Intrusion detection
News
Integrated Access Control and Security manufacturer - TDSi announces it will be joining forces with fellow Vitaprotech Group companies - Harper Chalice, PRYSM, and Hirsch for its forthcoming appearance at Intersec 2025, which takes place from 14th – 16th January in Dubai, UAE. The combined stand, S3 B32, will offer visitors a comprehensive insight into the best access control, perimeter intrusion detection, and intelligent monitoring solutions. Secure access control Thibaut Galland, Vitaprotech Group’s Chief Operating Officer (COO) for the UK commented, "TDSi has been a fixture at Intersec in Dubai for many years, showcasing the best in secure access control with a well-deserved reputation for technical excellence and outstanding service." He adds, "With our group members working in close collaboration to deliver the best-integrated security solutions on the market, this event is the ideal opportunity for visitors to meet the Harper Chalice, PRYSM, and Hirsch teams, who will be providing expert assistance and advice on specific security requirements and projects, all in one place." GARDiS v3.0 GARDiS is perfect for any secure access control application, including ACaaS and easily adapting access control TDSi will be discussing the latest and largest upgrade to its GARDiS Software platform, GARDiS v3.0, and giving visitors to Intersec the first preview of its extensively expanded features list. The company will also be on hand to talk about its extensive range of GARDiS hardware, which delivers a highly scalable browser-based solution that utilises browser-based software for ease of installation and use. GARDiS is perfect for any secure access control application, including Access Control as a Service (ACaaS), and easily adapting access control to the security needs of a rapidly evolving world. TriSecure solution, AppVision™ Hypervision platform Meanwhile, Harper Chalice is set to showcase its products, including the NPSA (CPNI) approved TriSecure solution, which combines FenceSecure PIDS and PulseSecure electric fence, along with the NPSA (CPNI) approved HatchSecure detection system. PRYSM will present its AppVision™ Hypervision platform, designed for security, safety, and technical management systems. Open, scalable, and neutral, it ensures the integration and management of equipment and applications within a single interface, no matter the project’s size or complexity. ScrambleFactor SF.3 Reader Hirsch’s solutions are designed for the most secure facilities and span physical access control New Vitaprotech members Hirsch will showcase its range of Secure Access Control Units and Readers, including the award-winning ScrambleFactor SF.3 Reader. Hirsch’s solutions are designed for the most secure facilities and span physical access control, video intelligence, and identity and smart card reader solutions. Intersec 2025 Intersec 2025 follows on from the event’s celebration of 25 years of success in 2024, where it attracted over 47,000 trade buyers from 141 countries, drawing in visitors from the Middle East and well beyond to see the latest and best in security solutions. TDSi, Harper Chalice, PRYSM, and Hirsch will appear at Intersec 2025, on Stand S3 B32, at the Dubai World Trade Centre from 14th – 16th January 2025.
Synectics, a pioneer in advanced security and surveillance systems, has launched ‘Synergy DETECT’, part of Synergy’s AI suite, that allows users to select and activate up to 12 AI-driven tools depending on their safety, security, or service-related needs. Safety protocol enforcement PPE Detection is just one of many safety-orientated tools included. It automatically generates alerts when workers appear in the frame without protective helmets or high-visibility vests. Users can also activate the Hazardous Area tool to receive alerts whenever people or vehicles enter zones designated as dangerous, for example, rail tracks or areas immediately surrounding potentially hazardous equipment or substances. A Fall Detection tool supports improved accident detection, generating alarms if a worker slips or falls to the ground. Stopped Object detection is ideal for flagging when a decelerating or stopped vehicle or person poses a safety risk – for example, if a car is blocking an entrance/exit or is a danger to other traffic. Rapid detection of potential security risks Synergy DETECT features tools for identifying security risks to better protect the public and personnel Synergy DETECT also features tools for identifying security risks to better protect the public, personnel, and physical assets. Automated Crowd Detection, for example, can alert operators when the number of people in a set zone exceeds a predefined threshold. This could indicate that an incident is taking place, causing a crowd to gather, or that additional services, such as in a retail or transport environment, are required to ease heavy footfall or satisfy the high demand. High-security zones Another useful tool is Intrusion Detection, which uses detectors with long-range accuracy to identify and classify people or ground vehicles accessing a restricted area – from staff car parks and high-security zones to restricted access and backstage areas at stadiums. Loitering Detection is another valuable tool. It is especially useful for monitoring areas where regular comings and goings by people and vehicles are common. This can flag suspicious behaviour based on lingering for time periods outside the norm. Vehicle and traffic flow monitoring Synergy DETECT makes it simple to detect, count, classify, and track the movements of vehicles Synergy DETECT makes it simple to detect, count, classify, and track the movements of vehicles – including cars, buses, trucks and bicycles. Multi-Object Detection and Multi-Object Counting ensure operators are alerted to vehicles in the wrong place or at the wrong time. A Wrong Direction tool is available for monitoring vehicles moving against an area's typical direction of travel, perhaps indicating a fleeing suspect or drunk driver. The Traffic Counting tool can also monitor incoming and outgoing traffic for a specific zone. This is useful for alerting operators about parking capacity levels or checking that all vehicles have left the premises as part of security checks and emergency drills. Alternatively, Zone Crossing can be used when only incoming vehicles need to be monitored. Easy set-up, filters, and flexible camera compatibility Activating Synergy DETECT is simple. Once the hardware is installed, users can connect any of the cameras in their network, including fixed, PTZ and thermal models. The tools can be tailored to suit specific operational needs and re-configured depending on evolving requirements. Settings include zone size, time period, sensitivity, and alarm frequency thresholds. Dan Noble, Head of Product Strategy – Synergy, said, “AI truly does have the power to supercharge surveillance-based risk detection, but only if the AI tools themselves are easy and intuitive to use. Synergy DETECT meets this important requirement, putting powerful capabilities at the fingertips of busy surveillance teams in a way that is completely tailored to an organisation’s exact needs.”
IDEMIA Public Security North America, a pioneer in identity security and authentication services, and CertiPath, an innovator and pioneer in high-assurance identity, credential, and access management services for highly regulated environments, have announced their collaboration to integrate IDEMIA’s digital identity solutions with CertiPath’s TrustVisitor solution to improve identify verification and prevent identity fraud. With the ever-present threat of cyberattacks aimed at governmental operations, implementing systems that ensure only authorised individuals can access sensitive information and facilities is critical, as well as providing a means to pre-screen visitors for potential risks. Visitor management solution CertiPath’s TrustVisitor is a web-based visitor management solution designed for federal agencies utilising high-assurance credentials for physical access, ensuring they are FICAM compliant, which significantly elevates the level of their security. CertiPath’s TrustVisitor provides both a workflow that expedites the visitor process and the security of knowing the “who, when, where, and why” of secure credentials. IDEMIA’s ID&V solution provides a robust platform to support identity proofing and credential verification IDEMIA’s ID&V solution provides a robust platform to support identity proofing and credential verification, which will be leveraged by CertiPath to confirm individuals are who they say they are and prevent identity-related fraud. Users of TrustVisitor can utilise this next-generation technology to verify individuals and visitors for high assurance facilities and environments, such as federal buildings and premises, critical infrastructures, military bases, and more. High assurance facilities “Existing ID Document capture methods represent too much friction and undermine an otherwise easy process.” “Integrating with both IDEMIA’s IAL2 identity proofing service and their mDL verification capability allows us to upgrade our visitor identity confidence before they arrive without sacrificing visitor user experience. Furthermore, mobile driver’s licenses provide an even stronger assurance of identity than physical driver’s licenses and that is the business TrustVisitor is in,” said Jeff Nigriny, CertiPath’s Founder and CEO. Providing highest security standards IDEMIA’s ID&V technology incorporates document authentication with comprehensive checks, such as digital tampering detection, document identification, font anomaly detection, liveness detection, as well as face capture. It complies with the highest security standards and is certified by the Kantara Initiative as compliant with NIST SP 800-63 rev. 3 Component Service at Identity Assurance Level 2 (IAL2). IDEMIA’s ID&V technology incorporates document authentication with comprehensive checks CertiPath will also utilise IDEMIA’s Mobile ID (miD) Verify SDK to enable its TrustVisitor users to verify individual mobile driver’s licenses, which delivers security and convenience. IDEMIA achieved certification for its Verify SDK to the International Standard Organization ISO 18013 Part 5: Mobile driving license (mDL) application standard. It also passed extensive testing by UL Solutions. Highly regulated environments “With the digital revolution leading to a significant rise in identity fraud, it is great to see companies like CertiPath investing in next-generation technology that verifies the physical and digital IDs of individuals wanting to access government buildings and highly regulated environments.” “Visitor management is a crucial component of a comprehensive security posture, and we are thrilled to be supporting CertiPath’s critical mission to ensure the highest levels for validation for identities,” said Donnie Scott, CEO, IDEMIA Public Security North America.
Matrix is thrilled to participate in Infinity 3.0 Expo 2024, a premier event for architects, interior designers, and professionals in the construction sector. Scheduled from December 6th to 8th at SIECC, Sarsana, Surat, this event serves as an ideal platform to present Matrix's next-generation solutions tailored to address the unique needs of design-focused and construction-driven projects. With over three decades of innovation, Matrix will showcase its cutting-edge portfolio, including IP Video Surveillance, Access Control, Time-Attendance, and Telecom solutions, designed for seamless integration with smart building ecosystems and modern architectural aesthetics. IP video surveillance: Intelligent security for smart construction Matrix’s video surveillance solutions cater specifically to the safety and operational needs of large-scale construction and design projects: Centralised and Scalable Monitoring: Ideal for multi-building setups, ensuring effective oversight and management. Hazard Alerts and Intelligent Video Analytics: Designed to protect workers, equipment, and premises with features like perimeter intrusion detection and real-time hazard warnings. High-Resolution Network Cameras: Delivering 24/7 surveillance with remote access, ensuring project sites remain secure from anywhere. Access control and time-attendance: Designs for modern spaces Recognizing the importance of both functionality and design, Matrix introduces state-of-the-art solutions that blend security with architectural elegance: Sleek and Modern Face Recognition Terminals: Engineered to complement contemporary spaces, these terminals ensure fast and secure access while integrating effortlessly with building designs. Scalable On-Premise and Cloud-Based Solutions: Perfect for managing multi-site and multi-building projects, ensuring a cohesive and centralised control mechanism. 25+ Advanced Access Control Features: Including real-time alerts, visitor management, and integration with design automation for holistic security. BACnet Integration for Building Automation: Matrix Access Control systems now support BACnet, providing seamless compatibility with intelligent building management systems, enhancing operational efficiency. Telecom solutions: Communication for project teams Matrix's robust telecom solutions provide seamless connectivity for project coordination and operational efficiency: Hybrid PBX Systems: Accommodating up to 3,000 users, ideal for on-site and remote communication. Server-Based and Pure IP-PBX Systems: Designed to scale up to 5,000 users, ensuring uninterrupted communication for growing projects. Diverse Connectivity Options: Including FXO/FXS, PRI, VoIP, GSM, and 4G LTE gateways to suit varying site requirements. Advanced Desk Phones and Softphones: Offering flexible communication options for Android, iOS, and Windows, ensuring smooth collaboration across devices. Why Matrix for the construction and design sector? Matrix’s solutions are tailored to address the specific challenges faced by architects, interior designers, and construction professionals: Building Automation: BACnet integration supports smarter, more efficient building operations. Safety First: Advanced video analytics ensure worker safety, hazard detection, and overall site security. Globally Compliant Solutions: Made-in-India products with ZED Gold Certification and DSIR recognition, ensuring top-tier cybersecurity and data security for unmatched reliability. Scalability: Solutions designed for large-scale, multi-site projects with centralised management. Enterprise-grade Products: Robust and reliable devices like Face Recognition Terminals and aesthetically designed access control panels, integrate seamlessly, with modern architectural designs. Experience Matrix at Infinity 3.0 Expo 2024 Matrix invites attendees to visit its booth for live demonstrations of these solutions, tailored consultations, and an in-depth look at how our technology enhances project execution, security, and communication.
Expert commentary
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialogue and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organisation so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organisation. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of the machine and deep learning algorithms to recognise or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the colour of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours Analytics, on the other hand, refers to the process of analysing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behaviour. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognise. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behaviour information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilised. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organisation. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realise that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the colour of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognise something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognise unique, customisable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organisation might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognise that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Acre is a company built on mergers and acquisitions (M&A). Since its founding in 2012, Acre acquired several familiar access control companies, from Vanderbilt to RS2 Technologies, Open Options to Feenics, and several others. Acre itself was acquired in 2021 by UK-based private equity firm Triton, thus launching a new chapter in the company's history. Don Joos was named the new CEO in 2022 and set about transforming Acre from a collection of acquired companies into a coherent whole (representing various brands). A year later, we recently caught up with Don Joos to discuss the "new Acre" and what's ahead. Q: How does your background inform your approach to leading Acre Security? In physical security, there is a shift to more of a software-centric versus hardware approach Joos: This is my fourth company as CEO. What I’ve found along the way is that no matter the size or type of business, there’s a common theme, the business is going through some form of evolution or transformation because the industry they're in is going through an evolution. And today, in physical security, there is a shift to more of a software-centric versus hardware approach, and there’s a shift occurring that’s pulling us to the cloud. I think a key thing here is that while the industry is evolving, we must keep a careful eye on the evolution of the customer because the customer is the one who will dictate the pace of change, and I think that is what a lot of people sometimes lose sight of. Q: It seems Acre is on the path from being a “collection of small companies” to “a collection of brands within a single company.” Joos: I think most people think of Acre as a federation of companies. Acre Security was seen more as a holding company. For me, I think the biggest misconception is just that: “This is just a federation of companies” versus “This is a business.” Acre Security is a business that has a range of portfolios to address key verticals and pivotal business problems for customers. Because of what’s happening now and the market dynamics that are occurring, it ties back to “Who is Acre Security?” We have a clear answer as to where we want to be from cloud access control versus on-premise access control. We have clear answers regarding market segments, visitor management, and intrusion. When you think about it, those are the core areas of our business. Q: What has surprised you the most in your first year or so at Acre? Joos: I think the thing that surprised me the most was how similar the problems are because I was coming into a new industry. It’s surprising how strong a correlation [security has] to other industry transformations that I’ve been a part of. Q: What are the points of differentiation among the various Acre Security brands? Joos: I think if you go back to the history of the company, it was designed to compete. That is, that's how it was set up under the logic of, “If we have three bids in a deal, it increases the odds that we're going to win one of them.” As we evolve, to have sustained scalable growth, it is not just about going shallow and casting a wide net. It’s about creating a concentrated focus. Some of the technology is just inherently older technology. And so for me, it’s about creating migration paths for the customers to move to more modern technology, such as the cloud. I love our installed base. When you think about the cost of acquisition to get a new cloud customer, it costs a lot less when you have an installed base that you can migrate to the more modern solution versus having to spend the money and the sales energy to hunt for that next opportunity. Q: Where has Acre positioned itself in the marketplace? We can take care of your current needs, but we also have a clear migration path to take care of your future needs Joos: If you're ready to go to the cloud, we have an answer for you. If you're not ready to go to the cloud, but you're ready to take more cloud-based applications to continue to evolve, we have an answer for you. If you're not quite ready yet and you're still looking for a market-leading premises solution, we have an answer for you, and we have a migration path when you're ready down the road. So, you have a safe bet with Acre because we can take care of your current needs, but we also have a clear migration path to take care of your future needs. Q: How are you building up your team? Joos: In 2023, we’re getting a lot of core building blocks in place and making investments in people who have experience in this space or aligned industries. It is a balance. I think we need a group that understands the industry and a group that's going to come into it and challenge why we do things the way we do. I think that makes us unique: we have fresh eyes looking at things from a different perspective. With that, you’re naturally going to end up with a better answer to problems because people are comfortable challenging the status quo. Q: How are you seeking to expand your dealer channel and/or transition it from the various dealers “inherited” in previous acquisitions? Joos: The channel invests in Acre Security. Our success is their success, and so what we're proposing to them is a range of solutions that supports their longevity and their financial success. But we also continue to build out our portfolio through organic technology innovation or M&A. We're continuing to make investments in our channel strategy and how our partners interact with us We're continuing to expand their addressable market if they want to make investments with us. We're continuing to make investments in our channel strategy and how our partners interact with us. The design of our upcoming technology right now is built with the channel in mind. We want to ensure that we are not creating any channel conflict or any perceived channel conflict. I think that's usually the worst kind: when it's perceived but not real. You need to be very upfront and clear with communications. Q: What is the biggest challenge in the industry right now? Joos: Companies and customers are looking to embed security into their workflows. What I mean is these are not just standalone solutions anymore. They’re integrating with enterprise resource planning (ERP) and human resource (HR) software systems. In property management, they want it integrated into the fitness center, they want it integrated into the cafeteria areas and the dry cleaners, and so forth. So, this is about an ecosystem, and there are times when we are going to be the core, and there is going to be a lot of technology that is adjacent to us. There are times when we are the adjacency to someone else's core in a smart city or a smart building. This gets to why having an open application programming interface (API) is going to be an important part of the technology evolution. It cannot be a closed environment anymore; that is part of the past. Q: What’s next for Acre? We're constantly evolving our cloud access control as well as our on-premise access control Joos: There is a lot of work going on with integrating the business into a single Acre Security company. This is an investment year for us, we are adding people to our team. We are making a lot of investments from a systems and technology perspective. We have a lot of work right now going into integrating the business from an IT infrastructure perspective and all the tools that we use from an employee perspective. We are making a lot of investment as it relates to the commercial side. You're going to see some next-gen technology coming out from an intrusion perspective. We're constantly evolving our cloud access control as well as our on-premise access control. We're also bringing software applications, too. Q: What is Acre’s “message” going forward? Joos: One of the takeaways for me is this is not the Acre of the past. We are making some bold changes. New things are happening here; you better pay attention because clearly, something is different. I think that's one. I think the second is that as they spend time within us, they're going to realize the wide range of solutions and use cases that we can address, whether you're in access control or cloud, whether you're in intrusion, whether you are in visitor management, or whether you're looking at some network connectivity solutions. The third thing that I think people are going to see is a whole lot of energy as they talk to our people and the passion that you see from the team. If I wrap those three points up in one kind of statement there, I think my goal is that people walk away saying “Something is going on at Acre Security. We better pay attention.”
Case studies
Since 2024, Maringá, a city of approximately 500,000 residents consistently recognised as the best city to live in Brazil for over 6 consecutive years, has further strengthened its reputation by addressing the growing need for public safety. Smart surveillance solutions In this pioneering project, ALCA NETWORK and ALLNET were responsible for the project design and partnered with VIVOTEK, the global provider of security solutions, to implement one of the most advanced smart surveillance solutions in Brazil. This system integrates cutting-edge cameras, facial and licence plate recognition, and Big Data technologies. By consolidating data from the municipal, state, and federal sectors, this collaboration increases the safety of residents, solidifying Maringá’s position at the forefront of innovation in public safety. City's challenge The city government and security agencies recognised the need for smarter security measures Despite Maringá’s reputation as a peaceful and hard-working city with one of the highest Human Development Indexes (HDI) in Brazil, it faced evolving public safety needs. The city government and security agencies recognised the need for smarter security measures. “The Public Safety Department initially aimed to capture and analyse video data to support decision-making in cases such as drug trafficking, vehicle theft, tax fraud, and the protection of women and minors at risk,” explains Security Secretary Ivan Quartaroli. Public safety To meet these objectives, VIVOTEK was chosen by ALCA NETWORK and ALLNET for its advanced technology and quality, perfectly aligning with the city government’s requirements. The implementation of Maringá’s Integrated Control Center (CCI) began in July 2022, with strategically positioned cameras installed by the city’s public safety guidelines. Vivotek solutions VIVOTEK played a key role in upgrading Maringá’s security infrastructure by providing a comprehensive suite of solutions. This includes cameras with built-in video analytics processing technology and advanced software with facial and licence plate recognition capabilities. This integration leverages Big Data to cross-reference captured information, facilitating streamlined processing and providing reliable analytics for informed decision-making. To ensure full coverage, 70 VIVOTEK cameras supplied by ALLNET were strategically installed in key locations throughout Maringá, including urban mobility terminals, major avenues, squares, high-traffic intersections, and public corridors. Results and customer feedback Continuous monitoring of CCI allows officers to identify suspicious activity and promptly alert The implementation of CCI Maringá with VIVOTEK solutions has improved public safety, causing a notable reduction in crime rates and an increased sense of security among residents. Continuous monitoring of CCI allows officers to identify suspicious activity and promptly alert nearby law enforcement with accurate information. Benefits VIVOTEK’s advanced imaging technology supports crime prevention and investigation and serves as crucial evidence in legal proceedings. Key benefits include: Reduced investigation costs and time. Greater efficiency and safety for public agents working in the sector. Reduction in car thefts. Reduction in criminal activities. Increased quality of life for the population. Vehicle management As Acting Mayor Ulisses Maia emphasised, “This investment is capable of protecting the law-abiding citizens of Maringá, preventing all types of accidents that can happen in our city.” The integration of video analytics, particularly licence Plate Recognition (LPR), greatly increases safety by managing the flow of vehicles in and out of the city, reinforcing Maringá’s status as a smart city in Brazil.
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
For years, the Civil Police of the State of São Paulo, Brazil’s largest state police force faced significant challenges with criminal bookings and identification, including: A Fragmented Identity System - Each of Brazil’s 27 states has its own siloed programme that does not interconnect. This not only hinders statewide criminal booking but also undermines the community’s confidence in the criminal justice system. Identity Fraud With Multiple IDs - Imagine having 43 identities. This was the case for one unlawful Brazilian. The prevalence of identity fraud is extremely high across the country. If a person wants to hide their identity, it’s common for them to simply move to another state and set up a new profile. Manual Ink-and-Paper Fingerprinting Techniques - Many law enforcement departments across Brazil administered manual fingerprinting techniques, resulting in inaccuracies and low matching rates. Slow, Inefficient Criminal Booking Processes - Inefficiency was another setback for justice. It took numerous steps to confirm one’s identity and, on average, a whole workweek to get matching results returned. Biometric National ID Compliance - The civil police must modernise systems to comply with the Brazilian government’s mandates for all citizens to tie biometrics to their IDs. The Civil Police of the State of São Paulo needed a more reliable and efficient solution to break down identification silos and put the agency on the path toward a unified, national system rooted in the power of biometrics. HID's solution The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks Working through HID’s partner, Golden Distribuidora, one of Brazil’s largest distributors of IT products, the Civil Police of the State of São Paulo selected a comprehensive biometrics-based identification system called BioKit, featuring HID’s ten-print scanner. The HID ten-print scanner is designed to quickly capture flat and rolled fingerprints for background checks and identity validation programmes. It is also certified for FBI Appendix F (FAP 60) and offers an economical approach to fingerprint acquisition without sacrificing image quality. Automated Biometric Identification System The criminal booking process at São Paulo civil police stations is simplified and can be accomplished in minutes not days. First, agents use HID’s ten-print scanner to capture fingerprints and determine if the individual has a biometric file on record. The fingerprint images are compared against the state-run Automated Biometric Identification System (ABIS). If there is a match, the civil police move forward with their investigation. If there is no match, the officer then creates a new biographic/biometric profile for the individual in question and enrolls them into the ABIS. HID ten-print scanner HID ten-print scanners deliver superior performance and reliability at a competitive price point. Key advantages include: High-Quality Tenprint Capture - The scanner is FBI Appendix F (FAP 60) certified and can quickly capture high-resolution rolled and flat fingerprints. Ease of Use - User-friendly pictographs and LED indicators simplify the process for operators. Automatic Capture - Patented “Auto-Capture” offers fast and error-free image capture. Difficult Fingerprint Capability - An optional silicone membrane improves image quality for dry or damaged skin ensuring consistent results. ABIS Integration - The scanner seamlessly integrates with Brazil’s Automated Biometric Identification System (ABIS) to enable quick and accurate background checks. Results delivered Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking Using the BioKit system, featuring the HID ten-print scanner significantly streamlines the criminal booking process and improves matching accuracy for the State of São Paulo Civil Police. “Working with criminals can be difficult and dangerous, and the HID ten-print scanners help us identify and book criminals quickly and simply,” said Dr. Luiz Ortiz, Chief Delegate, Civil Police of the State of São Paulo. Easy to use Dr. Luiz Ortiz adds, “The HID ten-print scanner is easy to use and provides clear direction through pictographs, which is a big differentiator from other offerings.” To date, the BioKit system with HID’s print scanners is deployed in 500 civil police stations throughout São Paulo. This system has transformed criminal booking and identification processes, resulting in an increase in solved criminal cases and a steep reduction in identity fraud. HID fingerprint technology “What used to take 4 to 5 days is now done in minutes using the BioKit system and HID fingerprint technology,” said Dr. Ortiz. Dr. Ortiz adds, “Our agents can accurately identify or onboard suspects, and each new biometric enrollment into the centralised ABIS contributes to strengthening our country’s overall identity system and ability to bring about justice faster and smarter.” Biometric enrollment and verification “Each individual the Civil Police of the State of São Paulo onboards ties to a single set of fingerprints that verifies their true identity,” said Danilo Fernandes, Business Development Manager at Golden Distribuidora. Danilo Fernandes adds, “Utilising biometric enrollment and verification, our nation has the potential to streamline millions of records, while preventing countless cases of fraud. This establishes a fierce force to fight fraud here in Brazil.” A simple, fast, and trusted experience Additional use cases for the BioKit + HID ten-print scanner, beyond criminal bookings, include border control, background checks, correctional centres, courtrooms, voter registration, and national ID programmes. The team at Golden Distribuidora expects to continue distributing these biometric systems throughout the country to support Brazil in combating fraud and making biometric enrollment and identification a simple, fast, and trusted experience for all citizens and stakeholders.
Round table discussion
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
Products
White papers
Precision and intelligence: LiDAR's role in modern security ecosystems
DownloadThe top 4 reasons to upgrade physical security with the Cloud
Download11 advantages of a combined system for access control and intrusion
DownloadOptimise your business with analytics and AI
DownloadHow end-to-end video security solutions can help your organisation with social distancing
DownloadSchooling the market on education security
DownloadHow to catch shoplifters with thermal imaging
DownloadWhat Do I Need to Know to Successfully Deploy Mobile Access?
DownloadIntrusion detection: Manufacturers & Suppliers
- Bosch Intrusion detection
- OPTEX Intrusion detection
- Hikvision Intrusion detection
- DSC Intrusion detection
- Climax Technology Intrusion detection
- Dahua Technology Intrusion detection
- Visonic Intrusion detection
- Honeywell Security Intrusion detection
- Vanderbilt Intrusion detection
- Senstar Intrusion detection
- Pyronix Intrusion detection
- NetworX Intrusion detection
- Verkada Intrusion detection
- RISCO Group Intrusion detection
- Texecom Intrusion detection
- Software House Intrusion detection
- Axis Communications Intrusion detection
- Ajax Intrusion detection
- Gallagher Intrusion detection
- Enforcer Intrusion detection