Intrusion detection
News
Award-winning global security manufacturer, Gallagher Security, has announced a strategic partnership with Chubb China, signaling growth and expansion in the region. The announcement came as part of the New Zealand-China Business Partnerships Ceremony in Guangzhou on November 7. Seven other New Zealand companies joined Gallagher to signal new cooperation agreements between the companies and their Chinese counterparts. Projects and product launches The event was attended by New Zealand’s Minister for Trade, Todd McClay, who had just concluded his visit to Shanghai, including participation in the China International Import Expo (CIIE). The agreements involve new projects and product launches across multiple industries, further strengthening New Zealand and China's economic and trade relationship. This new collaboration with Chubb China aims to promote Gallagher’s solutions, including access control systems, perimeter security, intrusion detection, and cybersecurity solutions, bringing high-quality, integrated security to Chinese consumers. Customer value David Thean says this partnership with Chubb is expected to deliver greater value to customers General Manager for Asia, David Thean says this partnership with Chubb is expected to deliver greater value to customers as Gallagher grows their presence in the region. "Security trends in China are different compared to other North Asian countries," explains David Thean. Customer-centric philosophy David Thean adds, "Our partnership with Chubb is an opportunity to be more strategic in how we position Gallagher’s solutions and collaborate with the local market." He continues, "Chubb has a strong on-the-ground knowledge of customers’ needs, and by combining that with Gallagher’s exceptional solutions and our customer-centric philosophy, I believe we can turn potential into real benefits for businesses in the region." Channel Partner Agreement As David Thean explains, the new Channel Partner Agreement with Chubb also deepens ties between businesses across the two countries. He states, "We’re very proud to have been part of the New Zealand-China Business Partnerships Ceremony and strengthen our economic relationship. Our team has maintained a strong partnership with Chubb in our New Zealand headquarters, and I’m excited to grow together in China moving forward."
iDenfy, a Lithuania-based identity verification and fraud prevention company announced the launch of its new AI-powered Data Crossmatch feature, enhancing the company’s KYB platform with an innovative approach for simplifying verification for corporate entities. This new feature strengthens iDenfy’s RegTech suite by allowing businesses to access data from a wide network of global sources easily while comparing it with internally stored KYB data, ultimately making the onboarding faster, more secure, and more transparent. AI-powered Data Crossmatch feature iDenfy’s new AI-powered Data Crossmatch feature is built to streamline due diligence procedures to provide businesses with faster, more secure client onboarding. This innovative tool can analyse data from a larger network of over 540 million global company records across 160 countries and has collected an internal database from credit bureaus and government registry platforms to make it a comprehensive solution for current complex business regulations, which require extensive documentation collection and verification, including certain rules that only apply for KYB, such as Ultimate Beneficial Owner (UBO) identification. Data Crossmatch tool Compliance teams to see what information is incorrect or missing to avoid potential errors, saving time As a result, the Data Crossmatch tool helps to automate the verification of UBOs by cross-referencing submitted information against the official records process, significantly reducing manual work. This efficiency helps compliance teams to see what information is incorrect or missing to avoid potential errors, saving both time and resources. AML checks Beyond this function, iDenfy’s cross-matching technology performs multi-layered Anti-Money Laundering (AML) checks on company records by gathering additional information from international government databases, including Europol, Financial Crime Enforcement Network, FBI, Interpol, SECO, and more. As regulatory requirements increase, accurate onboarding for both individuals and other companies becomes more essential than ever. Intuitive KYB process Domantas Ciulde, CEO of iDenfy, highlighted, “Ensuring accuracy in onboarding is essential, especially with growing regulatory demands on businesses to verify entities and avoid compliance risks." "With our Data Crossmatch, we aim to create a more intuitive KYB process, allowing businesses to verify their clients' data while minimising potential risks.” Data storage iDenfy’s tool stores all verification steps, timelines, and decisions securely for up to eight years This extra level of detail enhances security and enables businesses to spot red flags related to financial crime early in the process. To support regulatory audits and maintain secure records, iDenfy’s tool stores all verification steps, timelines, and decisions securely for up to eight years. This long-term data storage ensures that businesses stay audit-ready, reducing risks associated with non-compliance. Time-saving Domantas Ciulde highlighted the time-saving aspect of Data Crossmatch, which reduces due diligence time by up to 30%. “Data Crossmatch not only offers a faster verification process but also minimises operational costs by cutting down on time-consuming, error-prone manual checks." "This tool empowers companies to take proactive control over their compliance by providing fast, accurate information about business client's profiles.” Choosing configurable reports The Data Crossmatch feature allows users to choose even up to five different types of configurable reports Furthermore, the Data Crossmatch feature allows users to choose even up to five different types of configurable reports and adjust the requirement, adding optional questions that offer flexibility while comparing provided business information with the database to make sure the data matches. Domantas Ciulde added, “Data Crossmatch represents an essential advancement in KYB processes, equipping organisations with the insights they need to make secure, informed decisions in an increasingly complex regulatory landscape.” Robust solution It’s worth mentioning that iDenfy's Data Crossmatch tool offers a robust solution to the growing threat of cybercrime, particularly in preventing the submission of false documents to register any business illegally or perform malicious activities. By integrating Data Crossmatch, businesses can strengthen their security and proactively protect against current and emerging cyber threats.
Permiso, the pioneer in real-time identity security, has released a suite of three open-source tools that help security teams bolster their detection capabilities for a variety of different attacks. The P0 Labs team, the threat research arm of Permiso has launched a total of ten open-source tools to date, developed from their ongoing threat research and observations from real-world attacks. YetiHunter, CloudGrappler Earlier in 2024, Permiso launched YetiHunter, an open-source tool that detects indicators of compromise in Snowflake environments. They also released CloudGrappler which queries high-fidelity and single-event detections related to well-known threat actors in popular cloud environments such as AWS and Azure. Detection capabilities and rules A subset of these rules has been incorporated into a multitude of open-source projects Permiso, composed of former FireEye/Mandiant staff, has developed over 1,400 detection rules in their product as a result of their ongoing threat research. A subset of these rules has been incorporated into a multitude of open-source projects that allow security teams to uplevel their detection capabilities in a variety of different environments. Cloud detection “The learning curve for detection in the cloud is steep, and our goal is to help security teams bolster their detections across their cloud environments without having to purchase commercial software solutions like a SIEM,” said Permiso Co-Founder and Co-CEO, Jason Martin. He adds, “We are committed to providing resources that can help the broader security community defend against the TTPs of modern threat actors.” DetentionDodger DetentionDodger will list all the identities with a Quarantine Policy (version 1-3) and look for failed policy attachments In the suite of projects is DetentionDodger which finds identities with leaked credentials and their potential impact. DetentionDodger will list all the identities with a Quarantine Policy (version 1-3) and look for failed policy attachments of a Quarantine Policy in CloudTrail Logs to generate a list of users with leaked credentials. It also lists all the inline and attached policies of the user and each group it is part of to determine the impact based on privileges. BucketShield BucketShield is a monitoring and alerting system built for AWS S3 buckets and CloudTrail logs. It ensures the consistent flow of logs from AWS services into S3 buckets and mitigates potential misconfigurations that could interrupt log collection. With real-time tracking of IAM roles, KMS configurations, and S3 log flows, BucketShield ensures that every critical event is recorded, and your cloud remains audit-ready. CAPICHE Detection Framework CAPICHE Detection Framework is an open-source tool designed to simplify each step of the cloud API detection Finally, CAPICHE Detection Framework (Cloud API Conversion Helper Express) is an open-source tool designed to simplify each step of the cloud API detection translation pipeline. It enables any defender to instantly create a multitude of different detection rules from groupings of APIs, even if the complete API names are unknown. Bolstering defences “The collection of these three tools helps security teams immediately hone their detections and bolster their defences against a variety of cloud-based attacks,” said Principal Threat Researcher, Daniel Bohannon. He adds, “This isn’t just to help better defend against future attacks but addresses key attack vectors in their environments that could be indicative of past or present compromise.”
Sparsh CCTV, a pioneer in innovative security solutions, and Cron AI, a pioneer in deep learning-based 3D perception technology, are thrilled to announce a strategic partnership designed to redefine video surveillance, Intelligent Transportation Systems (ITS), and infrastructure automation. By integrating edge computing, LiDAR, 3D perception, and camera technologies, this collaboration aims to advance safety, efficiency, and automation in transportation hubs, smart cities, border security, mobile sensing, and critical infrastructure. Intelligent video surveillance Designed collaboratively in India and the UK and simulated in India, the key will serve markets Through this partnership, Cron AI’s senseEDGE technology will be integrated into Sparsh’s cutting-edge CCTV systems. This advanced solution will enable real-time tracking, object detection, velocity measurement, and classification, resulting in an adaptable, intelligent video surveillance system suited for dynamic environments. Designed collaboratively in India and the UK and manufactured in India, the solution will serve both Indian and global markets. ITS and infrastructure automation Extending beyond conventional security applications, the partnership focuses on innovative solutions for ITS and infrastructure automation. This technology will enable enhanced flow management at high-traffic venues like airports, railway stations, and parking lots, improve safety and efficiency in smart cities, and strengthen monitoring capabilities in critical infrastructure. Unique features like people detection, flow management, intrusion detection, and border security will support complex environments where precise movement management and crowd density insights are critical. Here’s how LiDAR, camera and 3D perception will come together. Revolutionising Industries with Combined Camera, LiDAR, and 3D Perception Technologies Smart City Traffic Flow and Safety: By combining camera, LiDAR, and 3D perception, this solution provides precise, real-time data on traffic patterns, vehicle and pedestrian movement, and potential safety risks. For example, the integration can detect jaywalking or sudden vehicle stops, enabling city systems to respond instantly and improve traffic light coordination, optimise traffic flow, and enhance pedestrian safety. This fusion of technologies supports proactive interventions and incident prevention in bustling urban environments. Advanced Roadway Hazard Detection for Autonomous Vehicles: Cameras and LiDAR with 3D perception enable autonomous systems to classify objects accurately, recognise obstacles, and assess road conditions. This setup is particularly valuable for autonomous vehicles navigating complex environments where they may encounter unexpected obstacles or adverse weather conditions. Real-time data from this integrated system can improve decision-making and response times, ensuring safe navigation through dense urban streets or highways. Critical Infrastructure Surveillance and Security: In sensitive areas like power plants, airports, or government facilities, integrating high-performance cameras, LiDAR, and 3D perception allows for highly accurate monitoring and threat detection. The system can detect intrusions, identify objects, and differentiate between authorised personnel and potential threats. For example, it could trigger alerts upon recognising unauthorised vehicles or persons approaching restricted zones, while ignoring routine authorised activity. Automated Warehouse and Industrial Safety: Combining cameras, LiDAR, and 3D perception in warehouses and industrial facilities provides precise object tracking and spatial awareness, improving both safety and productivity. The system can monitor for obstructions in high-traffic areas, detect human presence in machinery zones, and prevent accidents by pausing equipment when people are nearby. This setup offers real-time spatial intelligence, allowing companies to safeguard workers and automate processes efficiently. Urban Infrastructure and Public Space Management: By integrating these technologies, cities can gain a detailed understanding of how public spaces are used, identifying crowded areas, traffic bottlenecks, or improperly parked vehicles. The system can monitor and analyse usage patterns across parks, public squares, and streets, delivering insights to optimise space, manage flow, and enhance the safety and usability of shared urban areas. Vision for LiDAR, camera, and 3D perception integration “At Sparsh CCTV, we have always championed solutions that surpass traditional boundaries,” said Sanjeev Sehgal, Managing Director of Sparsh CCTV. “Our partnership with Cron AI blends state-of-the-art technology with deep expertise in video surveillance and 3D perception, creating products that will set new standards in intelligent transport systems, infrastructure automation, and security solutions." "This launch propels us toward our mission of making India a global pioneer in technology-driven security. As ITS gains momentum worldwide, our collaboration offers transformative advancements for smart cities, secure infrastructure, and traffic management, with 3D perception and edge AI enabling real-time analysis and faster, more informed decision-making.” Cron AI’s 3D perception “We are immensely excited to partner with Sparsh CCTV on this journey,” shared Tushar Chhabra, CEO of Cron AI. “Cron AI’s 3D perception technology adds an entirely new dimension to safety and automation, providing unmatched accuracy and efficiency in detecting, analysing, and responding to real-world scenarios." "With deep learning, edge computing, and LiDAR at its core, this collaboration marks a significant milestone for industries globally.” Traffic Infra India 2024 Sparsh CCTV and Cron AI introduced this breakthrough technology at Traffic Infra India 2024 and followed with an exclusive demonstration event at the India Habitat Centre, attended by India’s pioneering system integrators.
Expert commentary
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialogue and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organisation so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organisation. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of the machine and deep learning algorithms to recognise or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the colour of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours Analytics, on the other hand, refers to the process of analysing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behaviour. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognise. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behaviour information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilised. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organisation. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realise that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the colour of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognise something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognise unique, customisable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organisation might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognise that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Acre is a company built on mergers and acquisitions (M&A). Since its founding in 2012, Acre acquired several familiar access control companies, from Vanderbilt to RS2 Technologies, Open Options to Feenics, and several others. Acre itself was acquired in 2021 by UK-based private equity firm Triton, thus launching a new chapter in the company's history. Don Joos was named the new CEO in 2022 and set about transforming Acre from a collection of acquired companies into a coherent whole (representing various brands). A year later, we recently caught up with Don Joos to discuss the "new Acre" and what's ahead. Q: How does your background inform your approach to leading Acre Security? In physical security, there is a shift to more of a software-centric versus hardware approach Joos: This is my fourth company as CEO. What I’ve found along the way is that no matter the size or type of business, there’s a common theme, the business is going through some form of evolution or transformation because the industry they're in is going through an evolution. And today, in physical security, there is a shift to more of a software-centric versus hardware approach, and there’s a shift occurring that’s pulling us to the cloud. I think a key thing here is that while the industry is evolving, we must keep a careful eye on the evolution of the customer because the customer is the one who will dictate the pace of change, and I think that is what a lot of people sometimes lose sight of. Q: It seems Acre is on the path from being a “collection of small companies” to “a collection of brands within a single company.” Joos: I think most people think of Acre as a federation of companies. Acre Security was seen more as a holding company. For me, I think the biggest misconception is just that: “This is just a federation of companies” versus “This is a business.” Acre Security is a business that has a range of portfolios to address key verticals and pivotal business problems for customers. Because of what’s happening now and the market dynamics that are occurring, it ties back to “Who is Acre Security?” We have a clear answer as to where we want to be from cloud access control versus on-premise access control. We have clear answers regarding market segments, visitor management, and intrusion. When you think about it, those are the core areas of our business. Q: What has surprised you the most in your first year or so at Acre? Joos: I think the thing that surprised me the most was how similar the problems are because I was coming into a new industry. It’s surprising how strong a correlation [security has] to other industry transformations that I’ve been a part of. Q: What are the points of differentiation among the various Acre Security brands? Joos: I think if you go back to the history of the company, it was designed to compete. That is, that's how it was set up under the logic of, “If we have three bids in a deal, it increases the odds that we're going to win one of them.” As we evolve, to have sustained scalable growth, it is not just about going shallow and casting a wide net. It’s about creating a concentrated focus. Some of the technology is just inherently older technology. And so for me, it’s about creating migration paths for the customers to move to more modern technology, such as the cloud. I love our installed base. When you think about the cost of acquisition to get a new cloud customer, it costs a lot less when you have an installed base that you can migrate to the more modern solution versus having to spend the money and the sales energy to hunt for that next opportunity. Q: Where has Acre positioned itself in the marketplace? We can take care of your current needs, but we also have a clear migration path to take care of your future needs Joos: If you're ready to go to the cloud, we have an answer for you. If you're not ready to go to the cloud, but you're ready to take more cloud-based applications to continue to evolve, we have an answer for you. If you're not quite ready yet and you're still looking for a market-leading premises solution, we have an answer for you, and we have a migration path when you're ready down the road. So, you have a safe bet with Acre because we can take care of your current needs, but we also have a clear migration path to take care of your future needs. Q: How are you building up your team? Joos: In 2023, we’re getting a lot of core building blocks in place and making investments in people who have experience in this space or aligned industries. It is a balance. I think we need a group that understands the industry and a group that's going to come into it and challenge why we do things the way we do. I think that makes us unique: we have fresh eyes looking at things from a different perspective. With that, you’re naturally going to end up with a better answer to problems because people are comfortable challenging the status quo. Q: How are you seeking to expand your dealer channel and/or transition it from the various dealers “inherited” in previous acquisitions? Joos: The channel invests in Acre Security. Our success is their success, and so what we're proposing to them is a range of solutions that supports their longevity and their financial success. But we also continue to build out our portfolio through organic technology innovation or M&A. We're continuing to make investments in our channel strategy and how our partners interact with us We're continuing to expand their addressable market if they want to make investments with us. We're continuing to make investments in our channel strategy and how our partners interact with us. The design of our upcoming technology right now is built with the channel in mind. We want to ensure that we are not creating any channel conflict or any perceived channel conflict. I think that's usually the worst kind: when it's perceived but not real. You need to be very upfront and clear with communications. Q: What is the biggest challenge in the industry right now? Joos: Companies and customers are looking to embed security into their workflows. What I mean is these are not just standalone solutions anymore. They’re integrating with enterprise resource planning (ERP) and human resource (HR) software systems. In property management, they want it integrated into the fitness center, they want it integrated into the cafeteria areas and the dry cleaners, and so forth. So, this is about an ecosystem, and there are times when we are going to be the core, and there is going to be a lot of technology that is adjacent to us. There are times when we are the adjacency to someone else's core in a smart city or a smart building. This gets to why having an open application programming interface (API) is going to be an important part of the technology evolution. It cannot be a closed environment anymore; that is part of the past. Q: What’s next for Acre? We're constantly evolving our cloud access control as well as our on-premise access control Joos: There is a lot of work going on with integrating the business into a single Acre Security company. This is an investment year for us, we are adding people to our team. We are making a lot of investments from a systems and technology perspective. We have a lot of work right now going into integrating the business from an IT infrastructure perspective and all the tools that we use from an employee perspective. We are making a lot of investment as it relates to the commercial side. You're going to see some next-gen technology coming out from an intrusion perspective. We're constantly evolving our cloud access control as well as our on-premise access control. We're also bringing software applications, too. Q: What is Acre’s “message” going forward? Joos: One of the takeaways for me is this is not the Acre of the past. We are making some bold changes. New things are happening here; you better pay attention because clearly, something is different. I think that's one. I think the second is that as they spend time within us, they're going to realize the wide range of solutions and use cases that we can address, whether you're in access control or cloud, whether you're in intrusion, whether you are in visitor management, or whether you're looking at some network connectivity solutions. The third thing that I think people are going to see is a whole lot of energy as they talk to our people and the passion that you see from the team. If I wrap those three points up in one kind of statement there, I think my goal is that people walk away saying “Something is going on at Acre Security. We better pay attention.”
Case studies
For years, the Civil Police of the State of São Paulo, Brazil’s largest state police force faced significant challenges with criminal bookings and identification, including: A Fragmented Identity System - Each of Brazil’s 27 states has its own siloed programme that does not interconnect. This not only hinders statewide criminal booking but also undermines the community’s confidence in the criminal justice system. Identity Fraud With Multiple IDs - Imagine having 43 identities. This was the case for one unlawful Brazilian. The prevalence of identity fraud is extremely high across the country. If a person wants to hide their identity, it’s common for them to simply move to another state and set up a new profile. Manual Ink-and-Paper Fingerprinting Techniques - Many law enforcement departments across Brazil administered manual fingerprinting techniques, resulting in inaccuracies and low matching rates. Slow, Inefficient Criminal Booking Processes - Inefficiency was another setback for justice. It took numerous steps to confirm one’s identity and, on average, a whole workweek to get matching results returned. Biometric National ID Compliance - The civil police must modernise systems to comply with the Brazilian government’s mandates for all citizens to tie biometrics to their IDs. The Civil Police of the State of São Paulo needed a more reliable and efficient solution to break down identification silos and put the agency on the path toward a unified, national system rooted in the power of biometrics. HID's solution The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks Working through HID’s partner, Golden Distribuidora, one of Brazil’s largest distributors of IT products, the Civil Police of the State of São Paulo selected a comprehensive biometrics-based identification system called BioKit, featuring HID’s ten-print scanner. The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks and identity validation programmes. It is also certified for FBI Appendix F (FAP 60) and offers an economical approach to fingerprint acquisition without sacrificing image quality. Automated Biometric Identification System The criminal booking process at São Paulo civil police stations is simplified and can be accomplished in minutes not days. First, agents use HID’s ten-print scanner to capture fingerprints and determine if the individual has a biometric file on record. The fingerprint images are compared against the state-run Automated Biometric Identification System (ABIS). If there is a match, the civil police move forward with their investigation. If there is no match, the officer then creates a new biographic/biometric profile for the individual in question and enrolls them into the ABIS. HID ten-print scanner HID ten-print scanners deliver superior performance and reliability at a competitive price point. Key advantages include: High-Quality Tenprint Capture - The scanner is FBI Appendix F (FAP 60) certified and can quickly capture high-resolution rolled and flat fingerprints. Ease of Use - User-friendly pictographs and LED indicators simplify the process for operators. Automatic Capture - Patented “Auto-Capture” offers fast and error-free image capture. Difficult Fingerprint Capability - An optional silicone membrane improves image quality for dry or damaged skin ensuring consistent results. ABIS Integration - The scanner seamlessly integrates with Brazil’s Automated Biometric Identification System (ABIS) to enable quick and accurate background checks. Results delivered Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking process and improves matching accuracy for the State of São Paulo Civil Police. “Working with criminals can be difficult and dangerous, and the HID ten-print scanners help us identify and book criminals quickly and simply,” said Dr. Luiz Ortiz, Chief Delegate, Civil Police of the State of São Paulo. Easy to use Dr. Luiz Ortiz adds, “The HID ten-print scanner is easy to use and provides clear direction through pictographs, which is a big differentiator from other offerings.” To date, the BioKit system with HID’s print scanners is deployed in 500 civil police stations throughout São Paulo. This system has transformed criminal booking and identification processes, resulting in an increase in solved criminal cases and a steep reduction in identity fraud. HID fingerprint technology “What used to take 4 to 5 days is now done in minutes using the BioKit system and HID fingerprint technology,” said Dr. Ortiz. Dr. Ortiz adds, “Our agents can accurately identify or onboard suspects, and each new biometric enrollment into the centralised ABIS contributes to strengthening our country’s overall identity system and ability to bring about justice faster and smarter.” Biometric enrollment and verification “Each individual the Civil Police of the State of São Paulo onboards ties to a single set of fingerprints that verifies their true identity,” said Danilo Fernandes, Business Development Manager at Golden Distribuidora. Danilo Fernandes adds, “Utilising biometric enrollment and verification, our nation has the potential to streamline millions of records, while preventing countless cases of fraud. This establishes a fierce force to fight fraud here in Brazil.” A simple, fast, and trusted experience Additional use cases for the BioKit + HID ten-print scanner, beyond criminal bookings, include border control, background checks, correctional centres, courtrooms, voter registration, and national ID programmes. The team at Golden Distribuidora expects to continue distributing these biometric systems throughout the country to support Brazil in combating fraud and making biometric enrollment and identification a simple, fast, and trusted experience for all citizens and stakeholders.
In response to the growing demand for enhanced security at renewable energy sites, Jacksons Fencing has recently completed the installation of 443 meters of EuroGuard® Flatform twin wire mesh fencing at a battery storage facility in the UK. As the UK accelerates its shift towards a sustainable energy grid, securing battery energy storage systems (BESS) is essential for ensuring energy security. This project represents a crucial step in protecting the infrastructure needed for a renewable future. Addressing the demand BESS plays a pivotal role in the UK’s renewable energy strategy by storing excess energy generated from wind and solar sources to balance supply and demand. As these facilities become more common, they face a heightened risk of theft, vandalism, and operational disruptions, making robust security solutions essential. Jackson Fencing delivered a tailored security solution, combining cost efficiency, scalability, and high-level protection. Tailored security solutions for a critical site The security needs of the battery storage facility included preventing unauthorised access, deterring vandalism, maintaining high visibility for security patrols and surveillance, accommodating future expansions cost-effectively, and facilitating smooth delivery and maintenance of large battery units. Jacksons Fencing addressed these needs by installing its EuroGuard® Flatform twin wire mesh fencing system around the site’s perimeter. This solution provides advanced security features with clear sightlines, ensuring effective monitoring while maintaining a budget-friendly approach. The unobtrusive design also preserves the surrounding rural landscape, contributing to a positive work environment. Vandal-resistant and anti-theft design EuroGuard® Flatform prevents breaches and fence panel theft, leading to gaps in the perimeter The EuroGuard® Flatform system’s twin wire mesh panels incorporate anti-tamper fixings placed on the secure side of the fence, ensuring the installation is highly resistant to vandalism and tampering. This feature is crucial for protecting the sensitive and valuable battery storage equipment housed on-site. By keeping the carefully designed fixings out of reach, EuroGuard® Flatform prevents breaches and fence panel theft, leading to gaps in the perimeter. With a 25-year guarantee, the fence provides comprehensive long-term protection for this vital infrastructure. High visibility and safety The mesh design of the EuroGuard® Flatform system allows high visibility for security personnel and surveillance systems, facilitating the early detection of potential threats. This high-visibility design also ensures that the fence blends into the rural landscape, preserving countryside views and fostering a pleasant environment for workers. Cost, space efficiency, and scalability For large-scale energy storage facilities, cost efficiency is a critical consideration. EuroGuard® Flatform system provides a secure yet budget-friendly solution without compromising on quality. Its modular design allows for easy scalability, enabling the facility to expand its security perimeter as it grows. By using a mesh clip installation system, the fencing can be extended to accommodate additional battery units while maintaining a high level of security. To further enhance operational efficiency, Jacksons Fencing installed a 6-meter wide mesh gate to streamline battery unit deliveries, reducing access points and enhancing security. Perimeter Intrusion Detection System (PIDS) PIDS ensures that any intrusion attempts are swiftly identified and addressed, even in isolated areas Given the facility’s remote location, Jacksons Fencing also integrated a Microphonic Perimeter Intrusion Detection System (PIDS) into the fence. This system is designed to detect any attempts to cut or breach the fence, providing an additional layer of security. The PIDS ensures that any intrusion attempts are swiftly identified and addressed, even in isolated areas. High-quality, scalable security solutions Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success, "Securing energy storage is crucial as the UK aims for a sustainable future, especially to double onshore wind to 30GW by 2030." "Installing EuroGuard® Flatform fencing at this battery storage facility shows our commitment to delivering high-quality, scalable security solutions that protect vital assets and support the UK's energy stability."
Established in May 1999, this state-owned electric power transmission company operates under the Gujarat Electricity Industry Act, of 2003. It ensures a reliable power supply across Gujarat through an extensive network of high-voltage transmission lines and substations. Emphasising advanced technologies and innovative practices enhances grid stability and performance. With a focus on sustainable development and renewable energy integration, it supports Gujarat's economic growth by providing a resilient power transmission framework, playing a crucial role in the state's energy landscape. Business scenario The absence of a video surveillance monitoring system presented significant security challenges for the power transmission company. With over 60,000 km of transmission lines and 500 substations, the lack of continuous monitoring and recording left the infrastructure vulnerable to theft, equipment tampering, and unauthorised access. Manual inspections were time-consuming and insufficient for real-time threat detection, leading to frequent operational disruptions and increased maintenance costs. Without a proper video surveillance monitoring system, the ability to respond swiftly to emergencies was compromised, jeopardising the safety of the state's power transmission network. Challenges faced The power plants and substations in the power transmission company had critical infrastructure components that were vulnerable to security threats like vandalism, tampering, and theft. Susceptibility to EMI/EMC Issues They needed a video surveillance monitoring system that could comply with EMI/EMC standards Operations in the power plant are susceptible to Electromagnetic interference (EMI) and Electromagnetic Compatibility (EMC) issues, which can pose safety risks. They needed a video surveillance monitoring system that could comply with EMI/EMC standards to ensure reliable operation. Harsh Environmental Conditions Being in remote areas, power plants and substations often face harsh weather conditions, necessitating weatherproof network cameras to ensure continuous and reliable surveillance. Workplace Safety and Occupational Health The impact of workplace accidents, injuries, and occupational illnesses on employee health, productivity, and morale was significant due to inadequate surveillance coverage. They needed a video surveillance monitoring system with incident reporting capabilities to enhance workplace safety, prevent accidents, and ensure compliance with occupational health and safety regulations. Data Protection Compliance They required a video surveillance monitoring system that could comply with data protection regulations governing the collection, storage, and sharing of surveillance footage to safeguard sensitive information and ensure regulatory compliance. Inefficient Manual Inspections Relying solely on manual inspections for monitoring proved inefficient and prone to oversight Relying solely on manual inspections for monitoring proved inefficient and prone to oversight. This delay in identifying issues led to extended downtime and potentially escalating problems, compromising overall operational efficiency. Slower Emergency Response In the event of an emergency, such as equipment failure or natural disaster, the lack of real-time surveillance delayed response times, increasing the risk of prolonged outages and damage, which could have been mitigated with a more responsive video surveillance monitoring system. Matrix solution To enhance security across 500 substations, Matrix Network Cameras and Network Video Recorders (NVRs) were strategically deployed to ensure comprehensive surveillance. Each substation was equipped with a Matrix 2MP PTZ Camera, strategically positioned to detect threats from a distance. These cameras provided enhanced perimeter security by offering high-resolution zoom capabilities and 360-degree coverage, allowing for the identification and tracking of potential intruders. Bullet Network Cameras Three to four Bullet Network Cameras were installed both inside the substations and around the periphery. These cameras ensured thorough surveillance coverage by capturing high-definition video of key areas, including entrances, exits, and critical infrastructure components. NVRs The NVRs were connected to TV screens in the control rooms, enabling security personnel to monitor live feeds Each substation was equipped with an NVR to record and store the feeds from the network cameras. These NVRs were configured to provide continuous recording, ensuring that all activities were documented. The NVRs were connected to TV screens in the control rooms, enabling security personnel to monitor live feeds and review recorded footage. Security personnel could access and review recordings locally on individual stations using the device client installed on the NVR. This allowed for quick retrieval of footage in case of incidents or investigations. Video surveillance monitoring system The video surveillance monitoring system was enhanced with basic Intelligent Video Analytics features, such as tripwire detection, motion detection, and intrusion detection. These features automatically analyse video feeds to identify and alert suspicious activities. Video pop-up notifications were configured to alert security personnel in real time. When an IVA event was triggered, such as an unauthorised entry or unusual movement, a notification would appear on the monitoring screens, prompting immediate attention and response. Products offered SATATYA PZCR20ML33CWP P2 (36 Nos.) 2MP IP PTZ Camera with 33x Zoom SATATYA CIBR20FL36CWS P2 (2682 Nos.) 2MP IR Bullet Fixed 3.6mm Lens SATATYA NVR1602X P2 (33 Nos.) 16 Channel NVR with 2 SATA Ports SATATYA NVR0801X P2 (487 Nos.) 8 Channel NVR with 1 SATA Port Benefits Matrix Network Cameras adhere to OWASP ASVS 4.0 L2 data protection norms Continuous 24/7 surveillance with Matrix Network Cameras and NVRs reduced risks of theft, tampering, and vandalism. Real-time alerts and video pop-up notifications ensured prompt response to potential threats. Matrix video surveillance monitoring system complies with EMI/EMC standards, ensuring safe and reliable operations in power plants. Matrix Network Cameras adhere to OWASP ASVS 4.0 L2 data protection norms, safeguarding sensitive information and ensuring legal compliance. Adaptive Streaming and SATATYA SIGHT Matrix Network Cameras have an Adaptive Streaming feature. This allows recording at a higher bitrate during activity periods and a lower bitrate during no-activity periods. This aided in saving on storage space. Matrix NVRs have the mobile app - SATATYA SIGHT, which allows users to monitor network cameras from any location, at any time.
The perimeter of a small and medium-sized business (SMB) property is its first line of defence against intruders. It keeps the premises away from theft, property loss and security incidents. Having said that, traditional methods of surveillance cannot fully catch up with the round-the-clock monitoring requirement of the scenario and unable to dispatch security personnel in time to handle abnormal situations, especially during night time. Backtracking to locate the cause of the event is deemed too difficult due to the lack of visual evidence. Dahua’s AI solution To address these challenges, Dahua Technology developed an AI Perimeter Protection Solution that can realise 24/7 perimeter protection, enabling accurate detection of intrusion events, active deterrence, and notification of security personnel in time when an intrusion is detected. It also provides a clear video recording of the incident that can serve as valid evidence in case of further investigation. In terms of benefits, Dahua’s AI Perimeter Protection Solution has a variety of options tailored to the actual needs of customers based on their application scenarios: Basic: This option offers a 15-meter perimeter protection coverage and round-the-clock video recording of evidence. Advanced (TiOC): With Dahua’s Three-in-One Camera (TiOC), this option also offers a 15-meter perimeter protection coverage, combined with accurate AI-powered detection of intrusion, focusing on real threats in the monitored scene. It can perform real-time processing of events using active deterrence and provide instant notification through the DMSS app for quick response to prevent any loss. What’s more, a clear video recording of intrusion evidence is also available in case of an investigation. Advanced (Thermal + Visual Dual Lens): This particular option offers a longer perimeter protection coverage of 50 metres. It provides precise intrusion detection powered by AI, with instant notifications via the DMSS app to enable security personnel to respond in time when an intrusion is detected. For evidence, clear video footages can also be retrieved, thanks to the intelligent camera equipped with thermal and visual dual lens. Dahua’s AI Perimeter Protection Solution Topology AI-powered security solution Overall, Dahua’s AI Perimeter Protection Solution is a complete AI-powered security solution that offers 24/7 accurate detection, timely processing of intrusion events, and clear intrusion evidence in case of a security breach, making it suitable for a wide range of SMB scenarios such as factory, apartment complex, construction site, school, hotel, and more.
Round table discussion
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
Products
White papers
Precision and intelligence: LiDAR's role in modern security ecosystems
DownloadThe top 4 reasons to upgrade physical security with the Cloud
Download11 advantages of a combined system for access control and intrusion
DownloadOptimise your business with analytics and AI
DownloadHow end-to-end video security solutions can help your organisation with social distancing
DownloadSchooling the market on education security
DownloadHow to catch shoplifters with thermal imaging
DownloadWhat Do I Need to Know to Successfully Deploy Mobile Access?
DownloadIntrusion detection: Manufacturers & Suppliers
- Bosch Intrusion detection
- OPTEX Intrusion detection
- Hikvision Intrusion detection
- DSC Intrusion detection
- Climax Technology Intrusion detection
- Dahua Technology Intrusion detection
- Visonic Intrusion detection
- Honeywell Security Intrusion detection
- Vanderbilt Intrusion detection
- Senstar Intrusion detection
- Pyronix Intrusion detection
- NetworX Intrusion detection
- Verkada Intrusion detection
- RISCO Group Intrusion detection
- Texecom Intrusion detection
- Software House Intrusion detection
- Axis Communications Intrusion detection
- Ajax Intrusion detection
- Gallagher Intrusion detection
- Enforcer Intrusion detection