IP security solutions
Gunnebo Group will present its commitment to innovation in advanced security solutions and sustainability across its flagship brands at Intersec 2025, held in Dubai, UAE, from January 14 -16, 2025. As a global pioneer in security solutions, Gunnebo will be on stand S2, A22, presenting a range of advanced, innovative technologies in safe storage, entrance control, and high-security electronic locks, with a focus on sustainability in design, materials, and energy efficiency. Safe storage solutio...
Nanodems, a global provider of Physical Security Information Management (PSIM) solutions, is pleased to share the success of its participation in ISC East 2024, held at the Javits Centre in New York City from November 19–21. As one of the Northeast’s pioneer security and public safety trade shows, ISC East provided an excellent platform for Nanodems to present its AI-powered PSIM software platform, NDIS. Advanced PSIM software The event showcased the company’s innovati...
The most common file formats for hiding malware are .exe and .zip, according to research by NordVPN. These are also the file formats that frequently land on employees' computers and end up posing great security risks to organisations. To address the issue, NordLayer, a provider of flexible cybersecurity tools for businesses, has just launched Download Protection, a robust security feature that automatically scans and instantly removes various types of malware-infected files from user-initiated...
Cohesity, a pioneer in AI-powered data security, now supports the Haute-Garonne Departmental Council with Cohesity DataProtect. This allows the organisation to drastically reduce the time and resources needed to manage its backups, both on-premises and in the cloud and significantly accelerate the data recovery processes to enhance its cyber resilience. The Haute-Garonne Departmental Council manages a vast collection of data covering different functions, including building plans, architectural...
The Nemetschek Group has announced its participation in a Series B funding round for Document Crunch, a technology company dedicated to transforming document compliance and risk management for the construction industry. The investment and partnership with Nemetschek will enable Document Crunch to accelerate growth, expand its platform, enhance the technology, and increase its market reach. AI-driven solutions Document Crunch’s AI-driven solutions are designed to streamline compliance ta...
IDEMIA Public Security North America, a pioneering provider of secure and trusted biometric-based solutions, has announced a partnership with Kudelski IoT, a division of the Kudelski Group and a global pioneer in digital security. This collaboration aims to enhance fraud prevention and regulatory compliance in the automotive retail industry by leveraging IDEMIA’s Identity and Verification (ID&V) technology. IDEMIA’s ID&V solution Kudelski IoT will deploy IDEMIA’s ID&...
News
iDenfy, a pioneer in identity verification and compliance solutions, has announced its new partnership with Portugal Residency Advisors, a consulting firm specialising in comprehensive relocation and investment services in Portugal. The partnership aims to automate the onboarding process and strengthen security measure regulations for the new clients. Identity verification solutions The challenges related to identity fraud and regulatory compliance have increased as well As digital and cross-border transactions continue to grow. The challenges related to identity fraud and regulatory compliance have increased as well. According to Statista, in 2022, global financial fraud losses reached an estimated $41 billion, highlighting the need for robust, automated identity verification solutions. This collaboration allows Portugal Residency Advisors to verify the legitimacy of their global client list swiftly and securely while reducing compliance risks and manual verification work. Relocation and investment process Portugal Residency Advisors has been a trusted partner for individuals, families, and businesses looking for information about residency, property acquisition, tax compliance, and relocation in Portugal. The firm’s unique value lies in its ability to offer peace of mind throughout the relocation and investment process, tailored to the client’s individual needs as well as doing business. Client verification standards The firm is not only using an identity verification key to onboard singular users but also AML For this reason, the company is not only using an identity verification solution to onboard singular users but also anti-money laundering services (AML), together with near-field communication (NFC) verification, to exploit the latest features and optimise users' onboarding journey. As the company expands its operations to serve a diverse, international customer base, maintaining rigorous client verification standards is critical. Advanced biometric algorithm iDenfy’s identity verification system, already trusted globally, is equipped to recognise over 3,000 types of identity documents across 200 countries and territories. Advanced biometric and face recognition algorithms ensure that the analysed faces are real, helping to prevent the use of pictures of faces, 3D masks, and other fake fraudster tricks during the identity verification process. iDenfy’s advanced AML Screening Software iDenfy’s advanced AML Screening and Ongoing Monitoring Software offers a powerful solution Furthermore, iDenfy’s advanced AML Screening and Ongoing Monitoring Software offers a powerful solution to help Portugal Residency Advisors streamline their onboarding process and enhance compliance measures. By seamlessly scanning users against international sanctions, politically exposed persons, and law enforcement watchlists, iDenfy enables the detection and blocking of potential fraudsters or illegal applicants seeking residency permits. Advanced AML filtering algorithm Additionally, with an advanced AML filtering algorithm, the platform distinguishes genuine threats from adverse media, reducing recognition and getting most of the information about the individual. The software connects global enforcement authorities such as Interpol, Europol, and the FBI and empowers Portugal Residency Advisors to safeguard national security while delivering a smooth onboarding experience for valid applicants. NFC chip data iDenfy offers NFC verification, held by eIDAS, which brings unparalleled convenience Alongside its advanced AML screening and ongoing monitoring software, iDenfy offers NFC verification, regulated by electronic identification, authentication, and trust services (eIDAS), which brings unparalleled convenience and security, providing a seamless and stress-free experience for applicants. With instant NFC chip data reading and identity verification completed in as little as 40 seconds, the feature ensures a faster and more user-friendly process. Cross-checking security certificates Also, Public Key Infrastructure (PKI) guarantees spoof-proof verification by cross-checking security certificates with global authorities, further enhancing reliability. The function is fully compatible with Android and iOS devices, “We chose iDenfy because their solution stands out for its reliability and simplicity in onboarding, making it an ideal partner as we prioritise our clients' experience. iDenfy’s technology helps us ensure full compliance while maintaining trust and efficiency in our processes,” said Pedro Branco, Managing Director of Portugal Residency Advisors. Advanced identity verification solutions PKI guarantees spoof-proof verification by cross-checking security certificates “We’re excited to work with Portugal Residency Advisors in their mission to simplify relocation and investment processes for their clients." "Our advanced identity verification and compliance solutions will empower them to expand confidently while protecting against fraudulent activities,” said Domantas Ciulde, the CEO of iDenfy. Integrating iDenfy’s technologies By integrating iDenfy’s technologies, Portugal Residency Advisors will enhance their ability to conduct due diligence, meeting both internal security standards and global compliance requirements. This partnership marks a step forward in providing a safer, more efficient onboarding process that builds international trust for clients worldwide.
artius.iD, the global pioneer in secure, self-managed identity and decentralised ID management, has appointed Burton M. Goldfield, former President and CEO of TriNet Group Inc. (NYSE: TNET), to its Board of Strategic Advisors. Bringing more than three decades of cutting-edge technology expertise to the business, Goldfield will provide high-level strategic advice to artius.iD as it continues to rapidly scale its cross-sector digital identity and cybersecurity offering to multinational corporations and small- and medium-sized businesses (SMBs). Prior roles of Goldfield A renowned business executive, Goldfield brings more than 25 years of expertise in technology A renowned business executive, Goldfield brings more than 25 years of expertise in technology. He most recently served as President and CEO of TriNet Group for 15 years, steering the company to become a premier provider of comprehensive human resources solutions for more than 22,000 customers of small and medium-sized businesses (SMBs). Prior to TriNet, Goldfield held pivotal leadership roles at companies including Rational Software (RATL), Hyperion Solutions (HYSL), and IBM Corporation (IBM). He holds a bachelor’s degree in biomedical engineering from Syracuse University and an MBA from Villanova University. Demand for digital identity solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing increasingly sophisticated and multidimensional cybersecurity threats, with HR systems being an especially popular attack vector. His deep understanding of the small- and medium-sized business ecosystem will put artius.iD in an unrivalled position to tap into the accelerating demand for digital identity solutions among SMBs. Michael Marcotte, founder, Chairman, and CEO of artius.iD, said: "This is a pivotal appointment for artius.iD as we continue to pursue our strategic plan, and I'm thrilled to welcome Burton to our Board of Strategic Advisors. Our collaboration spans decades, including impactful initiatives on SlingTV, and is built on mutual trust and admiration." Decentralised ID management solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing sophisticated Marcotte added: "As a steadfast advocate and champion for SMBs and entrepreneurs, Burton has a profound understanding of the challenges companies face in safeguarding customer and employee data. His expertise and insight will be invaluable as artius.iD continues to deliver groundbreaking solutions to address these critical needs.” Burton Goldfield, Strategic Board Advisor at artius.iD, added: "artius.iD’s advanced quantum encryption resilience and decentralised ID management solutions provide SMBs with the confidence needed to safeguard their customer and employee relationships." Advanced groundbreaking software Goldfield added: "This transformative technology is akin to the advanced groundbreaking software tools created by Rational for the Department of Defense and Hyperion’s breakthrough with Essbase using OLAP for analytics." "SMBs are the driving force behind the U.S. economy, and it is vital that we continue to support their success. I'm eager to help bring this transformative technology to the organisations that need it most."
DigiCert, a pioneering global provider of digital trust, released its annual forecast of cybersecurity predictions for identity, technology, and digital trust expected to shape the landscape in 2025 and beyond. These predictions provide a snapshot of the cybersecurity challenges and opportunities enterprises will encounter in the months ahead. DigiCert’s full predictions and outlook for the new year can be found at DigiCert’s blog. Prediction 1: Post-Quantum Cryptography Takes Off 2025 marks a pivotal year when post-quantum cryptography (PQC) shifts from theoretical frameworks to real-world deployments. With impending announcements from the U.S. National Security Agency (NSA) and growing compliance pressures, PQC adoption will surge, empowering industries to embrace quantum-resistant solutions. Prediction 2: Chief Trust Officers Take Centre Stage Digital trust becomes a boardroom priority, pioneering to a continued rise of Chief Trust Officers (CTrOs) who will oversee ethical AI, secure digital experiences, and compliance in an increasingly regulated environment. Prediction 3: Automation and Crypto-Agility Become a Necessity With industry shifts toward shorter SSL/TLS certificate lifespans, automation and crypto-agility will emerge as critical capabilities for organisations aiming to maintain secure operations amidst evolving standards. Prediction 4: Content Provenance Goes Mainstream In an era of deepfakes and digital misinformation, the Coalition for Content Provenance and Authenticity (C2PA) is set to redefine how we verify digital content. Expect to see C2PA’s Content Credential icon become commonplace on images and videos to enhance trust across media platforms. Prediction 5: Organisations Will Demand Resilience and Zero Outages The CrowdStrike outage this summer underscored the need for better testing of automated updates and stronger digital trust. As IoT adoption grows, concerns about the safety of over-the-air updates, particularly for self-driving cars, are prompting calls for greater transparency in security practices. The E.U.’s Cyber Resilience Act, effective in 2027, will drive stricter cybersecurity standards, fostering a more secure and trustworthy IoT ecosystem. Prediction 6: AI-Driven Phishing Attacks Will Surge The proliferation of AI will fuel an unprecedented surge in sophisticated phishing attacks, making them harder to detect. Attackers will leverage AI to craft highly personalised and convincing phishing campaigns, while automated tools will enable them to scale attacks at an alarming rate, targeting individuals and organisations with precision. Prediction 7: New Private PKI Standards Like ASC X9 Will Gain Momentum ASC X9 is poised to gain momentum as industries like finance and healthcare increasingly require customised security frameworks to meet stringent regulatory demands and unique operational needs. Unlike public PKI, ASC X9 offers greater flexibility by enabling tailored policies and trust models, addressing critical areas such as data integrity and authentication. This ability to foster secure, scalable, and interoperable frameworks will make ASC X9 a preferred standard for organisations prioritising trust and collaboration. Prediction 8: Cryptography Bill of Materials (CBOM) Gains Traction In response to escalating cybersecurity threats, CBOMs will become a vital tool for ensuring digital trust by cataloging cryptographic assets and dependencies, enabling better risk assessments. Prediction 9: The Era of Manual Certificate Management Ends Manual management of certificates, still common in nearly a quarter of enterprises, will phase out as automation becomes indispensable for handling shorter certificate lifespans and stricter security protocols. Prediction 10: Organisations Will Continue to Prioritise Fewer Vendors Despite concerns about single-vendor risks and a peak of venture capital funding for AI startups, enterprises will continue to consolidate vendors to simplify management, improve integration, and enhance overall security practices. Future digital innovation “The relentless pace of innovation is not just reshaping our digital lives—it’s exposing new vulnerabilities faster than we can secure them, demanding a bold rethinking of how we approach cybersecurity,” said Jason Sabin, CTO at DigiCert. “The predictions for 2025 underscore the urgent need to stay ahead of these vulnerabilities by driving quantum readiness, enhancing transparency, and reinforcing trust as the bedrock of our rapidly changing digital ecosystem. DigiCert remains committed to shaping and securing future digital innovation to remain ahead of the vulnerability curve.”
On November 21, Ajax Systems hosted its sixth Ajax Special Event, an annual showcase of the company’s latest technologies and devices, which previously attracted over 2,000,000 online views. Moreover, 2024's offline events gather together professionals at 132 events in 43 countries. Product updates and releases The presentation focused on the product updates and releases across all Ajax portfolios: IndoorCam DoorBell MotionCam Outdoor HighMount (PhOD) Jeweller Hub BP Jeweller SpeakerPhone Jeweller Curtain Outdoor Jeweller Superior MotionCam HD (PhOD) Jeweller Superior MotionCam AM (PhOD) Jeweller LightSwitch (1-gang, 3-way, and 4-way) series The company also introduced a suite of software and service updates, improving integration, usability, and overall performance across the Ajax security ecosystem. Fire and life safety, comfort, and automation Ajax Systems has demonstrated that the products of different categories seamlessly integrate Ajax Systems has proven that it not only continues to take new heights in intrusion protection but also confidently navigates relatively new horizons of fire and life safety, comfort, and automation, as well as video surveillance. More so, Ajax Systems has demonstrated that the products of different categories seamlessly integrate into one Ajax system and enhance each other. Strategic changes Strategic changes in the Ajax portfolio segmentation were also unveiled. As a result, four new product categories were revealed: Intrusion protection, Fire and life safety, Comfort and automation, and Video surveillance. Such a comprehensive solution offers numerous benefits to end users and infinite business opportunities to professionals. Ajax Systems updates the segmentation of its portfolio Ajax Systems is a fast-growing company with a remarkable pace of releases. The portfolio grows by 30 unique products each year. However, such a remarkable pace has its side effects. The portfolio is becoming less clear as it grows. For this reason, it introduces its new segmentation - simpler, clearer, and intuitive. Several key changes Superior covers wireless Jeweller devices and wired Fibra devices intended for high-profile projects There are several key changes. First of all, there are four new product categories - Intrusion protection, Fire and life safety, Comfort and automation, and Video surveillance. Intrusion protection is further subdivided. It has two product lines: Baseline and Superior. Baseline encompasses wireless Jeweller devices; for intrusion only. Superior covers wireless Jeweller devices and wired Fibra devices intended for high-profile projects. The line also has dedicated hub models: Hub Hybrid (2G) and Hub Hybrid (4G). IndoorCam: a domesticated professional security Ajax Systems announces one of the most awaited Ajax products ever - IndoorCam, a Wi-Fi security camera with a PIR sensor, built-in AI, and a fallback communication channel. It is perfect for homes, restaurants, shops, or any other sites where using wired solutions would be an inconvenience. Equipped with a 4 MP camera, HDR, and IR illumination of up to 8 m, the device ensures a rich-in-detail image quality both day and night. The PIR sensor detects movement at a distance of up to 4 m, while built-in AI recognises people, pets, or vehicles. The camera also features a highly sensitive microphone and a top-notch speaker for two-way communication without echo or background noises. Availability: IndoorCam will be available to order in Q1 2025. DoorBell: Professional security at the front door While the video surveillance category is on the rise, it receives an obvious addition - Ajax DoorBell, a video doorbell with built-in AI, PIR sensor, and control via apps. DoorBell delivers excellent video and audio quality. Thanks to a 4 MP camera with HDR and IR illumination of up to 6 m, images are clear and sharp regardless of lighting conditions. In-house noise and echo canceling solutions and enhanced sound output enable users to talk and hear clearly, even in noisy environments. Communication range If the Wi-Fi connection is lost, DoorBell has a fallback communication channel with an Ajax hub What the Ajax team takes the most pride in is the doorbell’s communication capabilities. The main communication channel is the usual Wi-Fi but with an unrivaled communication range - up to 500 m in line of sight. It is up to 5 times more in comparison with the competitors’ solutions. If the Wi-Fi connection is lost, DoorBell has a fallback communication channel with an Ajax hub - Jeweller and Wings. The device never turns into a brick. Availability: DoorBell will be available to order in Q1 2025. Introducing MotionCam Outdoor HighMount (PhoD) Jeweller MotionCam Outdoor HighMount (PhOD) Jeweller is a versatile outdoor motion detector designed with exceptional installation flexibility. Due to the mounting height ranging from 2 to 4 m, wide horizontal and vertical viewing angles, and no blind spots, the device ensures comprehensive area coverage. It is a perfect fit for industrial facilities, construction sites, warehouses, office buildings, or private residences. Availability: MotionCam Outdoor HighMount (PhOD) Jeweller will be available to order in Q4 2024. Hub BP Jeweller: off-grid security made simple Protecting vacant property becomes even easier with the release of Hub BP Jeweller. It is a battery-powered control panel. It's ideal for protecting vacant houses, construction sites, empty office buildings, and other facilities that do not have a constant power supply. The device is available in two versions - with or without casing. The hub can be powered by internal batteries from Ajax or internal and external batteries from third-party manufacturers. Rechargeable or non-chargeable, they offer extended autonomy, especially in an advanced battery power saver (BPS) mode. ExternalAntenna Hub BP Jeweller is compatible with ExternalAntenna, an external antenna that helps to overcome barriers Hub BP Jeweller is compatible with ExternalAntenna, an external antenna that helps to overcome barriers to radio signals in challenging environments, such as reinforced concrete rooms. It ensures stable connection via Jeweller and Wings, as well as a cellular network. Availability: Hub BP Jeweller and ExternalAntenna are already available to order. Meet SpeakerPhone Jeweller, a module for audio alarm verification One of the brand-new products introduced at this year’s Ajax Special Event is SpeakerPhone Jeweller, the first voice module in the Ajax ecosystem. It is designed to help CMS operators assess the situation on a site in case of an alarm and respond swiftly if necessary. The operator can call the secured facility to talk to people on-site or listen to the background noises. Availability: SpeakerPhone is already available to order. Curtain Outdoor Jeweller: Keep false alarms at bay Curtain Outdoor Jeweller is a wireless curtain-type motion detector for outdoor perimeter protection. The device features a new optical system, three detection modes, and dual motion detection technology, all of which together mean a near-zero chance of false alarms. The movement is detected by a new optical system based on a Fresnel lens, two PIR sensors, and the latest generation of SmartDetect algorithm. Availability: Curtain Outdoor Jeweller is already available to order. News flash for the North American market Lately, the Ajax team has been focused on catering to the needs of the North American partners. In this pursuit, the company introduced the LightSwitch (1-gang, 3-way, and 4-way) series and Socket (type B) Jeweller to the market. These products offer all the benefits of the European versions but in a familiar form factor. Availability: LightSwitch [120] Jeweller will soon be available to order in Q1 2025. Other major announcements MotionCam Jeweller and MotionCam (PhOD) Jeweller delivers images of higher quality thanks to HDR technology, an improved optical system, and a CMOS sensor. The MotionCam series is also enriched with a new motion detector — Superior MotionCam HD (PhOD) Jeweller. Thanks to HDR, HD, and the new TurboWings protocol, users and PROs can receive outstanding-quality photos in less than five seconds. Yet another addition to Ajax's portfolio is Superior MotionCam AM (PhOD) Jeweller, a wireless motion detector with a top-notch anti-masing system, advanced photo verification, and a reduced blind spot. The portfolio of 19 fire and life safety devices is certified according to the most stringent standards worldwide and adapts to specific regulatory requirements. This way, Ajax has become the third manufacturer in the world to offer a Bukhoor mode. Dozens of Ajax devices have received French NFA2P certification, which makes them suitable for installation even in high-risk facilities. This certificate is a quality mark for consumers, insurance companies, and regulators. The video surveillance category has been expanded with JunctionBox, 12V PSU for NVR, and several significant software updates were released: Customizable video wall in the PRO Desktop app. Notification of object recognition by AI Direct video export feature for downloading videos up to 24 hours long. Temporary access rights for PRO accounts Video storage calculator and video device calculator for PROs. LightSwitch series is LightSwitch (Dimmer) Jeweller The new basic and smart outlets offer users even greater flexibility in controlling appliances The latest addition to the LightSwitch series is LightSwitch (Dimmer) Jeweller which allows for adjusting lighting brightness and setting the right mood in a room. The new basic and smart outlets offer users even greater flexibility in controlling appliances. And thanks to SurfaceBox [55], there are almost no limits as to where the devices can be installed. EN 50131 (Grade 3) certification Superior wired devices have obtained the EN 50131 (Grade 3) certification, which means that they can protect jewelry and arms stores, banks and financial institutions, ATMs, and other facilities. The number of Fibra installations is increasing by 30% each quarter, and the positive trend is bound to be reinforced thanks to the following wired Grade 3 releases. Superior DoorProtect G3 Fibra Superior MotionProtect G3 Fibra Superior SeismoProtect G3 Fibra Superior MultiTransmitter IO (4X4) Fibra Superior KeyPad Outdoor Fibra KeyPad Outdoor Jeweller Business opportunities in protecting remote sites Besides cutting-edge technologies, Ajax solutions can give rise to new business models. First, Ajax partners can sell and install security systems and outsource their maintenance. Second, they can provide turnkey security solutions and receive recurring revenue throughout the system's lifecycle. Lastly, there is an option to rent out the Ajax devices in their authentic form or as Ajax Ready products. Easy-to-understand interfaces and designs Ajax Systems ensures its hardware and software are ready to oppose ever-evolving physical and digital threats On the way to the safer world of tomorrow, Ajax Systems ensures its hardware and software are ready to oppose ever-evolving physical and digital threats. The company works on engaging an end user in their own safety by creating easy-to-understand interfaces and designs. It takes care of professionals to simplify and optimize their operations and empowers them to focus on business development rather than the routine. Core principles And most importantly, Ajax Systems never goes against its core principles of releasing impeccable products only Partner insights dashboard, an all-in-one interface that encompasses partner status, certification, achievements, and essential performance metrics. Many hours of new content from Ajax Academy. Specializations on the re-imagined Where-to-buy page on the Ajax website, which give partners a competitive advantage. The new Ajax system configurator and an upcoming customized configurator page. The sixth Ajax Special Event is a testimonial to the fact that the Ajax integrated system is a unique solution that offers infinite opportunities for professionals. With Ajax, they can meet the needs of the widest range of clients, take on any projects, both routine and ambitious, and effortlessly enter into new business verticals. Ajax Next Along the way, Ajax Systems tries to share its passion for hardware development with the Ukrainian youth. The company has been investing in technical education across Ukraine, equipping students with essential engineering theory and hands-on experience. Through an educational initiative called Ajax Next, the company has launched training programs and internships at Ukraine’s largest universities and equipped four laboratories. This initiative will continue to bring both small- and large-scale projects to life for Ukrainian students in the future.
Sonatype, the end-to-end software supply chain security platform, and OpenText are partnering to offer a single integrated solution that combines open-source and custom code security, making finding and fixing vulnerabilities faster than ever. Together, Sonatype’s Software Composition Analysis (SCA) solutions and Static and Dynamic Application Security Testing (SAST/DAST) from Fortify by OpenText offer a comprehensive, integrated security solution spanning the entire software development lifecycle. State of the Software Supply Chain® Report Sonatype’s 2024 State of the Software Supply Chain® Report found that in 2024, some critical vulnerabilities took more than 500 days to fix. By combining Sonatype’s open-source governance with Fortify’s advanced application security testing, organisations can detect, prevent, and remediate vulnerabilities with maximum efficiency. Solution benefits Enterprises leveraging this integrated solution experience: End-to-end software supply chain security: Robust protection for both open source and proprietary code, ensuring comprehensive coverage across the entire application stack from the first line of code to production. Streamlined DevSecOps practices: Automated security checks seamlessly integrate into CI/CD pipelines, ensuring that developers can maintain their velocity without compromising security. Automated efficiency: AI-powered tooling to streamline auditing, security prioritisation, licencing, and more across custom code and open source. Optimised risk mitigation and compliance: Early detection of security issues, unified reporting, and prioritised remediation, helping organisations meet regulatory requirements and manage risks effectively at scale. SCA solutions "At Sonatype, we’re dedicated to empowering organisations to take ownership of their software supply chain security without sacrificing speed and agility. Partnering with like-minded organisations like OpenText is critical to furthering this mission,” said Tyler Warden, Vice President of Products at Sonatype. “In uniting our innovative SCA solutions with Fortify’s proprietary code security tools to create this single pane of glass platform, we make it easier for developers and security teams to eliminate technical debt, maintain visibility, and quickly respond to security risks.” Visibility and quick response “The best partnerships lean into each organisation’s unique strengths in support of a common goal. Sonatype and OpenText offer best-in-class code security solutions that, when combined, streamline security across the entire software development lifecycle,” said Dylan Thomas, Senior Director of Engineering and Product for Application Security at OpenText. "I am excited for our continued joint evolution and innovation to enable safe, secure, and fast software development.” Hundreds of global organisations leverage the integrated Sonatype and Fortify by OpenText solution to be ambitious, move fast, and do it securely.
Gunnebo Entrance Control has launched an innovative enhancement to its preventative maintenance offering, as a connected service to maximise equipment uptime, extend asset value, and support more sustainable operations. EntraServe Connect from the global pioneer in entrance control security solutions, enables organisations across high-demand environments, such as offices, stadia, and critical infrastructure sites, to keep their systems performing smoothly with minimal interruption. Gunnebo’s specialist teams The proactive approach maintains uptime and extends the value of each entrance control solutions Through real-time remote monitoring, Gunnebo’s specialist teams can detect potential issues early, allowing quick corrective action before issues arise. This proactive approach maintains uptime and extends the value of each entrance control solutions by reducing the need for extensive on-site maintenance and costly unexpected repairs. "Our clients rely on Gunnebo Entrance Control to ensure secure, efficient access. The launch of EntraServe Connect takes us to the next level of service offering," said Emilia Taskinen - VP of Customer Service and Recurring Revenue of Gunnebo Entrance Control. Repair requirements Taskinen added: "This connected service allows us to deliver smarter, faster maintenance and effectively prevent downtime, providing an elevated level of reliability, sustainability, scalability and peace of mind to grow with our customers." Longer-lasting equipment and reduced repair requirements contribute to lower lifecycle costs and a smaller environmental footprint, aligning with sustainable operational goals. Advanced analytics Gunnebo Entrance Control provides serial visibility into the health of each client's tools With EntraServe Connect, Gunnebo Entrance Control provides continuous visibility into the health of each customer’s equipment. Advanced analytics deliver actionable insights that enable predictive maintenance, further extending equipment longevity and reducing the frequency of in-person service visits. This responsive service not only ensures seamless people flow but also supports environmental sustainability by reducing energy usage and prolonging equipment life cycles. Gunnebo’s preventative maintenance Emilia concludes: “As businesses across the globe face increasing legislative demands for efficiency and data management, EntraServe Connect offers the proactive tools required to keep operations running smoothly and compliantly. And by combining remote monitoring with advanced diagnostics, we’re empowering our customers to take control of their equipment health, reduce operational disruptions, and extend the lifespan of their assets – all while contributing to a greener future.” EntraServe Connect is available across Gunnebo’s preventative maintenance tiers to integrate seamlessly into its full-service portfolio. The additional option of the EntraLinq app enables the management and monitoring of systems, whether on-site or remotely, at all times.
Expert commentary
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Security beat
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Case studies
High-quality skin care products, developed using the latest technologies and manufactured sustainably: the international Babor Beauty Group is represented in more than 70 countries with its sought-after beauty brands. Research and development as well as production take place at the company's headquarters in Aachen, Germany, while filling and logistics are located just a few miles away in Eschweiler. Use of digital process In 2023, the family enterprise inaugurated a cutting-edge production facility here, known as the “Babor Beauty Cluster”. Around half a million jars, tubes, and ampoules are filled there every day, and logistics and shipping are also handled on-site. A special feature of the 60,000 sq.m plant is its extensive use of digital processes for working and operating as efficiently as possible. The fully networked complete solution from Bosch Building Technologies for safety, security, and building management makes a valuable contribution to this. Greater safety, security, comfort, and efficiency The smart solution integrates, among other things, fire protection, intrusion alarm, and access control systems The smart solution from Bosch Building Technologies was precisely tailored to meet the Babor Beauty Group’s requirements. It integrates, among other things, fire protection, intrusion alarm, and access control systems, as well as a video security solution for safeguarding the perimeter and premises. AI-based video security for fast, frictionless reception The AI-based video security solution analyses every captured image while using predefined rules and only triggers an alarm if at least one of them is met. This avoids false alarms, thus enabling even more effective security management. The solution from Bosch Building Technologies also includes a digital visitor management system that saves time with a self-registration function. It ensures fast, frictionless reception of guests and tradespeople and includes audit-proof archiving, which significantly eases the workload of Babor’s operating team. Smart truck and parking space management The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording Another highlight is the smart truck and parking space management with license plate detection for user-friendly access control. Properly secured loads are also automatically documented. The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording to provide comprehensive documentation of the process. Management system for control across sites The Babor Beauty Group’s technical operations and facility management team is responsible for both the company’s headquarters in Aachen and the production and logistics cluster in Eschweiler. The safety and security systems of both sites have therefore been integrated into the “Building Integration System 360” from Bosch Building Technologies. Centralised management platform This centralised management platform provides control of all building systems, enabling Babor Beauty Group's operations and management team to respond efficiently to security-related events. The solution is also flexibly scalable to facilitate the integration of future site extensions. Bosch Building Technologies will operate this complete solution for the next ten years within the scope of a build-operate-transfer model.
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."
360 Vision Technology, the UK manufacturer of ruggedised HD, radar and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Invictus TX cameras for STC car parks Daniel Chappell, Technical Account Manager at North takes up the story: “Historically, South Shields had an existing public safety CCTV system, which was mainly street focused. However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate to a new surveillance solution, to cover its twelve town centre car parks.” He adds, “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirement and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation.” Low-cost video transmission Daniel Chappell continues, “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibre optic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive.” He further states, “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling.” Securing the best 4G network supplier The new Invictus PTZ TX cameras are now securing STC car parks with video streaming Daniel Chappell adds, “Taking-up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross referenced with network operators to provide the best quality of signal at each specific camera location.” Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are now securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. Control room monitoring In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said: “This investment forms part of wider improvements to our CCTV provision, which is a vital tool in helping to keep our residents and visitors safe.” Reliable video system for monitoring the cameras He adds, “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security and management of the car parks. Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real time more quickly and effectively.” Councillor Jim Foreman continues, “The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness and surveillance.” Close-up imaging and enhanced night-time vision The 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens Featuring continuous rotation pan, unobstructed 360-degree view and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. Daniel Chappell explains, “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available.” Advanced functionality Daniel Chappell adds, “This advanced functionality offers peace-of-mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras are now providing comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Integrated LED white light technology Adrian Kirk, Business Development Director at 360 Vision Technology, commented: “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks.” Adrian Kirk adds, “For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper and more defined colour images, even at night-time. We are proud to have delivered a practical Invictus TX based camera solution as part of the STC CCTV network upgrade.”
HID, a worldwide pioneer in trusted identity and access control solutions, announced that Deskbee, a global provider of corporate space management solutions, has integrated HID Mobile Access and Identity Positioning technologies into its platform. With an already robust workplace management application, Deskbee wanted to enhance security and optimise operational efficiencies by integrating digital credentials and real-time positioning into its platform. HID Mobile Access With HID Mobile Access, Deskbee app users can employ their smartphones and tablets to securely access facilities, eliminating the need for physical cards and reducing the risks associated with lost or misused credentials. This implementation not only enhances convenience and security but also seamlessly integrates with existing systems, simplifying the issuance and revocation of credentials from a single platform. Identity Positioning technology By analysing occupancy data, managers can optimise space planning, improve resource allocation Furthermore, Identity Positioning technology enables building managers to track employee and visitor locations in real-time, providing valuable insights for optimising space planning and resource allocation. By analysing occupancy data, managers can optimise space planning, improve resource allocation (such as energy, water, and HVAC), and enhance overall operational efficiency. Secure, efficient, and personalised experience “The integration of HID’s Mobile Identities solutions demonstrates the enormous potential that application development companies have to transform access control systems and workplace management,” said Rogerio Coradini, HID’s Commercial Director of Physical Access Control in Latin America. “Through collaboration with HID, developers of mobile platforms and applications can adapt to the changing needs of the market and provide a more secure, efficient, and personalised experience for their clients.” Detailed monitoring and improved access management Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage Due to HID mobile identity technologies, Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage, providing accurate data on occupancy, location, and duration of stay. “The ability to automate the registration process and improve access management has been a significant change. HID's reliability and support have been fundamental to these advancements, and we are seeing how these results are positively impacting our clients. The trust in the brand and its support has been essential to our success,” said Gorguet. Employee badge integration Headquartered in Brazil, Deskbee has experienced rapid growth, consolidating its position in the Brazilian market and expanding its operations to more than 25 countries, including Mexico, Chile, Argentina, the United States, Portugal, Spain, Germany, and the United Kingdom. Still this year, the company will offer employee badge integration with Google Wallet, also powered by HID technology.
Round table discussion
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden costs of energy consumption and environmental consequences can also impact the measure of TCO. Costs of training, integration, support, and scalability can also be examined. Considering the security industry impact of TCO, we asked this week's Expert Panel Roundtable: How does/should total cost of ownership (TCO) impact the decision-making process when choosing technologies for security?
Products
White papers
Top 7 trends to watch in the physical security industry
DownloadTroubleshooting IP video systems
DownloadSimple Security Solutions for SMBs
Download5 question check-up: Test your camera's cybersecurity
DownloadHow to migrate to an IP-based access control system
DownloadSix ways to eliminate costs, risks and disruption to your network
DownloadThe critical importance of Trusted Execution Environment in access control
DownloadSecurity investments retailers should consider for their 2021 budget
DownloadOptimise your business with analytics and AI
DownloadMaking sense of today’s security camera options
DownloadHow to drive B2B security & operations with smart surveillance
DownloadMaking your surveillance cyber secure
DownloadIs access control in the cloud more cost effective?
DownloadWhat are the security technology needs of the hotel sector?
DownloadNetwork Security Redefined: IP-Enabled Access Control
DownloadVideos
IP security solutions: Manufacturers & Suppliers
- Hikvision IP security solutions
- exacqVision IP security solutions
- Dahua Technology IP security solutions
- Honeywell Security IP security solutions
- Bosch IP security solutions
- AV Costar IP security solutions
- LILIN IP security solutions
- Pelco IP security solutions
- Axis Communications IP security solutions
- Messoa IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- BCDVideo IP security solutions
- Vicon IP security solutions
- Climax Technology IP security solutions
- Avigilon IP security solutions
- Software House IP security solutions
- eneo IP security solutions
- Illustra IP security solutions
- AMAG IP security solutions
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download