Machine Learning
Kaseya, the global provider of AI-powered cybersecurity and IT management software released its 2024 Future of IT Survey Report, which surveyed IT service providers from the Americas, EMEA, and APAC regions. Based on the report, increasing IT productivity through automation and AI usage are among the top priorities, while IT cybersecurity remains an area for growth, with IT service providers anticipating it will be one of its primary investment areas. AI Investment: AI taking centre stage AI...
There is much discussion amongst telecommunications companies about the automation journey of networks, and rightly so because artificial intelligence (AI), machine learning (ML), and pressure on carriers to increase margins from connectivity whilst protecting prices, are proving powerful agents for change in their market. Impact of hybrid connectivity However, there’s one other development that is not receiving enough attention, and that’s the impact of hybrid connectivity - the b...
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an impor...
Espria, the pioneer in digital workspace solutions, will host its next Optimise IT 2024 panel discussion, discussing how IT solutions with integrated AI technologies are best suited to support businesses and operation teams in 2024 and beyond. IT panel discussion Throughout 2024, Espria has hosted discussions on various topics, covering themes such as business peace of mind and business readiness. These discussions have featured key spokespeople from some of their pioneering IT solutions partn...
Integrity360, one of the pan-European cyber security specialists announced its partnership with Darktrace which will see Integrity360 act as a reseller for Darktrace’s entire portfolio of IT/OT services and initially offer the Darktrace/DETECT and RESPOND/Network™ solutions as part of its Managed Detection and Response (MDR) offering. Darktrace/DETECT and RESPOND provide threat detection and autonomous response capabilities to address the burgeoning attack surface across the extende...
Delvitech, a pioneer in 3D automated optical inspection for assembled printed circuit boards leveraging artificial intelligence, has joined forces with Eurotech, a global innovator in ultra-high-performance Edge AI Computers, to revolutionise quality control technology. Delvitech's patented integrated optical inspection technology, designed to collect comprehensive data to drive neural networks in optical inspection, gains crucial support from Eurotech's hardware. This collaboration boosts...
News
Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, they will merge with the cloud-based video surveillance solutions provider, Arcules. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics and video surveillance as a service (VSaaS), providing a complete video technology offering. A vision for the future The VSaaS market is predicted to experience exponential growth within the following years and at the same time Artificial Intelligence (AI) is creating new possibilities that were not possible just a year ago. By adding Arcules to Milestone’s product line, the company is optimally positioned to lead the video technology software industry. This merger represents a transformative leap, combining robust video management with the agility and scalability of the cloud and the promise of leveraging AI. Combining forces is a bold step towards pioneering advancements in the rapidly growing VSaaS market. Insights from video data The combination of these strengths will provide significant market advantages With the rise of AI, they have the potential to derive insights from video data and support decision intelligence. The merger offers unparallelled ability to exploit the rapidly changing AI landscape from on-prem to cloud and both Milestone and Arcules are advanced in working with video analytics. The combination of these strengths will provide significant market advantages. Based in Irvine, California, Arcules was spun out from Milestone in 2017. The decision to reunite the companies is driven by a shared vision to deliver intelligent, data-driven video technology that empowers customers to make better decisions and optimise their operations. Common DNA Thomas Jensen, CEO of Milestone Systems, said: “Milestone and Arcules have a strong existing partnership and a common DNA. By uniting and working as one, we can provide a world-class offering that suits many different needs and gives customers greater freedom of choice. As one company, we will shape the future of open-platform video technology.” Andreas Pettersson, CEO of Arcules, said: “We are excited to rejoin Milestone, a global pioneer and trusted partner. This merger will accelerate our growth and innovation, delivering greater value to our customers and partners. Together, we are committed to realising our vision of empowering people, businesses, and societies through intelligent video solutions.” The merger is scheduled to be finalised by the end of the year.
HID, a worldwide pioneer in trusted identity and physical access control solutions, announces the 2024 State of Physical Access Control Report, identifying five key trends that are shaping the future of access control. Produced by IFSEC Global in partnership with HID, the report surveyed over 1,200 security professionals across the globe to paint a picture of an industry that has been going through considerable transformation. Conducted between November 2023 and January 2024, the survey reveals five trends, as follows: Mobile access and digital ID set to become ubiquitous While physical ID is still prevalent within the access control industry, there is no doubt that mobile access credentials and digital IDs are quickly gaining ground. According to this report, nearly two in five organisations (39%) now actively use mobile identities with respondents naming touchless/contactless solutions (48%) and mobile access (44%) as the two largest trends shaping the wider access control industry. Open standards driving the smart buildings phenomenon Open standards have become key drivers for more converged security solutions, where physical access control data is helping not just to decide who should be allowed into the building, but also how that building can best be used. As the report shows, almost half of organisations (48%) already have access control/badge scanning systems in place to monitor building usage throughout the day, at least to some extent. Additionally, 43% of respondents cited smart buildings and flexible workspaces being among the top three trends shaping the wider access control industry. Integration with other business functions was also listed by one in three respondents (32%) as another top trend. Sustainability becoming a greater influence on business decisions Sustainability is playing a significant role in access control with nearly two-thirds (63%) of respondents citing that those with responsibility for sustainability have either some influence or are fully consulted when it comes to upgrading physical access control systems. The rise of artificial intelligence for analytics use cases The use of Artificial Intelligence capabilities in physical access control is becoming more common as AI technologies and expertise are developed. Asked if they are looking to incorporate AI/machine learning into their access control solutions, 38% of them stated they were (although the same percentage said they were unsure of the benefits). Only 23% said they didn’t have any plans to incorporate AI technologies. Growing role of biometrics – especially contactless solutions The biometrics market is growing at a rapid pace. By 2031 the worldwide market for biometrics is expected to reach $136.18 billion while the global facial recognition market alone is predicted to grow to $16.74 billion by 2030, up from $3.83 billion in 2020. That’s a CAGR of 16% from 2021 to 2030.
The ALSO UK Cloud Summit 2024 hosted a panel of security industry experts this month to explore the latest trends, developments and challenges in artificial intelligence (AI) and cybersecurity for cloud resellers and British SMEs. The expert panel looked at the importance of generative AI (GenAI) in the modern cloud landscape, revealing that 87% of organisations believe AI offers a competitive edge. 2024 has been a big year for generative AI (GenAI), specifically with the launch of Microsoft Copilot for the SMB market. And with continual advancements in technology innovation, it is important that MSPs and cloud resellers not only keep up but stay ahead of the curve. Keynote speakers at this year’s event included David Bowen, Global Business Development Director for Microsoft, and Robert Pritchard, founder of The Cyber Security Expert. Best practices in 2024 and beyond “The ALSO UK Cloud Summit 2024 is a celebration of our key security vendor partners and an opportunity for cybersecurity industry leaders to continue the conversation on best practices in 2024 and beyond,” commented Mark Appleton, Chief Customer Officer for ALSO Cloud UK. “Through bringing together industry experts from our top security vendor partners, ALSO is pioneering the conversation in presenting a unified security strategy for MSP cyberteams." “One message was clear: generative AI presents the biggest security challenges to British MSPs and SMEs. New cyber threats are rapidly developing as GenAI has become more accessible for cyber actors to exploit. The bar of entry for cyberattacks has been lowered, with ransomware attempts becoming easier to create – as they are no longer limited to those with advanced cyber skills to enact them.” 87% of organisations believe AI offers a competitive edge Microsoft’s David Bowen discussed the benefits of Microsoft’s long-term partnership with ALSO In addition to the security challenges posed by GenAI, it is also a key source of business growth for the future of SME operations. In his opening keynote, Microsoft’s David Bowen discussed the benefits of Microsoft’s long-term partnership with ALSO, and how MSPs can support their customers in implementing AI and Copilot tools successfully to accelerate growth. “ALSO and Microsoft have been successful partners for over 25 years, and we are unified in our missions to empower people and organisations to achieve more through technology,” said Bowen. “With Copilot we expect to continue the value add of AI to organisations and we are working with ALSO and their partners to develop the best customer use cases for AI. It’s important that AI and Copilot projects are more successful when partners support projects to securely implement, support and deliver AI ROI for customers. ALSO partner ecosystem Bowen added: “In the latest Work Trends Index published in May, we found that 79% of organisations believe AI is a business imperative, however, 60% of companies lack a plan and vision to implement the technology, this is where the ALSO partner ecosystem can support customers develop a strategy that quantifies the productivity gains of AI. " “The study also found that 75% of workers are already using AI, and of these 78% are bringing their own AI tools for tasks. These lack the needed levels of security, data protection and compliance, leaving organisations' data exposed. MS Copilot is already enabling much greater productivity levels, allowing teams to spend less time on repetitive tasks and spend more time working on more creative and impactful work." "Employees are also advised to look at developing AI Skills, the study highlighted that 66% of leaders would not hire staff unless they have AI skills. The ALSO AI Academy is a fantastic resource for partners to ensure AI training is accessible for employees to develop capability and support the Era of AI.” The importance of GenAI in the modern cloud landscape Robert Pritchard, founder of The Cyber Security Expert highlighted the importance of AI in the modern cloud landscape. “The world has changed completely in recent years, with cloud-first dominating as the best solution, even though securing it is not without challenges. The old model (‘on-prem’ and trusted network) is outdated, and legislation for service providers is coming as the risk to critical infrastructure now dependent on modern technology services needs protection more than ever.” Other highlights from the ALSO UK Cloud Summit ‘24 included: Cybersecurity expert Acronis showcasing the dangers of AI-boosted ransomware attempts, as well as the latest AI tools being developed to counter malicious actors. Password manager LastPass outlined the ongoing compromised credential crisis and the urgent need to address poor cyber-hygiene practices. Security awareness solutions expert Vade explained how easy and accessible hacking has become with GenAI with their “10 mins to make you a hacker” talk. CrowdStrike demonstrated the potential of GenAI tools when used for good in boosting cybersecurity efforts. AvePoint outlined the business expansion benefits of tools such as Copilot for MS365. Future of enterprise security ALSO’s Mark Appleton summarised: “Since ALSO launched in the UK last year, we have cemented ties with our trusted security vendor partnerships. These alliances are not just a benefit but a necessity, and this year’s ALSO UK Cloud Summit has been a great way to celebrate our partners and our unique offering whilst paving the way for the future of enterprise security." “Our security vendor partners provide the very best cybersecurity for their clients. By working closely with all of our partners, we not only share insights and collaborate on the best security methods but also provide the very best tailored options for our client base. ALSO is committed to offering solutions that aid in protecting modern businesses across the channel and beyond.”
MOBOTIX celebrates its 25th anniversary this year. Founded on June 21st by Dr. Ralf Hinkel, Sabine Hinkel and Klaus Borchers in 1999, MOBOTIX revolutionised the video technology market with the world's first decentralised video camera. Influenced by the strict German data protection regulations, MOBOTIX cameras were designed with image data security at their core. MOBOTIX continues to set standards when it comes to data protection, cyber security and longevity in video technology. MOBOTIX ONE platform To mark MOBOTIX’s 25th anniversary, the company launched its new MOBOTIX ONE platform that combines its 'Made in Germany' values with software driven by artificial intelligence and deep learning. MOBOTIX has created a powerful community of technology partners and experts In its 25 years, MOBOTIX has created a powerful community of technology partners and experts which enables the company to be at the forefront of technological innovations and customised solutions. These solutions—ranging from healthcare and energy supply to public sector and manufacturing—are powered by highly intelligent systems that are protected by the toughest cybersecurity. Commitment to innovation and quality "We are celebrating our 25th anniversary internally at our summer party in Langmeil," says Thomas Lausten, CEO of MOBOTIX AG. “Externally, the launch of the MOBOTIX ONE on our 25th anniversary will be a significant milestone that underlines our commitment to innovation and quality. We are proud of our history and look forward to continuing to make the world safer and better with our technology and in line with our vision 'Beyond Human Vision'."
Artificial Intelligence and Machine Learning (AI and ML) are recognised as important parts of the future of cyber security and cloud security. But how integrated are these technologies in cybersecurity functions currently? A recent survey by Check Point and Cyber security Insiders asked hundreds of professionals from across different industries how they’ve been using AI so far, how much of a priority it is for their companies, and how it has impacted their workforces. Adoption of AI and ML Where does AI in cyber security stand right now? Several questions on the survey asked respondents about the state of AI in their organisations’ cyber security plans as of now, including how fully implemented it is and how that implementation is going. Their responses paint a picture of an industry that is moving slowly and cautiously, and perhaps hasn’t gone as “all-in” on AI as some may expect. Organisations still seem to be evaluating the benefits and risks associated with AI and ML tools, and businesses are moving carefully to establish firm best practices that comply with relevant regulations. Organisations still seem to be evaluating the benefits and risks associated with AI and ML tools When asked to describe their organisation’s adoption of AI and ML in cyber security, 61% of respondents described it as being either in the “planning” or “development” stages – significantly more than the 24% who categorised it as “maturing” or “advanced.” Additionally, 15% of those surveyed said that their organisations haven’t implemented AI and ML into their cyber security efforts at all. Clearly, while the selling points of AI for cyber security efforts are persuading many businesses to start exploring their potential, few businesses have fully embraced them at this point. Applications of AI and ML in cyber security Another question on the survey got more specific, asking respondents “Which cyber security (cloud) functions in your organisation are currently enhanced by AI and ML?” The answers are illuminating, with malware detection leading the way at 35%, with user behaviour analysis and supply chain security following right behind. Towards the bottom of the list, fewer organisations look to be using AI for security posture management or adversarial AI research. Taken together with the responses to the previously discussed question about the overall state of AI, the data shows that individual applications of AI and ML in cyber security are still far from being universal. One reason that AI adoption hasn’t raced along at a faster pace is the challenge of navigating a rapidly shifting regulatory landscape. In these early days, laws and government guidance is still evolving around AI and cyber security. Businesses can’t afford to take risks when it comes to compliance and keeping up with these rapid changes can be complex and resource-intensive. Incorporating AI into cyber security operations How are organisations approaching AI for cyber security going forward? Despite the slow and cautious adoption of AI in cyber security so far, it’s almost universally regarded as an important priority going forward with 91% ranking it as a priority for their organisation, and only 9% of those surveyed said it’s a low priority or not a priority at all. The excitement is obvious – but there are challenges in the way of realising this potential Respondents clearly see the promise of AI to automate repetitive tasks and improve the detection of anomalies and malware, with 48% identifying that as the area with the most potential. Additionally, 41% see promise in reinforcement learning for dynamic security posture management using AI – especially interesting when compared to the only 18% who are currently using AI for this function. The excitement is obvious – but there are challenges in the way of realising this potential. Beyond specific applications, respondents were asked to identify what they see as the biggest benefits of incorporating AI into cyber security operations. The most popular answers included vulnerability assessment and threat detection, but cost efficiency was the least-popular answer, at just 21%. Likely due to the pricey challenge of regulatory compliance and the cost of implementation, AI isn’t currently viewed as a significant money-saving tool for most who answered. Concerns and conflicting attitudes around AI in cyber security 49% identified new skills being required by AI, and 35% noted redefined job roles Additional questions on the survey provided insight into professional concerns and a lack of clarity about some of the fundamentals of AI and cyber security. On the subject of the impact of AI on the cyber security workforce, it’s apparent that this is still an open question without clear answers yet. 49% identified new skills being required by AI, and 35% noted redefined job roles. And while 33% said that their workforce size has been reduced as the result of AI, 29% said that their workforce size has actually increased. Implementing AI into cyber security is clearly a work in progress, and while greater efficiency is a promise that might be realised in the future, for now, many businesses are actually having to hire more people to integrate the new tech. Notably, there was a significant split in the answers to the question: Do you agree with the following statement: “Our organisation would be comfortable using Generative AI without implementing any internal controls for data quality and governance policies”? While 44% disagreed or strongly disagreed with the statement, 37% said that they would agree or strongly agree. It’s very rare to see such a substantial split on a question like this on a professional survey, and that split seems to indicate a lack of consensus – or perhaps simply a lack of awareness regarding the importance of internal controls and governance policies when AI is involved. The Check Point perspective It is clear that AI plays a crucial role in enhancing cyber security measures and asset protection, especially when integrated with the product portfolio, allowing them to automate repetitive tasks, improve threat detection and response, and provide significant value to customers. This technology is going to define the future of cyber security, and Check Point is positioned to help companies make the most of it. It’s important to note that the successful implementation of AI requires thoughtful integration and governance. To see the combination of increased efficiency and accuracy that AI can offer, customers must carefully consider how they integrate AI into their existing systems and processes. Appropriate governance mechanisms are crucial to ensure that AI is used responsibly and effectively. Strategic consulting services will be required in the future for customers looking to implement AI into their businesses in the most secure and effective way.
IRClass Systems and Solutions Pvt Ltd (ISSPL), announces the launch of a Digital Centre to offer a wide range of technology solutions. The Digital Centre, located in Mumbai, was inaugurated by the Chairman of ISSPL – Mr. Arun Sharma. The Digital Centre will provide a comprehensive suite of services to help organisations navigate the digital landscape across maritime and non-maritime sectors. New cybersecurity services ISSPL recognises the critical importance of cybersecurity in the digital landscape. The company’s new cybersecurity services offer tailored solutions to safeguard organisations from evolving cyber threats, which include vulnerability scanning and penetration testing. The centre also includes an Internet of Things (IoT)/Operational Technology (OT) testing lab and will offer services like digital forensics, AI, ML, and blockchain. At the launch event, Mr. Arun Sharma, Chairman of ISSPL, said: "The ISSPL Digital Centre serves as a comprehensive cybersecurity solution for all maritime and non-maritime needs. With a commitment to excellence and customer satisfaction, ISSPL aims to be the trusted partner for organisations seeking to confidently navigate the digital landscape."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialogue and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organisation so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organisation. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of the machine and deep learning algorithms to recognise or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the colour of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours Analytics, on the other hand, refers to the process of analysing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behaviour. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognise. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behaviour information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilised. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organisation. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realise that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the colour of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognise something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognise unique, customisable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organisation might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognise that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Case studies
Indexable inserts are interchangeable cutting tools that are indispensable in various industrial applications, especially in metalworking. They are used as cutting material carriers for machining metals, plastics or wood. Their manufacture requires high-precision production processes to ensure an exact geometry and perfect surface finish. Even minimal deviations affect not only the service life but also the performance of the cutting insert. The smallest defects that are invisible to the human eye can cause immense damage, for example when milling or cutting high-quality components - including consequential costs. Careful quality control is essential to ensure that only flawless indexable inserts leave the production process and meet the high requirements in terms of durability and reliability. A flagship project by automation and measurement technology specialist Xactools from Germany demonstrates how artificial intelligence can help visual inspection make quantum leaps. The German medium-sized company has developed a fully automated handling and inspection system for a global manufacturer of indexable inserts based in Scandinavia, in which the DENKnet solution for AI-based image evaluation plays a decisive role and sets new standards in terms of performance, zero-defect production and speed. Application Edges of the indexable inserts are rounded and ground, and their covers are blasted, ground and coated Around 1.2 million indexable inserts leave the Scandinavian company's production halls every week, which have to guarantee the highest possible process reliability and maximum productivity in the metalworking, automotive and aerospace industries, for example. They are manufactured using the sintering process, in which powdered metals, hard metals and other materials are pressed into the desired shape and then sintered, i.e., bonded together under heat and pressure. The strong and robust structure created in this way makes it possible to combine materials with different properties in order to achieve the desired cutting and wear resistance properties. After the sintering process, the edges of the indexable inserts are rounded and ground, and their surfaces are blasted, ground and coated. The Robotvision system from the Swabian engineers is used directly after the second manufacturing step, the sintering process. "The earlier defects are detected in the process, the better and cheaper it is to rectify them," says Marvin Krebs, Director Technical Sales at Xactools, explaining the system's position. A total of eight high-resolution industrial cameras and two spider robots are used to handle and inspect the indexable inserts for defects, which keep an eye on and load three rotary table nests and finally one pin pallet each. DENKnet's AI forms the heart of the complex image processing system between cameras, robots and a multi-GPU computing rack. Requirements The AI-based image evaluation software used had to be trained to correctly recognise As versatile as the areas of application of the small tool parts are, so varied are their properties and geometries. This manufacturer alone has around 2,800 products in its portfolio, which can be divided into almost one hundred geometry families. The aim was to automate handling and defect inspection for all of these. "The first challenge results from the numerous colour variations within the powder per pressing process," explains Marvin Krebs. "If certain parameters such as time, pressure or positioning vary, this leads to colour or gloss level deviations or to a different distribution of speckles on the surface, but this is not a defect." The AI-based image evaluation software used had to be trained to correctly recognise the numerous possible colour deviations of the surfaces and rate them as "OK". On the other hand, the smallest irregularities such as cracks, scratches, inclusions or other anomalies must be recognised as such and classified as "NOK". The inspection of metal surfaces is considered one of the highest skills of surface inspection, as their texture can be matt, shiny or even reflective. "The AI had to be extremely trained to variations and lighting conditions for this application," emphasises Marvin Krebs. AI results for the metal components The customer himself trained the customised image analysis solution with the DENK VISION AI Hub But in addition to the visual appearance, it is also about the insert geometry. Categories such as triangle, rectangle, rhombus or square can be found in countless variations due to the smallest deviations and are therefore divided into manageable subcategories, so-called geometry families. Xactools made the pre-selection for the training of the meshes; almost one hundred geometry families were defined and then taught in by the manufacturer itself. What sounds like a laborious undertaking was done surprisingly quickly. "No more than 20 to 30 images were needed to teach each geometry family," recalls Marvin Krebs. The DENKnet palletising AI used for this purpose uses the DENKnet segmentation and classification network. The customer himself trained the customised image analysis solution with the DENK VISION AI Hub. The AI was integrated into the production line in just a few months and achieved almost perfectly reliable AI results for the metal components to be tested right from the start. "Indexable inserts identified as defective are sorted out and grouped according to the size and position of the defect. The AI image analysis detects more than 99 percent of production errors," adds Daniel Routschka, Sales Manager Artificial Intelligence at IDS Imaging Development Systems GmbH. But how exactly does the system work? A lighting screen measuring 1 x 1 metre provides extremely high illumination at the palletising stations A total of eight cameras with resolutions between 5 and 30 megapixels provide live images of the indexable inserts, which are positioned by magnetic or interchangeable grippers. For example, a camera records the individual indexable inserts from below and from above in order to check them for surface defects. Two other cameras check their cutting edge. A lighting screen measuring 1 x 1 meter provides extremely high illumination at the palletising stations. "The system detects defects in the thousandth of a millimetre range," emphasises Marvin Krebs. This ensures that no damage is caused to the high-end surfaces to be processed later. This is because "uneven and faulty milling processes can potentially impair profitability and competitiveness", as the manufacturer also knows. To prevent this from happening during the production process and to exercise the greatest possible caution, the system also records images of the contour and position of the panels after inspecting the surfaces and edges. New versions of indexable inserts The contour of the insert and the outer edge of the gripper are detected in order to correct the position It can see exactly where and in which rotational position the indexable insert is positioned so that the magnetic gripper can finally place it on pin pallets. To ensure this, the gripper, to which the indexable insert is attached, moves over a camera that detects the exact position of the hole from below. At the same time, the contour of the insert and the outer edge of the gripper are detected in order to correct the position of the indexable insert and hit the pin if necessary. In addition, each individual pin position is detected in order to recognise bent and broken pins so that they are not palletised in the first place. "The system has been running for six months and the self-learning, global AI now recognises parts that it has never seen before. After just three to four months, new versions of indexable inserts no longer had to be trained for inspection. The underlying geometry is no longer relevant for the AI; it knows the contour and can also differentiate between IO and NIO for new parts," explains Marvin Krebs. High-performance AI image analysis with 99% picking efficiency The image analysis of live images from eight cameras via a DLL requires enormous computing power For Marvin Krebs, the added value of the DENKnet system compared to conventional image processing is obvious: "Without AI, the creation of part families and defect detection would be completely unthinkable. With rule-based image processing, the robot would also recognise parts within the standard range as NOK and sort them out." In addition, thanks to the Vision AI Hub, no hard coding is necessary, and the flexibility of the networks was another selection criterion for the intelligent DENKnet software. "We were able to easily embed the DENKnet palletising AI and several object classes for defects into our own Xactools image processing software via an API," says Marvin Krebs. However, the performance of the solution is almost unique. The entire inspection process takes place in a cycle time of four seconds, with almost 100% picking efficiency. The image analysis of live images from eight cameras via a DLL (Dynamic Link Library) requires enormous computing power. "We work with DENKnet for a good reason. The performance is not comparable with that of other providers, it is truly excellent," emphasises Marvin Krebs. "Using artificial intelligence in the most diverse variants on this scale has never been done before." Further variations are currently being tested, for example, to further simplify hole detection. Outlook The extremely varied surfaces and geometries as well as intolerances in the thousandths of a millimetre range make the visual inspection of indexable inserts a supreme discipline that can be transferred to many other demanding applications. The self-explanatory training environment DENKnet serves as an incomparably simple and at the same time high-performance tool, because it can be operated without programming knowledge and enables the automated training of AI with just a few clicks. A wide range of Vision AI technologies are available for this purpose. "This solution can be customised to any use case and there are no limits - no matter how many “classes”, which camera technology, how large or small the images or even how mixed the data sets are in terms of resolution and type, for example," adds Daniel Routschka, Sales Manager Artificial Intelligence from IDS. "Over 95 percent of our measuring and testing systems have at least one AI object class integrated. The potential areas of application are getting bigger and bigger for us, the market is growing," confirms Marvin Krebs. Promising prospects for this exemplary automated AI training for the highest demands.
Liberty Defense Holdings Ltd., a pioneering provider of next-generation, Artificial Intelligence (AI) based technologies for the detection of concealed weapons and other threats, is pleased to announce that its HEXWAVE™ system has been purchased by a major international airport in New York to support its aviation worker security screening program. “We are thrilled to have received the award following a public tender and to be chosen to support the airport's aviation worker screening requirements,” said Bill Frain, CEO of Liberty Defense. “The flexibility and comprehensive detection capability that HEXWAVE offers are driving widespread interest in the system from across the aviation sector. It is highly portable and can be rapidly deployed both indoors and outdoors to seamlessly facilitate screening in various areas of the airport." Physical screening procedures In April 2023, the Transportation Security Administration (TSA) issued an Airport Security Program National Amendment, which will require U.S. airports to adopt physical screening procedures for employees with access to secure-side areas. HEXWAVE enables rapid, automated, high-throughput screening using a contactless, walkthrough portal that can detect a diverse range of threats well beyond what enhanced metal detectors on the market can detect. It uses millimetre wave, advanced 3D imaging, and AI to detect all types of concealed threats, including both metal and non-metal items, liquids, powders, plastic explosives, 3D-printed ghost guns, and other novel threats or prohibited items – without the passenger having to divest common items like keys, wallets, or phones.
Creating a calm learning environment where all children feel safe is a challenge for secondary schools, and for new students, in particular, they can be an intimidating place. Badly behaved pupils can disrupt others and sometimes will damage school property. Advanced detection devices, can tackle anti-social behaviour and problems associated with increasing numbers of students that are vaping. By installing a smart sensor schools can ensure that staff time is not consumed by a minority of troublemakers. These can be placed discreetly in private areas, such as school toilets and changing rooms, that would be unsuitable for video camera surveillance. Aggression detection feature Schools have found that the increasing number of students vaping within its toilets becomes a difficult issue to manage and is often associated with anti-social behaviour but monitoring can help. An aggression detection feature allows for the monitoring of anti-social behaviour. By applying machine learning a smart device can learn what the normal sound levels are and alerts when a threshold above normal is detected for a specified length of time. An aggression detection feature allows for the monitoring of anti-social behaviour The device can then pick up when a number of children have gathered together, students shouting, signs of fighting or pupils potentially being bullied by others. An alert will be sent by email to designated staff when abnormal noise levels are detected and action can be taken quickly. This means that perpetrators of aggression against other students or those vandalising school property within toilets can be stopped and dealt with as soon as an incident occurs. Being able to do this should act as a deterrent but also mean that repeat offenders can be dealt with more effectively by the school. Most advanced monitoring devices Security and monitoring firm has been aiding schools in Worcestershire and elsewhere Security and monitoring company, Ecl-ips, has been helping schools in Worcestershire and elsewhere, by supplying one of the most advanced monitoring devices, the HALO Smart Sensor. John Speller, Facilities Manager at Hanley Castle High School, near Malvern, reported that after installing the monitoring devices, “We have really cracked down on antisocial behaviour in our toilet blocks.” Matthew Carpenter, principal at Baxter College in Kidderminster, said: “It has transformed the amount of antisocial behaviour in toilets, children are more confident in going to the toilets. It has also reduced the number of students asking to go to the toilet during lessons.” Vapes laced with THC Meanwhile, there have also been concerns by schools about vapes laced with THC, with some Burnley school children reportedly hospitalised last year. The HALO is the only vape detector on the market that can alert and differentiate between vaping, vaping with THC and intentionally masking vaping behaviour, for example, by using aerosols to cover up vaping. Charlotte Slattery, Deputy Head Teacher at St Joseph’s College in Stoke-on-Trent, said she would recommend the HALO Smart Sensor to: “Any schools who are struggling to get on top of vaping in schools, or indeed aggression, in the toilets.”
Cequence announced that the world's largest navigation device manufacturer has chosen the Cequence bot detection and mitigation solution API Spartan, part of the overall Unified API Protection (UAP) platform, to secure its e-commerce experience and deliver a frictionless shopping experience for its customers. The company joins an already elite roster of clients, standing alongside industry giants spanning diverse sectors such as beauty, retail, government, telecommunications, systems integration, international voice traffic carriers, online automotive, motorcycle enthusiasts, and marine classifieds. Boosting online security As the company aimed to boost online security, it faced alarming numbers: about 100 million SSO login requests monthly, with 15 to 20 percent flagged as malicious. They also uncovered significant financial risks, with account takeovers costing anywhere from $50 (£40) to $12,000 (£9,500) each. Ignoring these unsettling numbers might have spelled financial disaster for the business, potentially surpassing the billion-dollar mark. Lack of behavioural analysis The previous solution relied solely on identifying bots based on bad IP addresses, which proved inadequate In light of the company’s previous experience with a prominent internet security provider that utilised rudimentary bot protection methods, it became evident that their efficacy in stopping malicious bots was compromised. The previous solution relied solely on identifying bots based on bad IP addresses, which proved inadequate in detecting many sophisticated malicious bots due to the lack of behavioural analysis. Consequently, the navigation device manufacturer faced challenges in effectively mitigating bot attacks and ensuring business continuity and customer experience. Cequence API Spartan Recognising the limitations of their existing bot protection measures, the customer sought a more proactive and comprehensive bot management solution like Cequence API Spartan to safeguard their business continuity, protect their online assets, and enhance the overall customer experience. Cequence's ability to distinguish genuine users from bots in real-time and adapt to evolving bot tactics resonated with the company, offering a reliable and future-proof solution to their bot problem. Proactive and comprehensive bot management "Bots aren't just a technical nuisance; they're customer experience assassins,” said Ameya Talwalkar, CEO of Cequence. “Imagine loyal customers, eager to purchase your products, locked out by an army of automated bad actors." "The frustration, lost sales, and reputational damage are a nightmare scenario no business can afford. That's why Cequence is dedicated to providing solutions that go beyond simple bot detection. We empower companies to proactively safeguard their legitimate customers and foster a thriving online environment where trust and genuine interactions flourish." Vulnerability due to automated bot attacks The OWASP API Security Top 10 highlights the vulnerability of poorly secured APIs to automated bot attacks. This blurs the line between traditional API and bot attacks, requiring unified security solutions that address both. Key features of Cequence API Spartan As the only API security solution with bot management capabilities, Cequence provides the navigation device manufacturer with: Continuous Behaviour-based API Threat Detection: Cequence leverages the behavioural fingerprint created by a machine learning-based analytics engine to track sophisticated attacks continuously. Supported by the largest API threat database in the world, with millions of behavioural and malicious infrastructure records, the analysis results are translated into policies and models that can be implemented on day one for high-efficacy protection. Integrated Security Ecosystem: While Cequence offers native real-time attack mitigation capabilities, it seamlessly integrates with existing security solutions such as web application firewalls (WAFs). This collaborative approach ensures holistic protection, allowing organisations to leverage the strengths of multiple security tools for enhanced API security and threat mitigation. Protection in Minutes: Cequence can be enabled to protect your APIs and web applications in as little as 15 minutes and can immediately begin reducing the operational burden associated with preventing attacks that can result in fraud, data loss, and business disruption. Advanced AI and machine learning The current e-commerce environment is increasingly vulnerable to bots exploiting loopholes in business logic. Cequence offers a robust solution to protect web and mobile applications, as well as their underlying API infrastructure, from business logic abuse. Leveraging advanced AI and machine learning, Cequence analyses incoming traffic to effectively identify and thwart even subtle attempts at exploitation.
The North Syracuse Central School District (NSCSD), a K-12 public school district in Central New York state, serves the communities of North Syracuse, Clay, Cicero, Bridgeport, and Mattydale. With 11 elementary, middle, and high schools, the district covers almost 90 square miles and has 7,792 students and approximately 700 teachers. With some of its school buildings over 60 years old, the district needed to renovate many of them, some more urgently than others. As part of the process, district administrators and staff re-evaluated all infrastructure elements and their approach to campus safety, selecting AtlasIED IPX technology to modernise their intercom, audio announcements, and emergency communications systems. Audio communications technologies Schools in the district used alike audio communications technologies had been in use for 10-20 years The district began renovating in phases, prioritising schools based on the state of the school buildings and the level of urgency of repairs. Before renovations, the schools in the district used similar audio communications technologies that had been in use for 10-20 years, including the public address (PA) system, clocks, and blue light systems for emergencies. However, the systems were siloed and did not integrate. During routine use, such as all-school announcements at the beginning of school days, the system functioned as needed, but during drills, the number of systems in operation caused the school's challenges. "With the old system, when we conducted a lockdown drill, school staff needed to activate the different systems manually, which created steps and more possibilities for human error," said Matt Erwin, Director of Facilities for North Syracuse Central Schools. Erwin manages maintenance and operations, plus security, health, and safety, and the capital work for the district. AtlasIED's IPX Series features The district had two primary goals when upgrading the campus audio and communications systems: to improve the audio quality and find a plan to increase the speed at which a school could react and contact first responders during an emergency. They wanted to achieve these goals without having to install a system that was too complicated for staff and personnel. Because the district used a Cisco phone system, Erwin and his team wanted a platform that integrated with these devices. AtlasIED's IPX Series features a range of communication endpoints that interconnect As they researched and discussed options, their partners at Day Automation, a building automation and security solution provider, introduced them to AtlasIED, which they eventually chose as their long-term audio and communications solution. The AtlasIED IPX Series met all of the criteria for the district. AtlasIED's IPX Series features a range of communication endpoints that interconnect. The IPX endpoints integrate multiple functions into single products, including loudspeakers, two-way microphones, flashers, and an LED display for a clock, date, or other text-based messages that can be updated in real-time during an emergency. Bear Road and Smith Road Elementary School Projects Karl W. Saile Bear Road Elementary, known simply as Bear Road Elementary, became the district's first school to install a new audio and communications system. Originally built in 1958, Bear Road Elementary was one of the district's oldest buildings. During the Bear Road project, the school renovated half the building at a time to avoid a full closure and completely modernised the interior and infrastructure to accommodate staff and student needs. The team at Day Automation identified locations for IPX endpoints throughout the school and ran an Ethernet cable to each site in preparation to connect the endpoints. The IPX endpoints are Power over Ethernet (PoE+)-enabled, receiving power and network signals through the same IT network the school uses to deliver Internet access. The IPX platform helped simplify the installation process for integrators by reducing the number of cable types needed. IPX endpoints School expanded and updated its campus IT network and created plans to locate IPX endpoints Another NSCSD school, Smith Road Elementary, began its retrofit project in 2022 to update various technologies, including its audio and communications technology systems, and upgrade building infrastructure. Working around class schedules to avoid disrupting students, the school expanded and updated its campus IT network and created plans to locate IPX endpoints. Once the construction teams pulled Ethernet cabling to predetermined locations in both schools, the contractor teams began installing IPX endpoints, including the dual-sided IP-DDS endpoint mounted from side walls and hung over high-traffic areas like hallways. They also added IP-SDMF indoor wall-mount endpoints in classrooms, the main office, the cafeterias, the gymnasiums, the nurses' office, and all rooms to ensure comprehensive building coverage. On the ceilings, the district installed the IP-8SM in multiple locations, which offer a loudspeaker and an omnidirectional microphone to allow two-way communication and monitoring from the speaker location to any PC or phone handset. Mass Communications through Singlewire and IPX Software directly sends text messages to faculty, students, and parents' mobile devices The IPX Series also helped NSCSD incorporate campus safety capabilities with the help of InformaCast® Mass Notification Software from Singlewire®. Using InformaCast, during an emergency, designated school personnel can initiate the software from a mobile device wherever they are on or off campus. The software then instantaneously sends text messages to faculty, students, and parents' mobile devices, alerts law enforcement, and activates attention-grabbing audio communication, flashing visual alerts, and LED text messages on the installed IPX devices throughout campus. Also, using InformaCast, the IP-8SM ceiling speakers can be configured to allow first responders to communicate with people near the loudspeaker or listen in to that area. The speakers can be critically important when personnel, students, or perpetrators barricade themselves in classrooms or other rooms. When connected to InformaCast, the loudspeakers become a critical two-way hands-free communications tool for law enforcement or school personnel to deliver directions, provide or receive real-time updates near the speak location, or listen to activities within a space. The loudspeakers are especially important when staff, students, or perpetrators barricade themselves in classrooms or other rooms. New AtlasIED systems Gone are the days when we had to find a panic button or go to a specific location to access the PA system" The district has implemented new routine and emergency safety procedures in the schools with InformaCast and IPX due to the upgraded capabilities offered by the technology. It has begun to train staff regularly to help them become more familiar with operating the equipment. Training staff for both routine operation and operating the system during an emergency when people are under much more stress has the potential to lead to human error. This is why automating the system using pre-recorded messages offered via InformCast can help reduce the chance of human error during a real incident. While the expectation is that much of the system's use will be for routine daily announcements, InformaCast software helps automate many of the formerly manual steps in the older system's procedures. "Gone are the days when we had to find a panic button or go to a specific location to access the PA system," said Erwin. "The new AtlasIED systems give us much more functionality at every point within the building. Based on the successful installation at Bear Road and Smith Road, we now look at mass notification across the entire district differently." What the Future Holds From the district's experience at Bear Road Elementary and Smith Road Elementary, it plans to install IPX and InformaCast throughout the rest of the district school buildings. As plans develop and ongoing training continues at the schools currently outfitted with IPX and InformaCast, Erwin and his team are eager for additional school buildings to use the new technology and create a better and safer experience district-wide for the students and staff moving forward.
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages of AI and machine learning (ML) also include automating repetitive tasks, analysing vast amounts of data, and minimising human error. But how do these benefits apply to the physical security industry, and is there a downside? We asked this week’s Expert Panel Roundtable: What are the benefits, and drawbacks, of using artificial intelligence (AI) in physical security?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionise physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?
Ideally, every new product or technology serves a need in the market, but not all new products are created equal. The impact of some new technologies is so profound that they make us rethink our preconceptions and may create a total transition in the broader market. These are the technologies we call “game changers” because they prompt a significant shift in the current manner of doing or thinking about security. We asked this week’s Expert Panel Roundtable: What current technology is a “game changer” for physical security?
White papers
![AI in security solution](https://www.sourcesecurity.com/img/white-papers/612/920x533_1697466392.png)
AI in security solution
Download![Unlocking wide-angle camera dewarping](https://www.sourcesecurity.com/img/white-papers/612/920x533_1681742017.jpg)
Unlocking wide-angle camera dewarping
Download![Empowering cameras with AI](https://www.sourcesecurity.com/img/white-papers/612/azeena.gif)
Empowering cameras with AI
Download![The rise of ethical facial recognition](https://www.sourcesecurity.com/img/white-papers/612/ethics-facial-recognition-920.jpg)
The rise of ethical facial recognition
Download![Connected video technology for safe cities](https://www.sourcesecurity.com/img/white-papers/612/milestone-safe-city-video-technology-920.jpg)
Connected video technology for safe cities
Download![How security systems ensure healthy workplaces during COVID and after](https://www.sourcesecurity.com/img/white-papers/612/healthy-workplace-920.jpg)
How security systems ensure healthy workplaces during COVID and after
Download![Artificial intelligence: Understanding its place in physical security](https://www.sourcesecurity.com/img/white-papers/612/american-dynamics-920.jpg)
Artificial intelligence: Understanding its place in physical security
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download