Intrusion detection

News
Quanergy Solutions, Inc., the pioneer in high-performance 3D LiDAR security and smart space solutions, is highlighting its expanded integrations with industry-leading security partners Hanwha Vision and Avigilon at ISC West 2025 booth #29081. The integration of Quanergy’s advanced 3D LiDAR solutions with Hanwha’s Wisenet WAVE 6.0 VMS and Motorola’s Avigilon Unity On-Premise Video Security Platform delivers enhanced perimeter security, intrusion detection, and object classification capabilities for enterprise and critical infrastructure customers. 3D LiDAR and video solution Quanergy at booth #29081 to learn more about the company’s partnerships and 3D LiDAR security solutions “Quanergy’s integration with Hanwha’s Wisenet WAVE 6.0 VMS and Motorola’s Avigilon Unity platform establishes new benchmarks in intelligent security and business intelligence performance,” said Gerald Becker, Vice President of Market Development and Alliances at Quanergy. “We’re delivering a unified 3D LiDAR and video solution that empowers enterprise and critical infrastructure customers with unparalleled situational awareness, enabling proactive threat detection and mitigation and improved operational excellence.” Quanergy’s integration with Avigilon Unity enables: Real-time insights through combined 3D LiDAR and video analytics Edge-based intelligence that proactively alerts security personnel of potential security events Enhanced search capabilities for people or vehicles using both 3D LiDAR and video data Streamlined decision-making with standard operating procedures that incorporate 3D LiDAR detection Seamless access to 3D LiDAR detection events via Unity’s cloud platform and mobile application Quanergy’s integration with Hanwha’s Wisenet WAVE 6.0 VMS enables users to: View 3D LiDAR-detected events directly within the Wisenet WAVE interface Utilize camera linking hotspot/teleport features to automatically direct PTZ cameras to 3D LiDAR-identified targets Receive real-time alerts for security events with 3D visualization Minimize false alarms through Quanergy’s advanced classification algorithms Attendees can visit Quanergy at booth #29081 to learn more about the company’s partnerships and 3D LiDAR security solutions. Visit the Avigilon booth #14059 on April 4 between 10:00 AM and 12:20 PM for a live demo.
Quanergy Solutions, Inc., the pioneer in high-performance 3D LiDAR security and smart space solutions, is showcasing its comprehensive portfolio of hardware and software solutions for both outdoor and indoor applications at ISC West 2025 booth #29081. Featured products include: Q-Track 2.4 software with powerful AI-driven insights; Q-Track LR for long range intrusion detection and perimeter protection; Q-Track HD for optimal detection, tracking and classification in challenging environments like airport terminals, retail stores and office buildings; and Q-Track Dome to track and classify people in smaller and more complex environments, such as corridors, mantraps, and line queues. Quanergy’s 3D LiDAR solution “Quanergy’s uniquely integrated hardware and software 3D LiDAR solution delivers a new dimension of precise, real-time 3D spatial intelligence that seamlessly extends the reach of existing video systems with the most accurate object identification, classification and tracking solution available in any environment,” said Gerald Becker, VP of Market Development & Alliances at Quanergy Solutions, Inc. “This unified approach provides security integrators and end users with a robust platform for enhanced security and business intelligence.” Quanergy’s line of outdoor and indoor 3D LiDAR sensors Q-Track 2.4 software delivers intelligent 3D LiDAR processing that enhances security and smart space analytics Q-Track 2.4 software delivers intelligent 3D LiDAR processing that enhances security and smart space analytics with powerful AI-driven insights across Quanergy’s line of outdoor and indoor 3D LiDAR sensors. This latest software update introduces sophisticated algorithms that enable hyper-accurate continuous object tracking while achieving an impressive 95% reduction in false alarms. The refined perception technology optimises performance across security and crowd management applications, significantly lowering the total cost of ownership for end users. Key features of Q-Track 2.4 Advanced AI-Powered Algorithms: Provides instant alerts for unauthorised access, perimeter breaches, tailgating, and suspicious movement patterns. Enhanced Crowd Behaviour Analytics: Enables detailed people movement analysis for optimised foot traffic management in high-density environments. Seamless Multi-Sensor Fusion: Integrates multiple 3D LiDAR units into a unified system for comprehensive security coverage. Optimised Indoor and Outdoor Performance: Adaptive calibration algorithms ensure smooth operation in varied lighting and weather conditions. Simplified Deployment: User-friendly semi-automatic floor alignment and improved calibration tools streamline installation and operation. Quanergy’s lineup of 3D LiDAR sensors Q-Track LR is purpose-built for long-range perimeter intrusion and object detection in expansive outdoor environments such as critical infrastructures, data centres, commercial sites, and transportation hubs. With its extended range and 360-degree horizontal field of view, Q-Track LR can monitor vast perimeters, accurately identifying and tracking potential intrusions or objects over considerable distances, even in low-visibility conditions. Integrated into a meshed network, multiple Q-Track LR units provide seamless coverage, ensuring that assets and sensitive areas are secured against unauthorised access and potential threats. Q-Track HD is designed to provide optimal tracking and classification in challenging environments, such as airport terminals, retail stores and office buildings. With its 360-degree horizontal field of view and very wide vertical field of view, a meshed network of Q-Track HD’s can accurately track over 1000 people simultaneously, while they walk around obstructions such as line queues, columns, shelves, desks, etc. Q-Track Dome is designed to track and classify people in even smaller and more complex environments, such as corridors, mantraps, and line queues with a 90-degree vertical field of view. This sensor is optimised for dense areas, offering unmatched performance and reliability for object tracking and crowd intelligence gathering applications. Range of 3D LiDAR solutions ISC West 2025 attendees are invited to visit Quanergy Solutions at stand #29081 for live demonstrations of the company’s complete range of 3D LiDAR solutions. Quanergy will also be showcasing its integration with Avigilon Unity at the Motorola Solutions booth #14059 on April 4 between 10:00 a.m. and 12:20 p.m.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced a series of upgrades to their access control and video surveillance (ACVS) solutions. These product enhancements will integrate with existing security architectures to improve management of mission-critical security and protection for people, buildings and assets. They will transform customers’ security posture, unlocking new levels of operational agility and cost-effectiveness. Advanced access control technology "Security across enterprise and commercial applications is evolving rapidly, and organisations need solutions that provide both flexibility and resilience," said Faisal Pandit, president, Controls and Security Systems at Johnson Controls. "We are empowering customers to leverage advanced access control and surveillance technologies by maximising effectiveness, UX, cost efficiency and scalability." C•CURE IQ 3.10 release The latest C•CURE IQ release evolves the end-to-end enterprise access control and video management solution into one comprehensive integration platform, enabling users to manage 24x7 mission-critical security through a single interface across on-prem, hybrid and cloud deployments. Key features include: Enhanced Mapping: Seamless transitions between outdoor GIS maps and indoor floor plans with device integration to enable faster, more targeted responses. Advanced Video Management: Improved Video Clip Management with personalised whiteboard spaces, full journals and audit logs for forensic searches and reporting. Security Intelligence and System Health Dashboards: Easily manage alarm systems, occupancy levels and detailed system health metrics in one space. Edge AI Analytics: Advanced analytics powered by native integration with Illustra cameras through American Dynamics high-performance network video recorders (NVRs) enhance real-time security insights. Prioritised-security focus and response: Reducing unrationalised operational expenses by optimising operator time management, and space and asset utilisation. iSTAR G2 controller upgrades The Software House iSTAR G2 family of door controllers has been upgraded to meet the demands of modern enterprise environments with greater security, scalability and efficiency than ever before. Key enhancements include: Higher Capacity, Lower Footprint: The iSTAR Edge G2 panel now supports 8 readers and 1 million cardholders, dramatically lowering the hardware footprint and associated energy costs. It requires approximately 75% less space than comparable solutions. Unmatched Protection: Featuring OSDP end-to-end encryption, FIPS 140-3 certification, TLS 1.3 authentication and adherence to zero-trust cybersecurity standards. Elevated Interoperability: OSDP improvements align with all IT and procurement requirements, enabling seamless system integration. A new family of OSDP I/O modules is also available, enabling additional input for sensors and expanding on the capabilities that were introduced with the second generation of RM-4E and RM-DCM-2 Door Modules. victor VideoEdge NVR portfolio enhancements The American Dynamics scalable NVR system, victor VideoEdge, now offers increased security value and cost efficiency. Alongside integrating with C•CURE IQ 3.10, developments include: Major Performance Upgrades: Enriched system capabilities for faster processing and more effective video storage management. Built-in AI Intelligence: Advanced analytics to identify objects, behaviours and anomalies for proactive, edge-enabled security intervention. Elimination of Additional Camera Licencing Fees: Security managers can leverage the powerful native integration between victor VideoEdge NVRs and Illustra Flex and Pro cameras without incurring extra costs for camera licences, reducing total investment. End-to-end security with Kantech, Exacq, DSC, Illustra A new platform for commercial and enterprise applications seamlessly integrates four systems into a single platform to enhance real-time situational awareness, operational efficiency and proactive threat response. The comprehensive system combines the market-recognised capabilities of Kantech Access Control, Exacq Video Management, DSC Intrusion Detection and Illustra Cameras. The new infrastructure enables: Full System Unification: Connecting access control, video surveillance and intrusion detection capabilities for a holistic approach to physical security. Enhanced Intelligence: Delivering AI-driven video analytics, automated threat detection and flexible access control features to streamline proactive security decisions. Scalability & Flexibility: Designed to support businesses of all sizes, the solution adapts to evolving security needs while optimising cost efficiency. These solutions will be on display through immersive Command & Control video walls at ISC West 2025 in Las Vegas from March 31 – April 4 (Booth #18033) for attendees to experience first-hand.
Opening exciting new AI-powered security, intelligence and operational benefits for video surveillance users, ISC West will see confirmation of a global tech partnership between IDIS and Vaidio for the launch of a joint solution to speed critical operations across a range of use cases with advanced, customizable video analytics. The IDIS-Vaidio joint solution comprises an extensive new suite of AI video analytics tools, integrated with IDIS Solution Suite VMS to work seamlessly with any camera or video source. Advanced surveillance analytics The new platform delivers powerful, highly accurate analytics to enhance the efficiency of live monitoring and forensic review The new platform delivers powerful, highly accurate analytics to enhance the efficiency of live monitoring and forensic review across a wide range of surveillance applications, including security, safety, vehicle management, operations, process monitoring, and access control. Fully NDAA-compliant, the IDIS-Vaidio solution employs advanced object classification, with recognition of over thirty unique object categories, including people, vehicles, and faces, and behavioral analysis for optimal accuracy. It conducts multi-layered analysis to confirm threats, cross-referencing video, audio, and sensor data to eliminate false alarms. With threats automatically detected, the platform triggers automated or manual responses, activates alarms, or sends real-time notifications in accordance with customizable action plans. Flexible AI integration Users of the IDIS-Vaidio joint solution can take advantage of customizable features, dashboards, and support Users of the IDIS-Vaidio joint solution can take advantage of customizable features, dashboards, and support tailored to specific applications, and flexible project-based pricing that includes standard packages and easy license upgrades. This allows cost-efficient and future-proof adoption of AI, with assured scalability through additional licenses, features, and system expansions. Functions include intrusion detection, facial recognition, license plate recognition (LPR), crowd and queue management, loitering detection, abandoned object detection, counting, and perimeter protection. For installation flexibility, the IDIS-Vaidio joint solution operates on high-performance servers and is optimized for integration with IDIS hardware and third-party devices. It incorporates encrypted data transmission and secure storage for compliance with data protection and security standards. Expanded IDIS solutions The new solution from IDIS and Vaidio will be a major launch alongside other technologies for IDIS Americas at ISC West (April 2025, Las Vegas, booth #8037) with the company showcasing an expanded range of Korean and US-origin technologies and its most comprehensive ever lineup of new products and solutions. Smart surveillance unveiled “The IDIS-Vaidio joint solution is being introduced at ISC West, and we could not be more excited to share this experience with our customers. IDIS Americas gets to demonstrate the powerful new AI video analytics capabilities for users in sectors from retail and transportation to education, healthcare, logistics, manufacturing, and critical infrastructure,” said Jay Jeong, CSMO, IDIS Americas. “Because it is fully customizable for each application, there has never been a better time to take advantage of the enhanced security and efficiency that AI video now makes possible.” AI-powered security "AI is enabling new levels of accuracy and scalability, and the flexibility we are delivering together will help improve security, safety, and effectiveness in nearly every sector," said Vaidio, CEO, Marshall Tyler. “The proven use cases arising from our partnership continue to expand, and we’re focused on maximizing the value of every camera our customers operate."
Expert commentary
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialogue and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organisation so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organisation. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of the machine and deep learning algorithms to recognise or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the colour of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours Analytics, on the other hand, refers to the process of analysing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behaviour. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognise. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behaviour information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilised. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organisation. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realise that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the colour of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognise something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognise unique, customisable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organisation might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognise that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organisations modernise their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximising value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritising interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities. {##Poll1743085396 - What is the biggest challenge you face with your current access control system?##}
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Case studies
Located in Petrópolis, RJ, the Imperial Museum houses one of the most important collections from Brazil’s imperial period, including the iconic crown of Dom Pedro II. As the nation's pioneering repository of artifacts from the Second Reign, the museum showcases over 300,000 historical items—from museological and archival pieces to rare books—making it a vital resource for researchers and history enthusiasts. With more than 300,000 visitors annually, the museum plays a vital role in preserving the nation’s cultural heritage. To further enhance security and optimise visitor management, the museum turned to its long-term partner, VIVOTEK, for a cutting-edge surveillance upgrade. Challenge As visitor numbers grew and security demands evolved, the museum required a smarter surveillance system to address key concerns: High-value Artifact Protection: The Crown Room, where Dom Pedro II’s Imperial Crown is displayed, required continuous high-level monitoring. Visitor Flow Management: Real-time tracking was needed to prevent congestion and improve the visitor experience. Intelligent Security Features: Upgrading to AI-powered analytics would provide enhanced intrusion detection, more precise monitoring, and reduced false alarms. Solutions VIVOTEK, the pioneering security solution provider, partnered with ALCA NETWORK to implement an AI-driven surveillance system tailored to the museum’s needs: VSS PRO Video Management System: Centralised control with seamless AI integration enabled precise monitoring and real-time surveillance management. AI-powered Cameras: Installed in key areas, including the Crown Room, these cameras offer 24/7 surveillance with advanced intrusion detection capabilities. 3D People Counting Cameras: Deployed in high traffic zones, these cameras provide real-time visitor flow tracking, offering valuable insights for effective crowd management. Integrated Security Upgrade: The new deployment seamlessly integrated with the existing 88-camera system, enhancing the museum’s security and ensuring comprehensive monitoring of critical areas. Result and customer feedback With VIVOTEK’s advanced AI security solution in place, the Imperial Museum now benefits from robust protection for its most prized artifacts and gained powerful tools for managing visitor flow. The unified VMS and AI-driven analytics provided more accurate monitoring, significantly reducing the risk of false alarms and improving operational efficiency. Claudio Leal, Head of Electronic Security at the Imperial Museum, commented: “Thanks to the partnership with VIVOTEK and ALCA NETWORK, we now have a modern, intelligent security system that not only protects our collections but also helps us better manage the flow of visitors. The real-time data and reports have been incredibly useful for operational planning, and we are more confident than ever in the safety of our artifacts”.
Interface Systems, a managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, announced that Nicker Management, a fast-food franchise operator in the Los Angeles area, has successfully implemented Interface’s Virtual Security Guard solution. By deploying Interface’s advanced security technology, Nicker Management has enhanced safety, reduced operational costs, and provided a secure environment for employees and customers. Nicker Management Nicker Management, led by sisters Nicole Harper Rawlins (CEO) and Kerri Harper-Howie (Co-owner), operates 24 fast-food restaurants across South LA, Compton, Lynwood, and Carson. Faced with persistent security challenges, including loitering, panhandling, and criminal activity, the company sought a modern, cost-effective solution to protect its employees and guests. Addressing critical security concerns Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants “We’re faced with lots of challenges with crime, unhoused people, and individuals suffering from mental and/or substance abuse issues,” said Harper Rawlins. “It creates significant risk at our restaurants. Over the years, we experimented with a range of security solutions, and hiring on-site guards quickly became costly and unsustainable.” After evaluating various options, Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants, ensuring a proactive and scalable approach to security. How can Virtual Guard Solution help? 24/7 Monitoring & Rapid Response – Trained intervention specialists continuously monitor restaurant locations to deter loitering, panhandling, and aggressive behavior in real time. Automated Voice-Downs – Proactive announcements throughout the day signal active monitoring and reinforce security presence. Virtual Tours – Scheduled and unscheduled remote video assessments help identify threats, suspicious activities, and compliance issues. Employee Security Escorts – Live monitoring ensures employees' safe passage to and from their vehicles during vulnerable times such as shift changes, and opening, and closing hours. Secure working environment “Knowing there’s a professionally trained security team on standby gives us confidence that we can maintain a secure working environment at all hours,” said Harper Rawlins. The deployment of Virtual Guard has streamlined security operations at Nicker Management’s restaurant, allowing staff to focus on providing excellent customer service without the burden of handling security incidents. 24/7 monitoring With 24/7 monitoring by Virtual Guard, employees and customers feel safer, and staff no longer have to handle security threats alone. In addition, automated alerts also remind employees of key procedures during shift changes. The system's effectiveness was demonstrated during a recent incident when a loiterer refused to leave the restaurant lobby. The staff triggered a silent alarm, and the Virtual Guard team immediately responded with a voice-down, prompting the individual to leave without further incident. Optimises costs “Interface’s Virtual Guard solution empowers franchise businesses like Nicker Management to address security risks effectively while optimising operational costs,” said Sean Foley, Chief Revenue Officer at Interface Systems. “Our innovative approach allows employees to focus on delivering excellent service, knowing their safety is in trusted hands.”
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organising a fast incident response. Camera-based detection Gradually introduced since the nineties, camera-based detection is well established. Both visual and thermal imaging cameras have proven to be a fail-proof solution for 24/7 automatic incident detection inside tunnels. With the latest camera technology upgrade of the Damsgård Tunnel in Bergen, Norway is premiering AI-enhanced dual-vision cameras as a new evolution in incident detection. Damsgård Tunnel technology upgrade In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement The Damsgård Tunnel is part of Norwegian National Road 555, which runs from Fjell to the city center of Bergen. The road tunnel opened in 1992 and has two tubes of around 2.3 kilometers in length, each carrying two lanes of traffic through the Damsgårdsfjellet mountain.In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement of ventilation systems, lighting, drainage, and camera technology. AI-enhanced dual-vision cameras Unique to this project is that, for the first time in Norway, AI-enhanced dual-vision cameras will be used. The traffic cameras from sensor specialist FLIR combine thermal and visual imaging technology in a ruggedised housing and rely on advanced deep learning algorithms that enable the camera to detect stopped vehicles, wrong-way drivers, queues, crossing pedestrians, and even smoke and fires in their early stages. Approximately 80 FLIR cameras are scheduled for installation in the second half of the year. The history of tunnel incident detection in Norway The Damsgård tunnel upgrade is another milestone in Norway’s long-standing efforts to secure the country’s vast number of tunnels. Due to Norway’s complex landscape, with fjords, mountains, and islands, road tunnels have always been a way to solve the region’s unique transportation challenges. Norway has embraced the use of automatic incident detection in its road tunnels ever since the technology came into being, with FLIR setting the pace of this evolution since the beginning. In 1995, FLIR cameras were already used in the 1,500-meter-long Ekeberg Tunnel near Oslo. FLIR automatic incident detection system In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems In August 1996, when a bus stopped and caught fire in that tunnel, the FLIR automatic incident detection system generated an alert to the tunnel operators, enabling them to close the tunnel entries and exits and activate warnings to oncoming motorists. In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems in tunnels continent-wide and since then the technology evolution has not stopped. Visual and thermal incident detection Initially, visual CCTV cameras were used to detect incidents. The technology enabled first response teams to be deployed minutes, even seconds after an incident or an irregularity (a fallen object, a pedestrian, a car slowing down) was detected. About ten years ago, FLIR introduced thermal incident detection cameras in tunnels. These cameras are established as critical assets that guarantee operators' accurate detection throughout the tunnel infrastructure. 24/7 traffic detection The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight can obstruct the view of visible-light cameras and therefore disturb traffic detection. Because thermal cameras detect heat, not light, they have no issues with these phenomena. As a result, thermal cameras can detect traffic 24/7 and in all weather conditions. Fire detection FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest One of the biggest advantages of thermal cameras in the field of tunnel safety is that they can effectively see through smoke. This makes them the ideal technology for tunnel safety operators or emergency response teams to find their way through a smoke-filled tunnel or for incident detection systems to spot issues in time. FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest and most reliable technology for fire detection inside road tunnels. The role of dual-vision cameras Both visual and thermal cameras have their merits. A visual camera may provide operators with more detail to assess the nature of an incident, while thermal cameras have proven to be unbeatable in detecting incidents in complete darkness and challenging weather conditions. Currently, both detection technologies can be combined into one system, hereby offering operators a more comprehensive view of the environment and improved accuracy compared to single-sensor systems. FLIR’s TrafiBot Dual AI camera is an example of such a combined system. ITS-Series Dual AID cameras In 2018, FLIR’s ITS-Series Dual AID cameras were installed at the entrance and exit of the Lyderhorn Tunnel near Bergen. In 2021, technology integrator Trafsys also installed 332 of FLIR’s dual-vision cameras in the Hundvåg and Eiganes tunnels, which are part of the extensive Ryfast project. The cameras’ fire detection functionality proved effective when a car fire occurred in the Hundvåg tunnel in July 2020; the FLIR ITS dual thermal AID camera detected the fire within 7 seconds of visible flames, following an initial alert for a stopped vehicle and pedestrians. Artificial Intelligence in incident detection AI algorithms embedded in the FLIR camera analyse captured images in real-time and full-resolution FLIR’s TrafiBot Dual AI, installed in the above-mentioned Damsgård Tunnel announces a new wave of incident detection cameras. The camera also combines a visual and a thermal camera in one unit, but what makes it stand out is the use of artificial intelligence and deep learning. AI algorithms embedded in the FLIR camera analyse captured images in real-time and full resolution. This latest addition to FLIR’s portfolio of AI cameras is setting a new standard for automatic incident detection in tunnels, generating extremely accurate traffic data, incident detection information, and live track data. Video image analysation Of course, analytics on traffic cameras are not new. Early cameras from decades ago already used some form of AI. So, what’s the difference with this new generation of AI cameras? Much has to do with how detection systems analyse video images. Early generations of smart cameras analysed the variation of gray levels in groups of pixels in successive video frames. Smart predictions When a vehicle enters a detection zone, the pixel value within that zone changes, and detection is activated. AI systems, however, look at the entire camera image and use object detection techniques to analyse the traffic scene. This results in much better presence detection, better classification of traffic users, and the ability to determine position, speed, and direction. These new AI systems can handle more complex traffic situations and they are much better at making smart predictions. Identification and classification of objects Computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked It’s not hard to see where this is coming from. Over the past decades, computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked as fuel for making AI better and more efficient. Instead of rule-based analytics—if x happens, then y—data-based systems are now in the lead. These systems can be trained on large datasets of images and learn how to identify and classify objects in an image. They use this knowledge to make decisions based on new images that they have never seen before. Benefits of AI-based detection systems AI-powered detection systems are much more accurate than their non-AI alternatives. For tunnel operators, this is a big deal. Nothing is a bigger nuisance for control room operators than having to pay attention to continuous unwanted alarms. AI can help filter out unwanted alarms by distinguishing between routine activity, weather phenomena, and actual incidents. High performance As an important aspect of their accuracy, AI-based systems are much more successful in detecting different vehicle classes. Detectors from FLIR will easily distinguish between a car and a van, or between a small and a large truck. It’s even possible to train a system to detect specific objects or incidents. And because cameras are so smart, installers nowadays are more flexible in installing their equipment. Even in less ideal camera positions, the detection performance of AI-based systems is high. Vehicle parameters Based on vehicle parameters such as speed and direction, they can easily see where a car is going FLIR’s AI detectors can also predict vehicle trajectories. Based on vehicle parameters such as speed and direction, they can easily see where a car is going, even if for part of that trajectory the view of that car is occluded by a passing truck. This makes detection much faster and more accurate. Operators can even be warned by so-called pre-alarms for cars that are slowing down and likely to cause a collision. Reduces human monitoring For traffic or security operators, AI offers many benefits. Since incidents can be detected much faster and with more accuracy, operators will be able to make better-informed decisions, especially in high-stress situations, and they will be able to deploy emergency teams more quickly. AI will also reduce the need for constant human monitoring, allowing operators to focus on other tasks.AI will benefit traffic planners too. Data collected from a camera can be analysed over time to identify trends, patterns, or areas with a higher potential for incidents. This can be valuable for proactive traffic planning, infrastructure improvements, or for overall risk management. Data as the cornerstone of AI performance AI-based detection systems will become the norm very swiftly. Since these systems depend on massive data sets, it’s easy to understand that the detection performance will soon be determined by the quality of the data it is trained with. High-performance systems will need a lot of data for training—in case video images of traffic—but not just any data that has been plucked from the internet will do. Challenges with publicly available datasets The problem with that approach is that, more often than not, publicly available datasets are limited Some camera manufacturers rely on publicly available datasets to train their AI systems. The problem with that approach is that, more often than not, these datasets are limited or of low quality. For example, internet data sets hardly have any thermal images, traffic images are mostly collected during sunny weather or friendly daytime conditions, and they are often taken from useless angles. FLIR model and prediction AI-based products from FLIR, on the other hand, are trained on datasets that have been collected in-house, over more than 30 years, with data samples that are relevant for practically any traffic scene you can think of. What’s more, FLIR’s datasets are continuously growing and with it the quality of its models and predictions. For FLIR, data is the true quality mark which stands for high-performance, accurate traffic detection. The future is AI Norway and FLIR share an interesting history of evolving incident detection technology. A lot has changed since the installation of the first FLIR automatic incident detection system in the Ekeberg tunnel in 1995. Currently, incident detection systems combine multiple sensors—visual and thermal—and, most importantly, they use AI, which enables them to improve their detection performance over time with every new video image they process. Artificial intelligence has a promising future in incident detection. Norwegian tunnels, and the average daily traffic of 40,000 vehicles in the Damsgård Tunnel, will only benefit from it.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Round table discussion
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
Products


White papers

Precision and intelligence: LiDAR's role in modern security ecosystems
Download
The top 4 reasons to upgrade physical security with the Cloud
Download
11 advantages of a combined system for access control and intrusion
Download
Optimise your business with analytics and AI
Download
How end-to-end video security solutions can help your organisation with social distancing
Download
Schooling the market on education security
Download
How to catch shoplifters with thermal imaging
Download
What Do I Need to Know to Successfully Deploy Mobile Access?
Download

Intrusion detection: Manufacturers & Suppliers
- Bosch Intrusion detection
- Dahua Technology Intrusion detection
- OPTEX Intrusion detection
- Hikvision Intrusion detection
- DSC Intrusion detection
- Climax Technology Intrusion detection
- Visonic Intrusion detection
- Honeywell Security Intrusion detection
- Vanderbilt Intrusion detection
- Senstar Intrusion detection
- Pyronix Intrusion detection
- NetworX Intrusion detection
- Verkada Intrusion detection
- RISCO Group Intrusion detection
- Texecom Intrusion detection
- Software House Intrusion detection
- Axis Communications Intrusion detection
- Ajax Intrusion detection
- Gallagher Intrusion detection
- Enforcer Intrusion detection