IP security solutions
Datadobi, a global pioneer in Hybrid Cloud Data Services announced the appointment of Denise Natali to the position of Vice President of Americas Sales. In this newly created position, Natali will report directly to CRO and Co-Founder Michael Jack and be responsible for developing and executing revenue growth strategies, growing and leading Datadobi’s high-performance sales team, and ensuring Datadobi customers remain the most highly satisfied across the industry. Denise Natali Na...
There are many ways to get to VISION – but when it comes to industrial cameras, there is no way around IDS 20 years ago, at VISION 2004, the company introduced the first industrial camera with a USB interface before anyone else. 3D camera Since then, IDS has firmly established itself as the market pioneer in this field. With innovations in the 2D, 3D, and AI sectors, the industrial camera manufacturer is also making waves in the image processing market at VISION 2024. Moreover, ID...
Videx Security has announced its new Klass Monitor. This latest innovation in the Videx IPure range combines the latest technology and modern design to provide a leap forward for smart building entry solutions. The Klass Monitor provides a wide range of smart integration with various systems, including building and home automation, third-party CCTV picture-in-picture, anti-intrusion, full video and speech intercommunication and access control. Built on standard IP protocols, it guarantees limit...
Sepura confirms that the Secretary of State in the Cabinet Office has revoked the Final Order imposed on Sepura pursuant to section 27 of the National Security and Investment Act 2021. The original order was made by the then Secretary of State for the former Department of Business, Energy and Industrial Strategy. On 27 June 2024, the Secretary of State in the Cabinet Office revoked the Final Order following Sepura’s return to UK ownership. This has the effect of removing all the requireme...
Blackline Safety Corp., a global pioneer in connected safety technology, has announced that it has secured a $1.9 million deal with a South African energy company. The deal is the largest in Blackline’s Middle East & Africa (MEA) region (Rest of World segment) and marks the company’s first significant contract in Africa. The energy company purchased approximately 500 G7c devices for their plant workers and almost 500 G6 devices to protect their contractors while they are on site...
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimeters, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology offers benefits such as scalability, cost-efficiency, and centralised managem...
News
Dragonfly and Vismo announce an integration partnership by which intelligence from Dragonfly’s Security Intelligence & Analysis Service will be available through the Vismo platform. Vismo will have access to Dragonfly’s 19,000 location risk scores and associated detailed intelligence reports and incident data. As a result, users of Vismo’s Locate & Protect App will be better protected when they are on the move. Two complementary capabilities The service combines two complementary capabilities. By having access to Dragonfly’s intelligence and data, Vismo users will be able to better understand emerging security risks in the countries in which they’re traveling and how they are likely to affect their work and the operational aspect of their employer’s business. Additionally, they will receive alerts on incidents that are likely to specifically impact business travelers ahead of time, through Dragonfly’s Travel Risk Monitor data feed. State-of-the-art GPS tracking "The opportunities presented by partnering with Vismo are good news for users," said Henry Wilkinson, Chief Intelligence Officer, Dragonfly. Henry Wilkinson adds, "They will be able to plan and have access to our forward-looking intelligence which, combined with Vismo’s state-of-the-art GPS tracking and travel data solutions, provides a thorough and holistic approach to travel risk management." Comprehensive travel risk management Colin Dale, Global Sales Director, Vismo, commented, "What’s great about our collaboration is that it enhances our ability to provide users with proactive and more comprehensive travel risk management." Colin Dale adds, "It gives them valuable insights and real-time data to maximise their safety and security while traveling."
FPT Industrial, the Iveco Group brand dedicated to the design, production, and sale of low-environmental impact powertrains, will travel to Hanover to attend IAA TRANSPORTATION 2024. On-road and industrial applications The trade show for logistics, commercial vehicles, buses, and the transportation industry will take place from September 17 to September 22, 2024, at the Deutsche Messe AG venue. As a pioneer in on-road and industrial applications, FPT Industrial wants to harness its participation in the transportation sector’s international platform to restate its positioning in the on-road market, its leadership in Natural Gas solutions, its advanced Hydrogen propulsion systems, its complete offering of ePropulsion systems, batteries, and Battery Management Systems for commercial vehicles, and its commitment to delivering efficient and high-performance solutions for OEMs. Two main principles To position itself as a provider of zero-emission solutions by extending its value chain This approach is perfectly in line with the Brand’s product strategy which is based on two main principles. On the one hand, to continue to invest in even more sustainable internal combustion engines with an alternative multi-fuels-focused approach, and on the other, to position itself as a provider of zero-emission solutions by extending its value chain into the area of electrification, through ePropulsion systems and energy storage solutions. Sustainable technologies The main theme at the new, larger stand in Hanover will, therefore, be to present FPT Industrial as the ideal partner to support customers’ transition towards new, sustainable technologies in the transportation of both people and goods. The stand itself will be a clear demonstration of FPT Industrial's corporate approach and commitment towards sustainability in product development. As for the latest shows, the Brand’s booth in Hanover will be carbon neutral, namely all the factors involved in its set-up, use, and dismantling, including materials, goods, the transport of people, and energy consumption during the fair, just to name a few, will be taken into consideration to maximise the reduction of emissions. Certified carbon credits After the exhibition, FPT Industrial will verify the residual emissions and then compensate for them through the purchase of certified carbon credits. All the details, the complete lineup, and the main messages of FPT Industrial’s presence at IAA TRANSPORTATION 2024 will be revealed at the Official IAA 2024 Press Conference, to be held in Hanover on September 16, 2024.
Arcserve, a major data protection and recovery software company, has been recognised for its excellence in SaaS backup, being named Cloud Backup Company of the Year at the Storage Awards 2024. The award recognised Arcserve as a provider of secure and resilient cloud storage and SaaS protection, highlighting the organisation as a trusted provider of data resilience solutions. Cloud data protection The awards showcase the best technologies, products, and solutions across the storage sector Arcserve’s dedication to cloud data protection, including solutions to protect data hosted in SaaS application clouds, such as Microsoft Office 365, Entra ID, Salesforce, and Google Workspace won them a top spot at the industry-recognised awards. The awards showcase the best technologies, products, and solutions across the storage sector, and this recognition highlights Arcserve’s 40+ year commitment to providing business continuity solutions that safeguard multi-generational IT infrastructures. Seamless data protection solutions Joanna Godridge, Sales Director, UK, Arcserve, commented, "We are thrilled to receive this award which recognises our commitment to excellence, our drive to protect the organisation’s data, and our unbeatable expertise, which bring together decades of experience and we hope to continue protecting global businesses from imminent data loss." Joanna Godridge adds, "Every sector is under threat. Whether it be ransomware attacks, data loss, or other disasters, no organisation is safe without protection, and data loss is happening continuously. We support businesses from startups to enterprises, providing seamless and comprehensive data protection solutions for challenges of all shapes and sizes. Secure data should be every business’ goal, and we help them to achieve this."
RiverSafe, a global cybersecurity, DevOps, and AppSec professional services provider, has partnered with education-based charity - World Vision to improve access to education for children in Africa. World Vision World Vision is a global humanitarian organisation dedicated to improving the lives of children, families, and communities around the world. Focusing on providing education, healthcare, and emergency relief to those in need, they aim to break the cycle of poverty and open doors for a brighter future for children. Education for children RiverSafe integrates sustainability into its core business strategy, ensuring it grows in a way To support the charity, RiverSafe has provided donations to World Vision to support its mission of providing quality education to children across Africa. This contribution will enable World Vision to enhance literacy skills, provide vital books, and ensure access to essential learning materials for children. RiverSafe integrates sustainability into its core business strategy, ensuring it grows in a way that benefits both the business and the planet, and is working with World Vision to provide quality education, to help change lives and transform societies. Fundamental beliefs Oseloka Obiora, CTO at RiverSafe, commented, "We formed a partnership with World Vision as we share the same fundamental beliefs – that education is the best way to give people a brighter future, for the betterment of everyone in society." Oseloka Obiora adds, "Partnering with World Vision allows us to actively support an initiative that equips young, disadvantaged children with the education they deserve. We are very proud to support the fantastic work they do and hope to continue our relationship, providing more children with good quality education." Breaking the cycle of poverty Spokesperson, World Vision, commented, "Our collaboration with RiverSafe has been fundamental for improving access to education for children. Their support is not only helping transform individual lives but also contributing to the broader goal of breaking the cycle of poverty, making a profound difference, and opening doors to a brighter future for countless children."
As a part of Teleste’s strategy execution, they have entered to an EMS-Partnership with Kyrel Oy from Finland. Through this new collaboration, Teleste aims to ensure continuous high quality, agility, and delivery reliability for our Public Safety and Mobility business unit. Kyrel is well known for its customer-centricity and reliability, values that Teleste shares. This creates a strong foundation for their partnership. Supply chain capabilities Marko Uutela, Director of Operations, Logistics and Sourcing for Teleste's business unit - Public Safety and Mobility, said, "To be able to react even smoother on the fast-changing public safety and mobility market and provide the best value for our customers, we are continuously seeking ways to improve our operations. Reliable partnerships are valuable in supporting our world-class manufacturing and supply chain capabilities." He adds, "Kyrel is a highly valued and well-known partner in the industry, with an optimal logistic location close to our factory and R&D functions. We are really excited to enter to this cooperation with Kyrel and seek end-to-end synergies and efficiencies together." Long-term collaboration Mika Räty, Managing Director of Kyrel Oy, said, "We at Kyrel aim for genuine long-term collaboration to develop operational performance and products together with Teleste. By doing so, we not only advance the business of two great companies but also the electronics industry in Finland." He adds, "Kyrel's main competitive edges include strong personnel capabilities, robust supply process control, and high technological production processes. Additionally, a family-owned business, we offer unique proximity and personal touch to our operations." They look forward to starting this productive collaboration and creating more value for Teleste’s customers.
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimetres, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology Cloud technology offers benefits such as scalability, cost-efficiency, and centralised management. The partnership between Bosch Building Technologies and Eagle Eye Networks aims to provide an intelligent solution that supports businesses to work more efficiently and make the world a safer place. Smart, simple, and secure Eagle Eye Cloud VMS addresses customers’ security needs with infinite scalability, flexible pricing plans Eagle Eye’s true cloud solutions are known to be smart, simple, and secure. Purpose-built for the cloud and AI, the Eagle Eye Cloud VMS addresses customers’ security needs with infinite scalability, flexible pricing plans, a wide array of advanced analytics, and an open RESTful API platform for developers to easily create applications leveraging and integrating cloud video surveillance. AI-enabled cameras Bosch Building Technologies offers a wide range of AI-enabled fixed, moving, specialty, and robust cameras that deliver the right levels of data and evidence, are secure and cyber-resistant, and are easy to deploy. Bosch’s application-specific video analytics at the edge performs real-time video processing to automatically generate metadata descriptions of events. Situational awareness and control The integration of Bosch cameras with built-in Video Analytics and the Eagle Eye Cloud VMS provides users with advanced notifications of potential security risks, enhancing situational awareness and ensuring control from anywhere. Visual data generated by Bosch cameras is highly accurate and reliable, supporting smart decisions and proactive responses to minimise risk and potential damages. Edge-based, application-specific analytics Eagle Eye Cloud VMS allows detailed video access through the cloud, with continuous recording Video cameras can act as sensors thanks to edge-based, application-specific analytics, helping secure perimetres, increase safety in or around buildings, and collect data for decision-making. The Eagle Eye Cloud VMS allows detailed video access through the cloud, with options for event-based or continuous recording, and storage retention ranging from 7 days to 5 years. Scalable solution This integrated solution is scalable, facilitating rapid deployment in bandwidth-limited areas, and features an AI-powered Smart Video Search, enabling users to search for a person, vehicle, or object across multiple cameras and sites, returning accurate results immediately. “We are an open camera player with multiple software partners, and we are delighted to add Eagle Eye Networks as a partner to further extend our cloud-related offerings to our customers, benefiting them with our differentiating camera technologies,” said Michael Seiter, Senior Vice President of Bosch Video Systems and Solutions. Edge and cloud partnership “Just like our outstanding partnerships with other pioneering solution providers, we look forward to creating key differentiators in this powerful edge and cloud partnership,” concluded Michael. “We are extremely pleased that Bosch Building Technologies has invited Eagle Eye Networks to become a technology partner and look forward to delivering exceptional cloud and edge solutions that solve business problems and deliver value to our global customers,” said Dean Drako, Founder and CEO of Eagle Eye Networks.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
RODE, the acronym for RObotic DEpalletiser, is a pioneering product from AWL in the intralogistics market. The robotic solution can efficiently process packages randomly arranged on a pallet, setting it apart from conventional systems. Need for increased automation According to the German Parcel and Express Logistics Association (Bundesverband Paket und Expresslogistik e. V.), 4.15 billion courier, express, and parcel shipments were sent in Germany alone in 2022. Annual shipment growth to around 4.9 billion is realistic by 2027. Against this backdrop and the generally prevailing shortage of personnel, there is only one solution for shipping and logistics companies to cope with this immense volume of orders: increased automation. RODE The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution. One of the locations where RODE adds value is for DHL eCommerce in Rotterdam. In this machine, two Ensenso 3D cameras from IDS Imaging Development Systems GmbH are implemented to provide the required image data. Application The intelligent robot-supported depalletiser, therefore, automatically destacks any packaged goods such as cartons, bags, or containers from pallets and thus ensures their continuous processing - without delays or downtime. Even "extra shifts" at peak times can be implemented at any time, e.g., to cope with the increased workload during Christmas. This frees up staff for more qualified tasks, such as the subsequent processing of consignments or handling customer inquiries. At the same time, it relieves employees of physically and ergonomically demanding tasks and reduces the risk of injury. Up to 800 packages in continuous operation The particular difficulty here lies in the robot's picking of parcels of different sizes and weights At DHL eCommerce in Rotterdam, RODE processes up to 800 parcels per hour with a maximum weight of 31.5 kg each and places them on the corresponding sorting belt. The particular difficulty here lies in the robot's picking of parcels of different sizes and weights. It must independently recognise the position of the objects in three-dimensional space and decide which package to pick next. It then has to determine the best gripping position and avoid collision with other parcels or the machine. Ensenso X36 3D cameras "This intelligent robotic solution integrates AI image processing and high-tech gripper technology," explains Sander Lensen, R&D Manager at AWL. "The system recognises products and can flip the items to ensure that the required long side is leading." Two Ensenso X36 3D cameras provide the necessary image data. Integrated image processing system They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm and a maximum height of 2400 mm. The integrated image processing system processes this further and enables the depalletiser to identify each package and determine the corresponding gripping position for robust robot-assisted picking. 3D cameras for future-oriented robotics Each Ensenso X36 3D camera system consists of a projector unit and two GigE cameras with either 1.6 MP or 5 MP CMOS sensors. AWL has opted for the 5 MP variant for its solution. Mounting and adjustment brackets, three lenses as well as sync and patch cables for connecting the cameras to the projector unit are also included in the scope of delivery. The integrated FlexView2 technology ensures an even better spatial resolution as well as a very high robustness of the system with dark or reflective surfaces. Easy to set up It is also easy to integrate into its working environment and aims to give its users a competitive edge The 3D systems are delivered assembled and pre-calibrated. However, focussing and calibration are also easy to set up using the setup wizard integrated into the software. The latter they have in common with the RODE depalletiser - it is also easy to integrate into its working environment and aims to give its users a competitive edge in the world of logistics automation. Outlook "The intralogistics market is a growth market. The number of robot solutions required will increase rapidly in the coming years." "The type of products that need to be recognised will change constantly. This will be a challenge for all components and the demands on the camera," explains Sander Lensen. Camera technology with artificial intelligence However, image processing is also developing rapidly. Smart solutions that combine camera technology with artificial intelligence are on the rise. They hold great potential for tackling both increasingly demanding tasks and the worsening shortage of skilled workers. Carton by carton, parcel by parcel, pallet by pallet.
A mix of Hubble Panoramic and PTZ cameras from Dahua Technology have been installed at Tripoli Stadium in Libya to help it meet modern international standards. Built in 1970, it is the largest Olympic stadium in the country and has been renovated and refurbished to meet FIFA’s requirements for stadium safety and security. Challenges With a capacity of 50,000 spectators, the stadium becomes crowded on match days and control of spectators and crowds becomes paramount. With only a limited number of police, security and stadium staff to rely on, stadium managers needed to have an overview of crowd flows and potential congestion to help ensure safety at these busy times. In addition, the stadium needed to stream images of match action to large screens strategically located inside and outside the stadium for fan interaction, as well as provide screens for advertising. Solution Cameras contain wise roles such as face recognition, perimeter protection and people-counting A mixture of eight Hubble panoramic and more than 180 WizMind 5 series cameras have been installed at the stadium to improve the situational awareness for stadium managers and the security team. The Hubble cameras are situated high up in the stadium to provide a panoramic overview, while being able to track specific incidents. They consist of an array of fixed cameras providing 180o, 270o or 360o coverage, together with an integrated dome camera to zoom into a particular scene and track specific objects. With Ultra HD resolution of up to 24MP, Hubble also features crowd number and density detection, vehicle-counting and density monitoring and augmented reality mapping. Dahua’s DSS video management software The cameras are available in dust-proof, waterproof and vandal-proof versions Also installed are more than 180 WizMind 5 series cameras. Featuring Starlight and deep learning algorithms, the cameras incorporate intelligent functions such as face recognition, perimeter protection and people-counting, which all greatly improve the accuracy of video analysis. The cameras are available in dust-proof, waterproof and vandal-proof versions. Intelligent recognition plays a big part in the security of the stadium, with cameras being able to identify and subsequently track any blocklisted suspects. This feature is also used at the entrance of the stadium to validate authorised ticket holders. Also installed are giant 15m x 9m LED screens to provide images of play on the pitch, as well as advertising coverage. All equipment is managed by Dahua’s DSS video management software located in the central control room. Results The installation of the Dahua equipment has provided stadium staff and security personnel with a high degree of situational awareness at the venue. They are now able to control access to the stadium through face recognition, anticipate overcrowding and potential congestion points with automatic heat mapping from camera images and track suspicious people or potential incidents. The cameras also provide a high degree of perimeter protection to detect and track abnormal intrusion.
A renowned global pioneer in international education services provides various programs and comprehensive support to students pursuing their educational goals abroad. Originating from Australia in 1969, its primary objective has been facilitating educational opportunities worldwide. The company is closely associated with IELTS (International English Language Testing System), and it assists students in studying in English-speaking nations like Australia, New Zealand, Canada, Ireland, the UK, and the US. Company profile In India alone, it has over 70 offices across 61 cities and grew its operations in Southeast Asian nations Situated in Delhi, India, the company’s Indian headquarters serves as a central operational hub, addressing the diverse needs of Indian students aspiring for overseas education. With a team of dedicated experts, the centre offers students personalised guidance, counselling, and support nationwide. In India alone, it has over 70 offices across 61 cities and expanded its operations in Southeast Asian countries. Motivated by a commitment to excellence, integrity, and student success, the company continues to empower individuals, fostering global connections and promoting cultural understanding through international education. Challenges Ensuring the integrity of its assessment process Needed a standard procedure that could be replicated across 61 locations Evidence capturing to confirm the identity of the student appearing for the exam Needed a surveillance solution that ensured compliance at the centre Need to capture footage locally and centralised monitoring The surveillance solution should be dependable, scalable, and interoperable Business scenario The institute sought a wide surveillance solution that captured the details of every student As the co-owner of the IELTS, the institute faced significant challenges in ensuring the integrity of its assessment process for students studying in English-speaking countries. With centres spread across India and other Southeast Asian countries like Sri Lanka, Bangladesh, and Bhutan, they needed a reliable surveillance solution to verify the identity of candidates at their assessment centres. It was crucial for the assessment process to be standardised across 61 locations and easily replicable in new centres. With 11 assessment centres and 49 centres where students arrived for assessment, the institute sought a comprehensive surveillance solution that captured the details of every student entering their premises and cross-referenced them with their system centrally. Additionally, they required a robust recording architecture to store video evidence for future reference as needed securely. In essence, the company faced the distressing challenge of establishing a surveillance solution that was dependable, scalable, capable of capturing essential details, and interoperable. They needed a distributed architecture with centralised control to meet their surveillance requirements effectively. Solution The surveillance solution comprised of: The challenges faced by the institute were swiftly assessed by Matrix experts, who devised a robust surveillance structure to ensure compliance across multiple centres in India and abroad. In all 61 centres, Matrix 2MP PTZ cameras with 25x optical zoom were strategically installed to capture the faces of candidates arriving for tests and match them with their recorded details in the system. The movement of each candidate was meticulously recorded in the system to maintain accurate identity records. The action of each candidate was meticulously recorded in the system to keep real identity records Further, the accuracy was enhanced by adding a secondary layer of surveillance to monitor compliance with the SOP. Matrix PTZ cameras with 25x optical zoom adeptly captured intricate event details recorded in the computer. To meet the needs of each centre, NVRs (Network Video Recorders) with different capacities were installed. This enabled the local recording of details at each centre. Following the client's specifications, the NVRs were configured to store recorded details for three months. Additionally, cameras were installed at the 11 OSM sites to ensure compliance at the places where the papers were assessed. Products offered SATATYA MIBR20FL36CWP: 543 2MP IR Bullet Camera with 3.6mm Lens with Audio SATATYA MIDR20FL36CWP: 264 2MP IR Dome Camera with 3.6mm Lens with Audio SATATYA PZCR20ML25CWP: 76 2MP Pan-Tilt-Zoom Camera with 25x Optical Zoom SATATYA NVR1601X - 8 Nos 16 Channel NVR with 1 SATA Port SATATYA NVR1602X - 8Nos 16 Channel NVR with 2 SATA Port - 8 Nos SATATYA NVR3202X - 1Nos 32 Channel NVR with 2 SATA Port SATATYA NVR3204X - 31Nos 32 Channel NVR with 4 SATA Port SATATYA NVR6404X - 2Nos 64 Channel NVR with 4 SATA Port SATATYA NVR6408X - 7Nos 64 Channel NVR with 8 SATA Port MATRIX LICENCE DONGLE 200 Enterprise VMS: USB Dongle to Run Licence Application SATATYA SAMAS PLT Enterprise VMS: Software for up to 65,535 Cameras SATATYA SAMAS CAM100 - 5Nos Enterprise VMS: 100 Camera Licence SATATYA SAMAS USER3 - 5Nos Enterprise VMS: 3 Concurrent User Licence Benefits Enhanced Assessment Integrity: By implementing Matrix 2MP PTZ cameras with 25x optical zoom across all 61 assessment centres, the company ensured the integrity of the assessment process. These cameras meticulously capture the faces of candidates arriving for tests, allowing them to verify their identities and maintain accurate records. Standardised and Replicable Procedure: The Education Centre needed a standard procedure that could be replicated across the extensive network of centres. The Matrix surveillance solution provided it with a standardised approach that could be easily implemented in new locations, ensuring consistency in its assessment process. Compliance Assurance: The addition of Matrix PTZ cameras with 25x optical zoom and a secondary layer of surveillance helped them monitor and ensure compliance with the Standard Operating Procedures (SOP) at all times. Dependable and Scalable Surveillance: Matrix's NVRs with different capacities allowed the Institute to locally store recorded details at each centre while ensuring reliability and scalability for future expansion. Centralised Monitoring: To streamline the operations, they needed a surveillance solution that allowed seamless central monitoring. Matrix's solution facilitated the cross-referencing of student details with their system centrally and, enhancing efficiency and data accuracy. Interoperability: Matrix's surveillance solution is designed to be interoperable, ensuring seamless integration with the existing infrastructure. This interoperability enables them to adapt to evolving technological requirements while maintaining the integrity of the assessment process. In summary, Matrix's comprehensive surveillance solution not only addressed the immediate challenges but also provided a robust foundation for the assessment process, enabling them to uphold the highest standards of integrity, compliance, and efficiency across all assessment centres.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost management, and a skills gap can make adopting the Cloud seem onerous. But the benefits are there, aren't they? We asked this week's Expert Panel Roundtable: Will the impact of the Cloud on physical security integrators be net-positive or net-negative?
In today's interconnected world, the lines between physical and digital security are blurring. This means that threats can easily exploit vulnerabilities in both realms, potentially causing significant damage. That's why the convergence of cyber- and physical security systems is becoming increasingly important. It has already been a topic of discussion in the security market for more than a decade. To get a reality check, we asked this week’s Expert Panel Roundtable: Has convergence been achieved in security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Top 7 trends to watch in the physical security industry](https://www.sourcesecurity.com/img/white-papers/612/920x533_1707306824.jpg)
Top 7 trends to watch in the physical security industry
Download![Troubleshooting IP video systems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1704973815.jpg)
Troubleshooting IP video systems
Download![Simple Security Solutions for SMBs](https://www.sourcesecurity.com/img/white-papers/612/920x533_1675952853.png)
Simple Security Solutions for SMBs
Download![5 question check-up: Test your camera's cybersecurity](https://www.sourcesecurity.com/img/white-papers/612/920x533_1671733196.png)
5 question check-up: Test your camera's cybersecurity
Download![How to migrate to an IP-based access control system](https://www.sourcesecurity.com/img/white-papers/612/genetec-us-websiteimage2.jpg)
How to migrate to an IP-based access control system
Download![Six ways to eliminate costs, risks and disruption to your network](https://www.sourcesecurity.com/img/white-papers/612/nvt-agen.jpg)
Six ways to eliminate costs, risks and disruption to your network
Download![The critical importance of Trusted Execution Environment in access control](https://www.sourcesecurity.com/img/white-papers/612/trusted-execution-environment-920.jpg)
The critical importance of Trusted Execution Environment in access control
Download![Security investments retailers should consider for their 2021 budget](https://www.sourcesecurity.com/img/white-papers/612/retail-security-investments-for-2021-budget-920_1603476210.jpg)
Security investments retailers should consider for their 2021 budget
Download![Optimise your business with analytics and AI](https://www.sourcesecurity.com/img/white-papers/612/security-video-analytics-with-artificial-intelligence-eagle-eye-networks-920_1599560771.jpg)
Optimise your business with analytics and AI
Download![Making sense of today’s security camera options](https://www.sourcesecurity.com/img/white-papers/612/vicon-todays-security-camera-option-920.jpg)
Making sense of today’s security camera options
Download![How to drive B2B security & operations with smart surveillance](https://www.sourcesecurity.com/img/white-papers/612/banner-b2b-whitepaper.jpg)
How to drive B2B security & operations with smart surveillance
Download![Making your surveillance cyber secure](https://www.sourcesecurity.com/img/white-papers/612/hanwha-cybersecurity-grey-thumbnail.jpg)
Making your surveillance cyber secure
Download![Is access control in the cloud more cost effective?](https://www.sourcesecurity.com/img/white-papers/612/ISONAS-2-landing-page-620.jpg)
Is access control in the cloud more cost effective?
Download![What are the security technology needs of the hotel sector?](https://www.sourcesecurity.com/img/white-papers/612/hotel security thumb 620.jpg)
What are the security technology needs of the hotel sector?
Download![Network Security Redefined: IP-Enabled Access Control](https://www.sourcesecurity.com/img/white-papers/612/assa-abloy-paper-620.jpg)
Network Security Redefined: IP-Enabled Access Control
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
IP security solutions: Manufacturers & Suppliers
- exacqVision IP security solutions
- Dahua Technology IP security solutions
- Hikvision IP security solutions
- Honeywell Security IP security solutions
- Bosch IP security solutions
- AV Costar IP security solutions
- Pelco IP security solutions
- Axis Communications IP security solutions
- LILIN IP security solutions
- Messoa IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- BCDVideo IP security solutions
- Vicon IP security solutions
- Avigilon IP security solutions
- Climax Technology IP security solutions
- Software House IP security solutions
- Illustra IP security solutions
- AMAG IP security solutions
- TruVision IP security solutions
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download