, there is an option to rent out the Ajax devices in their authentic form or as Ajax Ready products. Easy-to-understand interfaces and designs Ajax Systems ensures its hardware and software are ready to oppose ever-evolving physical and digital threats On the way to the safer world of tomorrow, Ajax Systems ensures its hardware and software are ready to oppose ever-evolving physical and digital threats. The company works on engaging an end user in their own safety by creating easy-to-understand interfaces and designs. It takes care of professionals to simplify and optimize their operations and empowers them to focus on business development rather than the routine. Core principles And most importantly, Ajax Systems never goes against its core principles of releasing impeccable products only Partner insights dashboard, an all-in-one interface that encompasses partner status, certification, achievements, and essential performance metrics. Many hours of new content from Ajax Academy. Specializations on the re-imagined Where-to-buy page on the Ajax website, which give partners a competitive advantage. The new Ajax system configurator and an upcoming customized configurator page. The sixth Ajax Special Event is a testimonial to the fact that the Ajax integrated system is a unique solution that offers infinite opportunities for professionals. With Ajax, they can meet the needs of the widest range of clients, take on any projects, both routine and ambitious, and effortlessly enter into new business verticals. Ajax Next Along the way, Ajax Systems tries to share its passion for hardware development with the Ukrainian youth. The company has been investing in technical education across Ukraine, equipping students with essential engineering theory and hands-on experience. Through an educational initiative called Ajax Next, the company has launched training programs and internships at Ukraine’s largest universities and equipped four laboratories. This initiative will continue to bring both small- and large-scale projects to life for Ukrainian students in the future.
Sonatype, the end-to-end software supply chain security platform, and OpenText are partnering to offer a single integrated solution that combines open-source and custom code security, making finding and fixing vulnerabilities faster than ever. Together, Sonatype’s Software Composition Analysis (SCA) solutions and Static and Dynamic Application Security Testing (SAST/DAST) from Fortify by OpenText offer a comprehensive, integrated security solution spanning the entire software development lifecycle. State of the Software Supply Chain® Report Sonatype’s 2024 State of the Software Supply Chain® Report found that in 2024, some critical vulnerabilities took more than 500 days to fix. By combining Sonatype’s open-source governance with Fortify’s advanced application security testing, organisations can detect, prevent, and remediate vulnerabilities with maximum efficiency. Solution benefits Enterprises leveraging this integrated solution experience: End-to-end software supply chain security: Robust protection for both open source and proprietary code, ensuring comprehensive coverage across the entire application stack from the first line of code to production. Streamlined DevSecOps practices: Automated security checks seamlessly integrate into CI/CD pipelines, ensuring that developers can maintain their velocity without compromising security. Automated efficiency: AI-powered tooling to streamline auditing, security prioritisation, licencing, and more across custom code and open source. Optimised risk mitigation and compliance: Early detection of security issues, unified reporting, and prioritised remediation, helping organisations meet regulatory requirements and manage risks effectively at scale. SCA solutions "At Sonatype, we’re dedicated to empowering organisations to take ownership of their software supply chain security without sacrificing speed and agility. Partnering with like-minded organisations like OpenText is critical to furthering this mission,” said Tyler Warden, Vice President of Products at Sonatype. “In uniting our innovative SCA solutions with Fortify’s proprietary code security tools to create this single pane of glass platform, we make it easier for developers and security teams to eliminate technical debt, maintain visibility, and quickly respond to security risks.” Visibility and quick response “The best partnerships lean into each organisation’s unique strengths in support of a common goal. Sonatype and OpenText offer best-in-class code security solutions that, when combined, streamline security across the entire software development lifecycle,” said Dylan Thomas, Senior Director of Engineering and Product for Application Security at OpenText. "I am excited for our continued joint evolution and innovation to enable safe, secure, and fast software development.” Hundreds of global organisations leverage the integrated Sonatype and Fortify by OpenText solution to be ambitious, move fast, and do it securely.
Morphean, Europe’s secure direct-to-cloud video solutions company, has announced a strategic partnership with Hanwha Vision, the global vision solution provider. This collaboration will deliver cutting-edge security solutions tailored to meet the evolving needs of businesses, including across retail, smart cities and banking, amid an increasingly complex threat environment. Direct-to-cloud This partnership will benefit multi-site organisations and streamline their surveillance operations by removing on-site server hardware. The direct-to-cloud approach seamlessly integrates Hanwha Vision ranges, including the X, Q and T series, with the Morphean platform, enabling remote management and access, live streaming, and cloud recording. Users can manage sites from a single, intuitive interface, to simplify setup, management and configuration. Reduces costs, central management Businesses can significantly reduce operational costs by eliminating hardware maintenance By utilising a direct-to-cloud model, businesses can significantly reduce operational costs - by eliminating hardware maintenance, limiting electricity consumption, and reducing the need for site visits. This results in a more sustainable, cost-effective, and scalable system. Furthermore, Morphean’s integrations with Alarm Receiving Centres (ARCs) streamline security processes by providing a centralised management interface, enabling quick and coordinated incident responses. As a result, businesses can reduce downtime and minimise potential losses. Trusted cybersecurity Morphean and Hanwha Vision are committed to trustworthy cybersecurity. Morphean operates within secure, GDPR-compliant data centres located in Switzerland, France, Germany, and the United Kingdom, all certified with ISO 27001 to guarantee top-tier cybersecurity, video encryption, and multi-layer authentication. Morphean offers robust encryption, redundancy, and regular backups, minimising the risk of data loss due to hardware failures or theft and ensuring continuous operation. USNDAA, ISO-27001, and UL CAP Certification The in-house S-CERT is entirely focused on addressing any potential security vulnerabilities Hanwha Vision was chosen as a manufacturing partner for its commitment to designing, developing,g and manufacturing products and solutions that are cyber-secure, keep users’ confidential information safe, and comply with international regulations. Hanwha Vision products and solutions are compliant with the US National Defense Authorization Act (NDAA), meet ISO-27001 and stringent UL CAP Certification requirements, and have FIPS 140-2 and a device certificate (private Root CA). In addition, the dedicated in-house Security Computer Emergency Response Team (S-CERT) is entirely focused on addressing any potential security vulnerabilities. A competitive edge for resellers and system integrators By combining Hanwha Vision's powerful edge-based open platform with Morphean's cloud-hosted solution, resellers and system integrators can leverage direct-to-cloud video surveillance technologies to offer clients an efficient, scalable, and cost-effective solution. Furthermore, this integration reduces the complexity of installations and maintenance, allowing for quicker deployments and fewer on-site visits. Remote management and monitoring services Customer satisfaction increases sales opportunities, and profitability for resellers and system integrators Additionally, the ability to deliver remote management and monitoring services enhances customer satisfaction and fosters long-term relationships. This increases sales opportunities as well as profitability for resellers and system integrators and positions them as leaders in the evolving security technology landscape. Reliable and efficient surveillance “Our collaboration with Hanwha Vision opens new doors for businesses seeking reliable, centralised, and efficient surveillance solutions. Morphean’s direct-to-cloud platform allows companies to streamline security operations while significantly reducing infrastructure costs and complexity,” said Jack Turnell, Commercial Product Owner at Morphean. “This partnership ensures that our clients benefit from state-of-the-art surveillance with robust cybersecurity, supporting them in minimising risk, lowering operating costs, and maximising operational efficiency.” Scalable and sustainable “Our partnership with Morphean showcases scalable, accessible, and sustainable security solutions,” said John Lutz Boorman, Head of Product and Marketing, at Hanwha Vision Europe. "By combining Hanwha Vision’s industry-leading video surveillance solutions with Morphean’s direct-to-cloud capabilities, we’re enabling businesses across sectors - from retail to smart cities - to deploy and manage security systems that are both highly flexible and cost-effective."
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is pleased to introduce three 6 MP cameras in its Value Series, offering customers enhanced clarity, extended range, and affordability. Available at a special promotional discount through December 31, these models—part of Hikvision’s innovative 3-Series lineup—feature AcuSense technology, enabling efficient and precise monitoring that outperforms traditional 4 MP cameras. Hikvision’s DarkFighter technology Compatible with new and living systems, these models are suited for domains and lighting conditions “Our 6 MP 3-Series cameras bring high-performance imaging, greater monitoring coverage, and advanced technology to the Value Series, allowing customers to improve their security systems affordably,” said John Xiao, Vice President of Marketing, Hikvision USA. “We’re making professional-grade security accessible for a broader range of users, ensuring high resolution and reliable performance.” The new 6 MP cameras offer clearer visuals and an extended monitoring range, featuring advanced low-light capabilities through Hikvision’s DarkFighter technology. Compatible with both new and existing systems, these models are suited for various environments and lighting conditions. 3-Series 6 MP camera models on sale 1. DS-2CD3066G2-IS: 6 MP AcuSense Fixed Mini Bullet Network Camera 2. DS-2CD3366G2-ISU: 6 MP AcuSense Fixed Turret Network Camera 3. DS-2CD3T66G2-4IS: 6 MP AcuSense Fixed Bullet Network Camera Key features of the 6 MP Value Series cameras AcuSense Technology: Enables precise object detection and classification, minimising false alarms for more efficient monitoring. High-Resolution Imaging: Provides sharp, detailed visuals that surpass the 4 MP models in the Value Series. Extended Monitoring Range: Enhanced sensor and lens technology enable broader coverage. Advanced Low-Light Performance: Ensures clarity in various lighting conditions, powered by DarkFighter technology. Efficient Compression: H.265+ compression optimises storage and bandwidth. Versatile Compatibility: Compatible with HEOP and third-party applications for flexible customisation. Take advantage of this special offer on Hikvision’s 6 MP Value Series cameras by December 31. For more information, visit a local distributor, contact a Hikvision representative, or explore the full range of products at Hikvision.com.
Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Security beat
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Case studies
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
High-quality skin care products, developed using the latest technologies and manufactured sustainably: the international Babor Beauty Group is represented in more than 70 countries with its sought-after beauty brands. Research and development as well as production take place at the company's headquarters in Aachen, Germany, while filling and logistics are located just a few miles away in Eschweiler. Use of digital process In 2023, the family enterprise inaugurated a cutting-edge production facility here, known as the “Babor Beauty Cluster”. Around half a million jars, tubes, and ampoules are filled there every day, and logistics and shipping are also handled on-site. A special feature of the 60,000 sq.m plant is its extensive use of digital processes for working and operating as efficiently as possible. The fully networked complete solution from Bosch Building Technologies for safety, security, and building management makes a valuable contribution to this. Greater safety, security, comfort, and efficiency The smart solution integrates, among other things, fire protection, intrusion alarm, and access control systems The smart solution from Bosch Building Technologies was precisely tailored to meet the Babor Beauty Group’s requirements. It integrates, among other things, fire protection, intrusion alarm, and access control systems, as well as a video security solution for safeguarding the perimeter and premises. AI-based video security for fast, frictionless reception The AI-based video security solution analyses every captured image while using predefined rules and only triggers an alarm if at least one of them is met. This avoids false alarms, thus enabling even more effective security management. The solution from Bosch Building Technologies also includes a digital visitor management system that saves time with a self-registration function. It ensures fast, frictionless reception of guests and tradespeople and includes audit-proof archiving, which significantly eases the workload of Babor’s operating team. Smart truck and parking space management The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording Another highlight is the smart truck and parking space management with license plate detection for user-friendly access control. Properly secured loads are also automatically documented. The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording to provide comprehensive documentation of the process. Management system for control across sites The Babor Beauty Group’s technical operations and facility management team is responsible for both the company’s headquarters in Aachen and the production and logistics cluster in Eschweiler. The safety and security systems of both sites have therefore been integrated into the “Building Integration System 360” from Bosch Building Technologies. Centralised management platform This centralised management platform provides control of all building systems, enabling Babor Beauty Group's operations and management team to respond efficiently to security-related events. The solution is also flexibly scalable to facilitate the integration of future site extensions. Bosch Building Technologies will operate this complete solution for the next ten years within the scope of a build-operate-transfer model.
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."
As a real estate development firm’s facility was nearing completion, the firm identified potential concerns with limitations in the facility’s control infrastructure. Before the building reached full occupancy, the firm engaged with Wesco Anixter’s entroCIM team for a comprehensive cybersecurity and use-case audit. As a result, the facility pivoted to a cloud-hosted instance of the entroCIM platform to deliver on the organisation’s lofty vision for a truly connected space. Solution Constant commissioning with site-specific scripting means operators know the moment The entroCIM platform helps bring their vision to life among operational technology as well; disparate technologies with unique communication protocols come together in a single interface, providing stakeholders with mission-critical actionable insight. As all commercial real estate of this type has changed in the past several years, entroCIM has changed with it, offering direct, API-based connection to detailed predictive utility data to leverage the site’s flexibility in maximising efficiency. Constant commissioning with site-specific scripting means operators know the moment a system begins to show signs of decline. Since initial deployment, the depth of actionable insight through analytics has more than doubled, with more than 130 analytical rules running continuously to give operators the upper hand in the management of occupant comfort, energy efficiency and proactive maintenance Scope Cloud-based entroCIM licence access Dashboarding and graphics Analytics and reporting Preventative maintenance Investigation API-based utility integration Commissioning Global remote access Use-case gap analysis Cybersecurity audit New construction consulting Subject matter expert support Project stakeholders C-suite IT Organisation-level engineering Site-level mechanical Site-level engineering Tenant program management Communication protocols BACnet Modbus Integrated services Automated Logic Semco Lutron Siemens Honeywell York
HID, a worldwide pioneer in trusted identity and access control solutions, announced that Deskbee, a global provider of corporate space management solutions, has integrated HID Mobile Access and Identity Positioning technologies into its platform. With an already robust workplace management application, Deskbee wanted to enhance security and optimise operational efficiencies by integrating digital credentials and real-time positioning into its platform. HID Mobile Access With HID Mobile Access, Deskbee app users can employ their smartphones and tablets to securely access facilities, eliminating the need for physical cards and reducing the risks associated with lost or misused credentials. This implementation not only enhances convenience and security but also seamlessly integrates with existing systems, simplifying the issuance and revocation of credentials from a single platform. Identity Positioning technology By analysing occupancy data, managers can optimise space planning, improve resource allocation Furthermore, Identity Positioning technology enables building managers to track employee and visitor locations in real-time, providing valuable insights for optimising space planning and resource allocation. By analysing occupancy data, managers can optimise space planning, improve resource allocation (such as energy, water, and HVAC), and enhance overall operational efficiency. Secure, efficient, and personalised experience “The integration of HID’s Mobile Identities solutions demonstrates the enormous potential that application development companies have to transform access control systems and workplace management,” said Rogerio Coradini, HID’s Commercial Director of Physical Access Control in Latin America. “Through collaboration with HID, developers of mobile platforms and applications can adapt to the changing needs of the market and provide a more secure, efficient, and personalised experience for their clients.” Detailed monitoring and improved access management Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage Due to HID mobile identity technologies, Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage, providing accurate data on occupancy, location, and duration of stay. “The ability to automate the registration process and improve access management has been a significant change. HID's reliability and support have been fundamental to these advancements, and we are seeing how these results are positively impacting our clients. The trust in the brand and its support has been essential to our success,” said Gorguet. Employee badge integration Headquartered in Brazil, Deskbee has experienced rapid growth, consolidating its position in the Brazilian market and expanding its operations to more than 25 countries, including Mexico, Chile, Argentina, the United States, Portugal, Spain, Germany, and the United Kingdom. Still this year, the company will offer employee badge integration with Google Wallet, also powered by HID technology.
Products
Round table discussion
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
White papers
Integrating IT & physical security teams
DownloadTop 7 trends to watch in the physical security industry
DownloadBoost efficiency and streamline security with integrated access control
DownloadVideo technology strategies for hospitals are moving beyond security
DownloadIoT connectivity
DownloadCreating a secure and positive healthcare experience
DownloadUnified physical security
DownloadIntegrated access control: reap the benefits of connected security
DownloadGetting the most value from Software Subscription Agreements
DownloadCombining systems intelligence and human insight for superior security
DownloadWhy outdated access control systems are a big problem
DownloadPreparing your organisation with quality situational awareness
DownloadThree Reasons to Upgrade Your Access Control Technology
DownloadHouse Of Smart Cards - How assumptions can open dangerous security gaps
DownloadVideos
Integration software: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download