Integration software - Security beat

Guarding the jackpot: Intelligent perimeter detection for casinos

Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure lar...

Indoor drones ready to deploy in multiple security verticals

Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces,...

Honeywell - how disruptive technologies make security systems better

The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years.  There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions.  Artificial intelligence (AI) Also, artificial intelligence (AI) plays an impor...

Executive order provides new tools to shore up cybersecurity of U.S. ports

Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences.  By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the ev...

As big tech impacts physical access control, there may be more to come

In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing di...

Ascending in the US, Gallagher Security emphasises culture and ‘people-first’

Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated b...

AI and the cloud provide new solutions to old problems at GSX 2023

Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge  i-PRO is a company reflecting the continued expansion of edge AI capability in the...

AMAG President teases big things to come in next generation of products

A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges a...

Newest systems-on-chips (SOCs) to expand AI inside cameras, says Ambarella

When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past.  For an update on t...

Acre beginning a new chapter, an update from CEO Don Joos

Acre is a company built on mergers and acquisitions (M&A). Since its founding in 2012, Acre acquired several familiar access control companies, from Vanderbilt to RS2 Technologies, Open Options to Feenics, and several others. Acre itself was acquired in 2021 by UK-based private equity firm Triton, thus launching a new chapter in the company's history. Don Joos was named the new CEO in 2022 and set about transforming Acre from a collection of acquired companies into a coherent whole (represe...

Matter open-source standard to enable greater smart home interoperability

Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security.  The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Cr...

Top 10 articles of 2022 reflect the cutting edge of security technology

New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collab...

Pent-up demand from pandemic invigorates ID cards, including larger formats

Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzei...

Combining technologies at the entrance to improve the customer experience

Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control.  “The more manufacturers collaborate with each other, the more benefits fo...

Vibrant GSX 2022 includes new products, new approaches to security

The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several m...

Prosegur policy promotes responsible use of artificial intelligence (AI)

As new technologies incorporate artificial intelligence (AI) and overall uses of AI continue to expand, what protections are in place to prevent its misuse? Artificial intelligence, like any technology or security measure, is not inherently bad. It can, however, be used for nefarious purposes and in ways that were never intended or thought of. ‘Responsible AI Policy’ to protect users Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threa...

Shoplifting today is more sophisticated, and so are the tools to fight it

Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Sometimes, retail crimes are strategic and expertly choreographed. Every step is carefully thought out — from the brand to the location to the items that are taken. Shoplifting, a major safety concern Also, the violence that accompanies these events is rising. Shoppers are rightly concerned about their safety while shopping, and...

The future is here: ADT’s innovation lab evaluating robots and indoor drones

New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the new technologies’ value to customers and some typical use cases. The Innovation Lab has been in place for just under a year and just moved into a 2,000-square-foot facility that is staffed with four dedicated ADT Commercial employees and teams from various commercial innovation partners. The idea of the lab is to close the gap bet...

Userful enhances cyber security operations centres using software approach

For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber se...

Deep learning solves nuisance alarms and tailgating in access control

Access control systems are plagued by problems, such as false alarms and tailgating. Hakimo is a new company that applies concepts of deep learning to reduce false alarms and tailgating, and to make access control more accurate. False or nuisance alarms from access control systems take a lot of time and attention for operators in global security operations centres (GSOCs). It’s wasted time they could use to perform more high-level duties. Hiring enough GSOC operators to monitor and resolv...

Metaverse will promote collaboration and enable more efficiencies for security

Metaverse is a familiar buzzword today, but few people grasp what it really means. In the simplest terms, the metaverse is an online ‘place’ where physical, virtual and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). Metaverse Expectations of the metaverse today are largely built on hype. You hear more about future and eventual potential than about the curren...

Userful’s software-defined AV provides security information when it’s needed

Audio-video technologies have historically been a silo in the enterprise, separated from the larger network infrastructure by their use of analogue, hard-wired and proprietary connections. Software-defined system However, AV devices such as video walls and corporate signage add more value to security and emergency response operations when they are connected to the larger IT network and can interface seamlessly with other systems. That’s the approach provided by Userful, which offers a s...

Cisco Meraki’s cloud system simplifies approach to video surveillance

For end-users, a simplified approach to video surveillance has its advantages. Cisco Meraki delivers simplicity, replacing a complex video surveillance system with edge-empowered cameras that connect directly to a web portal. The architecture minimises physical infrastructure and the software required for traditional cameras by placing storage and processing inside each camera, and by putting the video management system (VMS) in the Cisco Meraki cloud. Additionally, with Meraki’s web-bas...

M&A in 2021: Plenty of deals despite lingering industry challenges

Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges su...

Oosto’s deep learning enhances facial recognition accuracy and expands uses

Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimised in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all withou...

HID Global hails the renewed promise of mobile access

It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global.   Q: What has changed since the first pilo...

Next wave of SoCs will turbocharge camera capabilities at the edge

A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera...

Baltimore is the latest U.S. city to target facial recognition technology

The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalisation in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston &n...

ASSA ABLOY Opening Solutions embraces BIM to smooth specification and installation of door security solutions

BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the buil...

Acquisition of Vidsys opens the door to AI-driven PSIM platform

Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market.  ARES Security Corporation has developed and deployed security and public safety software solutio...

Quick poll
What is the most significant challenge facing smart building security today?