Mergers & Acquisitions
AnywhereNow, a pioneer in transforming customer experience across the contact centre with AI solutions, has announced the appointment of Michael de Paris as the New Head of Partners and Michael Sharelis, the new Head of Sales: North America. These strategic positions come as the company takes a bold step forward to accelerate its global growth plans and further strengthens its partner ecosystem on the back of significant growth and recent rebrand. Microsoft Teams integration According t...
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, announced that it has successfully completed its SOC 2 Type 2 audit, demonstrating the Company’s continued adherence to high standards of data security, availability, and confidentiality. This achievement confirms the effectiveness of AITX’s internal controls and security protocols across its subsidiaries, further strengthening the Company’s position as a t...
Nutanix, a pioneer in hybrid multicloud computing, and Pure Storage®, the IT pioneer that delivers the world’s most advanced data storage platform and services, announced a partnership aimed at providing a deeply integrated solution that will allow customers to seamlessly deploy and manage virtual workloads on a scalable modern infrastructure. This integrated solution comes at a pivotal time for customers as the virtualisation market evolution is top of mind. IT pioneers are focused o...
Cyber threats are a major concern for all industries, with increased sophistication, and ransomware attacks reaching their highest levels in four years, according to the World Economic Forum's (WEF) Global Cybersecurity Outlook 2025 report. To address this growing problem, EclecticIQ, the pioneering provider of threat intelligence solutions, has announced a strategic partnership with TeamT5, the premier threat intelligence company specialising in advanced persistent threat (APT) research in the...
JFrog Ltd, the Liquid Software company and creators of the award-winning JFrog Software Supply Chain Platform, announced a significant milestone: delivering the world’s first universal artifact management solution to natively support 40 unique package types, clients and technologies. This milestone solidifies JFrog's status as the gold standard for cloud-native artifact management (powered by JFrog Artifactory), designed to enable organisations to ensure reliability, security and per...
After several years of hosting the Partner Connections event in the USA and, most recently, Latin America, Alarm.com, the pioneering platform for the intelligently connected property, is pleased to announce its upcoming popular and highly respected European Partner Connections event, taking place on May 6–8, 2025, in the idyllic setting of Ibiza, Spain. This exclusive three-day gathering will bring together a selection of Alarm.com’s key partners from across Europe for strategic di...
News
Marking its 4th edition, the Mozambique Energy & Industry Summit (MEIS 2025) is proud to announce its highly anticipated return, taking place in the dynamic province of Cabo Delgado – the heart of Mozambique’s natural gas discoveries. As one of Africa’s most exciting energy frontiers, Cabo Delgado is rapidly emerging as a global focal point for LNG development. By convening MEIS in the very heart of the energy industry, the summit underscores its unique role as a catalyst for collaboration, investment, and dialogues. Future of Mozambique’s energy MEIS will unite government pioneers with national and international companies and industry experts MEIS will unite government pioneers with national and international companies and industry experts to drive meaningful conversations and forge strategic partnerships that will shape the future of Mozambique’s energy and industrial landscape. As part of this year’s summit, MEIS will also spotlight ACLM Future Generations – a pioneering program designed to bridge the gap between current energy pioneers and the innovators of tomorrow. Mozambican workforce Led by ACLM, in partnership with MozYouth, the initiative fosters collaboration between seasoned professionals and aspiring young talent, with a strong focus on skills development, entrepreneurship, and employment readiness. By investing in youth empowerment, ACLM is committed to building a resilient and skilled Mozambican workforce that can sustainably drive the nation’s energy ambitions forward. Energy development ACLM is committed to building a resilient and skilled Mozambican workforce that can sustainably drive The full MEIS 2025 agenda has now been released, Elthon Chemane, Chairman of MEIS and Founder of ACLM commented; “MEIS creates a platform for stakeholders to engage directly where the opportunities lie, and to ensure that energy development translates into growth for Mozambique." "We are honoured by the overwhelming support already shown by the key pioneering industry players”. Mozambique Energy & Industry Summit 2025 The Mozambique Energy & Industry Summit 2025 will bring together over 400+ delegates and 40+ thought pioneers drawn from across government, pioneers from the energy and industry sectors and global experts. Hosted by the Provincial Government of Cabo Delago, MEIS 2025 will take place 2-4 July at the Avani Pemba Hotel, Cabo Delgado.
Everon, LLC, a pioneering security integrator and premier provider of commercial security, video, fire and life safety solutions in the U.S., announced its award of a Sourcewell cooperative purchasing contract in the state and local government category. This contract allows Everon to expand its extensive portfolio of offerings and services to public agencies across the U.S. Cost-effective and efficient solutions Sourcewell serves government, education, and nonprofit corps across the U.S., including all 50 states Sourcewell serves government, education, and nonprofit organisations across the U.S., including all 50 states, Washington D.C., and U.S. territories. It operates as a national cooperative purchasing organisation, leveraging the collective buying power of over 50,000 participating public sector agencies to help them streamline procurement through pre-negotiated, competitively solicited contracts to secure cost-effective and efficient purchasing solutions. Security, video, fire and life safety “Our agreement with Sourcewell demonstrates the tangible value in working with Everon. We can help public agencies across the country optimise savings and avoid delays in the purchasing process,” said Scott Wulforst, Sr. Director, State and Local Government Programs for Everon. “We are excited to be a Sourcewell-approved vendor and look forward to working with K-12 schools, higher education institutions, and state and local municipalities as a critical resource and all-in-one provider to support their security, video, fire and life safety needs.” Local procurement requirements Everon secured the Sourcewell contract following a rigorous RFP process Everon secured the Sourcewell contract following a rigorous request for proposal (RFP) process, ensuring compliance with local procurement requirements and delivering exceptional value and service. The contract grants any public agency access to purchase from Everon through a ready-to-use, Sourcewell-vetted contract, streamlining the public purchasing process. Sourcewell-approved vendors “We’re excited to welcome Everon to our elite group of Sourcewell-approved vendors,” said John Caddy, Associate Director of Cooperative Contracts for Sourcewell. “Everon’s deep experience in the security, fire and life safety industry for the public sector as well as their ability to scale nationally made them a standout choice during our competitive solicitation process.” Range of solutions and services Under the contract, Everon can provide public agencies nationwide with streamlined, cost-effective access to a wide range of solutions and services tailored to their facilities’ needs, including: Access control systems Intrusion alarm systems Video systems, remote monitoring Fire alarm, sprinkler Gunshot detection Installation, service, and maintenance Advanced smoke, heat, and gas Mass notification and emergency Ancillary services, lights Visitor management Testing and inspections 24/7/365 UL-listed monitoring
Intercede, a pioneering digital identity management company, announced the launch of its latest version of MyID CMS that enables the management of Passkeys with Microsoft Entra ID. Administrators can now use the credentials management system to seamlessly manage FIDO Passkeys on devices including the Yubico YubiKey family of products, that can then be used to securely authenticate to Entra ID protected resources. Integrating Entra ID’s robust FIDO2 The solution enables corps to use seamless, secure authentication methods by combining the strengths The solution enables organisations to use seamless, secure authentication processes by combining the strengths of the Intercede, Yubico, and Microsoft technology platforms. By integrating Entra ID’s robust FIDO2 provisioning API’s with MyID CMS and YubiKeys, enterprises can now implement an end-to-end secure issuance and life cycle management solution for FIDO Passkeys, whether in Cloud or Hybrid Entra ID solutions, manage PKI and FIDO credentials on a single YubiKey, as well as support for using a Passkey as a Derived Credential. Key highlights of MyID 12.14 Entra ID Capabilities Compliance with NIST SP800-63B digital identity guidelines Simplified FIDO passkey issuance and lifecycle management Manage passkeys alongside other credential types such as certificates Applying expiry dates to passkeys – automatically revoke the credential for fixed term workers, or for temporary passkey usage Support for passkeys as a derived credential, compliant with NIST SP800-157 Compliance with NIST standards "This collaboration represents a significant step forward in enterprise credential management," said Allen Storey, Chief Product Officer at Intercede. "Our integrated solution enables customers to issue and manage passkeys at the highest level of security in compliance with NIST standards, making the use of passkeys in high-assurance environments a reality." Implementation of passkey technology with Entra ID Natee Pretikul, Principal Product Management Lead at Microsoft Security, commented: "At Microsoft, we are committed to transforming enterprise security through the implementation of passkey technology with Entra ID." "Our newly developed FIDO2 provisioning APIs, coupled with collaborations with industry partners such as Intercede and Yubico, enable us to deliver comprehensive authentication solutions that can be deployed and managed at scale.” Yubico’s trusted hardware-based authentication The combined solution addresses growing enterprise needs for robust, flexible, and user-friendly Jeff Wallace - SVP Product at Yubico, stated: “By integrating Yubico’s trusted hardware-based authentication in the YubiKey with Intercede’s MyID CMS and Microsoft Entra ID, we are empowering organisations to securely manage the lifecycle of FIDO passkeys with a streamlined, end-to-end solution, that also includes previously available authentication protocols.” Wallace added: “This collaboration ensures enterprises can uphold the highest security standards while simplifying credential management for both cloud and hybrid environments.” Identity verification strategies The combined solution addresses growing enterprise needs for robust, flexible, and user-friendly phishing-resistant authentication systems. By eliminating traditional complexity in credential management, the collaboration empowers organisations to implement more agile and secure identity verification strategies.
Asian IR Summit officially kicks off, May 6, at the Galaxy International Convention Centre in Macau, bringing together top executives from both local and international travel and integrated resort sectors. Over the next three days, industry pioneers will engage in high-level discussions, addressing the challenges shaping the future of the industry. The Asian IR Expo exhibition, co-located with G2E Asia, opens at May 7-9, at The Venetian Macao, with complimentary shuttle service to ensure seamless access between the two venues throughout the event. Macao government tourism office opens summit The Asian IR Summit will continue to spotlight key industry trends, including emerging technologies Asian IR Summit proudly opened with a keynote address by Maria Helena de Senna Fernandes, director of Macao Government Tourism Office, setting the tone for the day with key insights into the integrated resort sector, particularly in Macau. The day’s theme focuses on the industry and hospitality, featuring speakers including Wade Howk, Chief Operating Officer of Inspire Entertainment Resort; Jeffrey Kiang, Equity Analyst of CLSA; and Angel Sueiro, Chief Operating Officer of PH Resorts Group, who explore the opportunities and challenges of incorporating non-gaming components into integrated resorts across the Asia region. Over the next two days, the Asian IR Summit will continue to spotlight key industry trends, including emerging technologies, the rise of sportainment and the evolution of next-generation entertainment. Celebrating the finest in gaming and entertainment Introducing the G2E Asia Awards, recognising excellence and innovation across the industry. Winners will be announced the day before the exhibition, with honours given in five key categories: Best Slot Award, Best Electronic Table Game Award, Best Table Game Award, Best Casino Supply Award, and Best IR Tech Solution Award. All winning and nominated products will be showcased in the exhibition, allowing attendees to experience them firsthand. May 7-9 exhibition highlights The pioneering joint event is expected to attract over 10,000 visitors from 80 countries and regions. Event highlights include: New Smart Hospitality Technology Experience Zone offering an immersive and interactive onsite experience. Technology Zone and Tech Talk showcasing the latest advancements from emerging industry brands. New Gaming Innovation Forum highlighting cutting-edge innovations from G2E Asia Awards nominees across the gaming industry. Targeted Networking Events for professionals from the slots, table games, MICE and marketing industries.
With its worldwide online “Eplan L!VE” event on 14 May, this time around solutions provider Eplan is guest at Eaton in Hengelo. Enquiring minds can gain first-hand experience about how Eaton's facility in the Netherlands has optimised all its processes in engineering and manufacturing for maximum efficiency. In just two-and-a-half hours, online attendees will get a compact overview how new ideas and tried-and-tested solutions for greater productivity look on the ground. News on Eplan’s portfolio and strategies round off the programme. Benefits of a data-driven approach Dutch facility saw the benefits of a data-driven approach and recast its engineering method How can processes in engineering and switchgear system manufacturing be designed to be highly efficient? How can manufacturing be further automated? These are questions that Eaton in Hengelo asked itself years ago. The Dutch facility saw the benefits of a data-driven approach and converted its entire engineering methodology, including its processes, to work with Eplan. Eplan L!VE, now in its third round as an online format, will provide fascinating insights into this. Under the motto of “Forward Thinking from Design to Manufacture” will be streaming directly from Eaton’s production facility. New manufacturing approaches Attendees from around the world are invited to this online event to discover new manufacturing approaches that generate greater profitability in engineering and manufacturing. By the way, these approaches are in no way restricted to just larger corporations, but are also tailored for SMEs. Eaton took a “one step at a time” approach and, depending on the task at hand, it can all be implemented at smaller control and switchgear system manufacturers. An in-depth look into engineering and manufacturing Eaton uses EEC to generate schematics, bills of materials, terminal diagrams and cabling lists Well over 1,500 attendees from around the globe will be tuned in online when the Eaton specialists will be showing how the in-house control and switchgear system design and manufacturing has been optimised for a high degree of automation and efficiency. The Eplan solutions used here play a decisive role – ensuring that a standardised foundation of data based on the digital twin is available from first designs all the way through to manufacturing. And if that weren’t enough, Eaton also uses Eplan Engineering Configuration (EEC) to automatically generate schematics, bills of materials, terminal diagrams and cabling lists – based on a new design methodology using functional engineering. Whereas the effort previously involved in updating documents linked to the schematics, including bills of materials, terminal diagrams and wiring lists, was immense, now these are all automatically kept up to date with Eplan. This is possible because everything goes back to a centralised source of data. Integration of manufacturing The company’s deep integration of manufacturing into this process is also bearing fruit – using Eplan Pro Panel, control cabinet layouts are designed in 3d, completely digitally, and the data provided is used for automatic cable routeing. The Wire Terminal WT from Rittal Automation Systems can produce up to 1,000 wires per day, all fully automatically. The processing of copper rails can also be simplified with machines from Rittal Automation Systems. All the processes for wiring and manufacturing are designed to be extremely efficient and overall processes benefits from greater consistency based on the data from Eplan. Sneak preview and strategy Also of interest is the direct access to device data in the Data Portal from Eplan Electric P8 in the future These in-depth insights into Eaton’s design and manufacturing processes will be rounded off with a sneak preview of the upcoming Eplan Platform 2026. As just one example, on 14 May attendees with get a first look at how the different views in Eplan Pro Panel accelerate 3D navigation. Also of interest is the direct access to device data in the Data Portal from Eplan Electric P8 in the future. Last but not least, the new single-line technology in Eplan Preplanning is interesting for users who want to logically link symbols and components in the preplanning phase. Online event attendees can also expect a glimpse into the future of engineering: Eplan CEO Sebastian Seitz will be presenting Eplan’s future strategy and some highlights on future topics – including use cases on the topic of artificial intelligence. Background Eaton as the global intelligent power management company, has been a technology partner in the Eplan Partner Network since 2023 and specialises in the development, production and sales of power distribution systems, LV and MV switchgear systems and control devices at its facilities in Hengelo in the Netherlands. Eaton additionally provides a large number of its energy systems and components via directly integrated selectors in the Eplan Data Portal. The manufacturer also uses Eplan solutions for its in-house control system and switchgear system design and construction. Machines from Rittal Automation Systems simplify the company’s manufacturing processes – including the Rittal Wire Terminal WT and machines for processing copper rails.
Camden Door Controls has introduced the industry's first 1/2" RIM Strike with 15 lbs. preload. Camden 1299 Series strikes are Grade 1 rated, with UL 1034/294 and ANSI/BHMA listings. Available in brushed stainless steel or black finish, these 1299 strikes offer 'Universal' performance with selectable 12/24V, AC/DC voltage, and fail-secure/fail-safe operation. Latch monitor included. 1299 Series Preload RIM strikes 1299 Series strikes are packaged with 1/8" and 1/4" spacer plates to accommodate up to 3/4" latch projection. A metal marking jig is also included in the package, making installation fast and easy. 1299 Series Preload RIM strikes avoid the most common cause of strike failure by withstanding up to 15 lbs. of pressure against the strike's keepers (jaws). Preload pressure can be caused by differences in air pressure on each side of the door (particularly a stacking effect common in stairwells), a misaligned door, or simply someone pushing on the door before the strike is unlocked.
Marking its 4th edition, the Mozambique Energy & Industry Summit (MEIS 2025) is proud to announce its highly anticipated return, taking place in the dynamic province of Cabo Delgado – the heart of Mozambique’s natural gas discoveries. As one of Africa’s most exciting energy frontiers, Cabo Delgado is rapidly emerging as a global focal point for LNG development. By convening MEIS in the very heart of the energy industry, the summit underscores its unique role as a catalyst for collaboration, investment, and dialogues. Future of Mozambique’s energy MEIS will unite government pioneers with national and international companies and industry experts MEIS will unite government pioneers with national and international companies and industry experts to drive meaningful conversations and forge strategic partnerships that will shape the future of Mozambique’s energy and industrial landscape. As part of this year’s summit, MEIS will also spotlight ACLM Future Generations – a pioneering program designed to bridge the gap between current energy pioneers and the innovators of tomorrow. Mozambican workforce Led by ACLM, in partnership with MozYouth, the initiative fosters collaboration between seasoned professionals and aspiring young talent, with a strong focus on skills development, entrepreneurship, and employment readiness. By investing in youth empowerment, ACLM is committed to building a resilient and skilled Mozambican workforce that can sustainably drive the nation’s energy ambitions forward. Energy development ACLM is committed to building a resilient and skilled Mozambican workforce that can sustainably drive The full MEIS 2025 agenda has now been released, Elthon Chemane, Chairman of MEIS and Founder of ACLM commented; “MEIS creates a platform for stakeholders to engage directly where the opportunities lie, and to ensure that energy development translates into growth for Mozambique." "We are honoured by the overwhelming support already shown by the key pioneering industry players”. Mozambique Energy & Industry Summit 2025 The Mozambique Energy & Industry Summit 2025 will bring together over 400+ delegates and 40+ thought pioneers drawn from across government, pioneers from the energy and industry sectors and global experts. Hosted by the Provincial Government of Cabo Delago, MEIS 2025 will take place 2-4 July at the Avani Pemba Hotel, Cabo Delgado.
Everon, LLC, a pioneering security integrator and premier provider of commercial security, video, fire and life safety solutions in the U.S., announced its award of a Sourcewell cooperative purchasing contract in the state and local government category. This contract allows Everon to expand its extensive portfolio of offerings and services to public agencies across the U.S. Cost-effective and efficient solutions Sourcewell serves government, education, and nonprofit corps across the U.S., including all 50 states Sourcewell serves government, education, and nonprofit organisations across the U.S., including all 50 states, Washington D.C., and U.S. territories. It operates as a national cooperative purchasing organisation, leveraging the collective buying power of over 50,000 participating public sector agencies to help them streamline procurement through pre-negotiated, competitively solicited contracts to secure cost-effective and efficient purchasing solutions. Security, video, fire and life safety “Our agreement with Sourcewell demonstrates the tangible value in working with Everon. We can help public agencies across the country optimise savings and avoid delays in the purchasing process,” said Scott Wulforst, Sr. Director, State and Local Government Programs for Everon. “We are excited to be a Sourcewell-approved vendor and look forward to working with K-12 schools, higher education institutions, and state and local municipalities as a critical resource and all-in-one provider to support their security, video, fire and life safety needs.” Local procurement requirements Everon secured the Sourcewell contract following a rigorous RFP process Everon secured the Sourcewell contract following a rigorous request for proposal (RFP) process, ensuring compliance with local procurement requirements and delivering exceptional value and service. The contract grants any public agency access to purchase from Everon through a ready-to-use, Sourcewell-vetted contract, streamlining the public purchasing process. Sourcewell-approved vendors “We’re excited to welcome Everon to our elite group of Sourcewell-approved vendors,” said John Caddy, Associate Director of Cooperative Contracts for Sourcewell. “Everon’s deep experience in the security, fire and life safety industry for the public sector as well as their ability to scale nationally made them a standout choice during our competitive solicitation process.” Range of solutions and services Under the contract, Everon can provide public agencies nationwide with streamlined, cost-effective access to a wide range of solutions and services tailored to their facilities’ needs, including: Access control systems Intrusion alarm systems Video systems, remote monitoring Fire alarm, sprinkler Gunshot detection Installation, service, and maintenance Advanced smoke, heat, and gas Mass notification and emergency Ancillary services, lights Visitor management Testing and inspections 24/7/365 UL-listed monitoring
Intercede, a pioneering digital identity management company, announced the launch of its latest version of MyID CMS that enables the management of Passkeys with Microsoft Entra ID. Administrators can now use the credentials management system to seamlessly manage FIDO Passkeys on devices including the Yubico YubiKey family of products, that can then be used to securely authenticate to Entra ID protected resources. Integrating Entra ID’s robust FIDO2 The solution enables corps to use seamless, secure authentication methods by combining the strengths The solution enables organisations to use seamless, secure authentication processes by combining the strengths of the Intercede, Yubico, and Microsoft technology platforms. By integrating Entra ID’s robust FIDO2 provisioning API’s with MyID CMS and YubiKeys, enterprises can now implement an end-to-end secure issuance and life cycle management solution for FIDO Passkeys, whether in Cloud or Hybrid Entra ID solutions, manage PKI and FIDO credentials on a single YubiKey, as well as support for using a Passkey as a Derived Credential. Key highlights of MyID 12.14 Entra ID Capabilities Compliance with NIST SP800-63B digital identity guidelines Simplified FIDO passkey issuance and lifecycle management Manage passkeys alongside other credential types such as certificates Applying expiry dates to passkeys – automatically revoke the credential for fixed term workers, or for temporary passkey usage Support for passkeys as a derived credential, compliant with NIST SP800-157 Compliance with NIST standards "This collaboration represents a significant step forward in enterprise credential management," said Allen Storey, Chief Product Officer at Intercede. "Our integrated solution enables customers to issue and manage passkeys at the highest level of security in compliance with NIST standards, making the use of passkeys in high-assurance environments a reality." Implementation of passkey technology with Entra ID Natee Pretikul, Principal Product Management Lead at Microsoft Security, commented: "At Microsoft, we are committed to transforming enterprise security through the implementation of passkey technology with Entra ID." "Our newly developed FIDO2 provisioning APIs, coupled with collaborations with industry partners such as Intercede and Yubico, enable us to deliver comprehensive authentication solutions that can be deployed and managed at scale.” Yubico’s trusted hardware-based authentication The combined solution addresses growing enterprise needs for robust, flexible, and user-friendly Jeff Wallace - SVP Product at Yubico, stated: “By integrating Yubico’s trusted hardware-based authentication in the YubiKey with Intercede’s MyID CMS and Microsoft Entra ID, we are empowering organisations to securely manage the lifecycle of FIDO passkeys with a streamlined, end-to-end solution, that also includes previously available authentication protocols.” Wallace added: “This collaboration ensures enterprises can uphold the highest security standards while simplifying credential management for both cloud and hybrid environments.” Identity verification strategies The combined solution addresses growing enterprise needs for robust, flexible, and user-friendly phishing-resistant authentication systems. By eliminating traditional complexity in credential management, the collaboration empowers organisations to implement more agile and secure identity verification strategies.
Asian IR Summit officially kicks off, May 6, at the Galaxy International Convention Centre in Macau, bringing together top executives from both local and international travel and integrated resort sectors. Over the next three days, industry pioneers will engage in high-level discussions, addressing the challenges shaping the future of the industry. The Asian IR Expo exhibition, co-located with G2E Asia, opens at May 7-9, at The Venetian Macao, with complimentary shuttle service to ensure seamless access between the two venues throughout the event. Macao government tourism office opens summit The Asian IR Summit will continue to spotlight key industry trends, including emerging technologies Asian IR Summit proudly opened with a keynote address by Maria Helena de Senna Fernandes, director of Macao Government Tourism Office, setting the tone for the day with key insights into the integrated resort sector, particularly in Macau. The day’s theme focuses on the industry and hospitality, featuring speakers including Wade Howk, Chief Operating Officer of Inspire Entertainment Resort; Jeffrey Kiang, Equity Analyst of CLSA; and Angel Sueiro, Chief Operating Officer of PH Resorts Group, who explore the opportunities and challenges of incorporating non-gaming components into integrated resorts across the Asia region. Over the next two days, the Asian IR Summit will continue to spotlight key industry trends, including emerging technologies, the rise of sportainment and the evolution of next-generation entertainment. Celebrating the finest in gaming and entertainment Introducing the G2E Asia Awards, recognising excellence and innovation across the industry. Winners will be announced the day before the exhibition, with honours given in five key categories: Best Slot Award, Best Electronic Table Game Award, Best Table Game Award, Best Casino Supply Award, and Best IR Tech Solution Award. All winning and nominated products will be showcased in the exhibition, allowing attendees to experience them firsthand. May 7-9 exhibition highlights The pioneering joint event is expected to attract over 10,000 visitors from 80 countries and regions. Event highlights include: New Smart Hospitality Technology Experience Zone offering an immersive and interactive onsite experience. Technology Zone and Tech Talk showcasing the latest advancements from emerging industry brands. New Gaming Innovation Forum highlighting cutting-edge innovations from G2E Asia Awards nominees across the gaming industry. Targeted Networking Events for professionals from the slots, table games, MICE and marketing industries.
With its worldwide online “Eplan L!VE” event on 14 May, this time around solutions provider Eplan is guest at Eaton in Hengelo. Enquiring minds can gain first-hand experience about how Eaton's facility in the Netherlands has optimised all its processes in engineering and manufacturing for maximum efficiency. In just two-and-a-half hours, online attendees will get a compact overview how new ideas and tried-and-tested solutions for greater productivity look on the ground. News on Eplan’s portfolio and strategies round off the programme. Benefits of a data-driven approach Dutch facility saw the benefits of a data-driven approach and recast its engineering method How can processes in engineering and switchgear system manufacturing be designed to be highly efficient? How can manufacturing be further automated? These are questions that Eaton in Hengelo asked itself years ago. The Dutch facility saw the benefits of a data-driven approach and converted its entire engineering methodology, including its processes, to work with Eplan. Eplan L!VE, now in its third round as an online format, will provide fascinating insights into this. Under the motto of “Forward Thinking from Design to Manufacture” will be streaming directly from Eaton’s production facility. New manufacturing approaches Attendees from around the world are invited to this online event to discover new manufacturing approaches that generate greater profitability in engineering and manufacturing. By the way, these approaches are in no way restricted to just larger corporations, but are also tailored for SMEs. Eaton took a “one step at a time” approach and, depending on the task at hand, it can all be implemented at smaller control and switchgear system manufacturers. An in-depth look into engineering and manufacturing Eaton uses EEC to generate schematics, bills of materials, terminal diagrams and cabling lists Well over 1,500 attendees from around the globe will be tuned in online when the Eaton specialists will be showing how the in-house control and switchgear system design and manufacturing has been optimised for a high degree of automation and efficiency. The Eplan solutions used here play a decisive role – ensuring that a standardised foundation of data based on the digital twin is available from first designs all the way through to manufacturing. And if that weren’t enough, Eaton also uses Eplan Engineering Configuration (EEC) to automatically generate schematics, bills of materials, terminal diagrams and cabling lists – based on a new design methodology using functional engineering. Whereas the effort previously involved in updating documents linked to the schematics, including bills of materials, terminal diagrams and wiring lists, was immense, now these are all automatically kept up to date with Eplan. This is possible because everything goes back to a centralised source of data. Integration of manufacturing The company’s deep integration of manufacturing into this process is also bearing fruit – using Eplan Pro Panel, control cabinet layouts are designed in 3d, completely digitally, and the data provided is used for automatic cable routeing. The Wire Terminal WT from Rittal Automation Systems can produce up to 1,000 wires per day, all fully automatically. The processing of copper rails can also be simplified with machines from Rittal Automation Systems. All the processes for wiring and manufacturing are designed to be extremely efficient and overall processes benefits from greater consistency based on the data from Eplan. Sneak preview and strategy Also of interest is the direct access to device data in the Data Portal from Eplan Electric P8 in the future These in-depth insights into Eaton’s design and manufacturing processes will be rounded off with a sneak preview of the upcoming Eplan Platform 2026. As just one example, on 14 May attendees with get a first look at how the different views in Eplan Pro Panel accelerate 3D navigation. Also of interest is the direct access to device data in the Data Portal from Eplan Electric P8 in the future. Last but not least, the new single-line technology in Eplan Preplanning is interesting for users who want to logically link symbols and components in the preplanning phase. Online event attendees can also expect a glimpse into the future of engineering: Eplan CEO Sebastian Seitz will be presenting Eplan’s future strategy and some highlights on future topics – including use cases on the topic of artificial intelligence. Background Eaton as the global intelligent power management company, has been a technology partner in the Eplan Partner Network since 2023 and specialises in the development, production and sales of power distribution systems, LV and MV switchgear systems and control devices at its facilities in Hengelo in the Netherlands. Eaton additionally provides a large number of its energy systems and components via directly integrated selectors in the Eplan Data Portal. The manufacturer also uses Eplan solutions for its in-house control system and switchgear system design and construction. Machines from Rittal Automation Systems simplify the company’s manufacturing processes – including the Rittal Wire Terminal WT and machines for processing copper rails.
Camden Door Controls has introduced the industry's first 1/2" RIM Strike with 15 lbs. preload. Camden 1299 Series strikes are Grade 1 rated, with UL 1034/294 and ANSI/BHMA listings. Available in brushed stainless steel or black finish, these 1299 strikes offer 'Universal' performance with selectable 12/24V, AC/DC voltage, and fail-secure/fail-safe operation. Latch monitor included. 1299 Series Preload RIM strikes 1299 Series strikes are packaged with 1/8" and 1/4" spacer plates to accommodate up to 3/4" latch projection. A metal marking jig is also included in the package, making installation fast and easy. 1299 Series Preload RIM strikes avoid the most common cause of strike failure by withstanding up to 15 lbs. of pressure against the strike's keepers (jaws). Preload pressure can be caused by differences in air pressure on each side of the door (particularly a stacking effect common in stairwells), a misaligned door, or simply someone pushing on the door before the strike is unlocked.


Expert commentary
Artificial Intelligence isn’t just a buzzword anymore. It has become part of our lives, and its uses and applications are growing every other day. Even the public sector, which usually is a late adopter of new technologies, has come onboard this new train. Law enforcement, in particular, has seen the advantages different AI technologies can offer to their work and has started to integrate them into their workflow and daily routines. But there is much more to come. Task automation: AI as a workhorse Due to the increasing importance of media files in police investigations, current police cases have an increasing amount of digital files to be analysed. Videos from mobile phones, computer files, sound recordings, voice messages from chat applications…the list is almost endless. But, in contrast to other types of digital files, like documents or PDFs, it is not possible to search directly a certain information in a video. It has to be watched by someone. And that takes an inordinate amount of time for a human being, as there can be hundreds of videos in a case. This is one of the areas where artificial intelligence shines. Modern analytics systems are able to find almost any kind of information in media files due to the improvement of artificial vision, object recognition and face biometrics. It is simply a matter of feeding the hundreds or thousands of media files to a AI analyser, which will work through them and find specific sounds, words, faces, cars, etc. Case of law enforcement On top of that, an analyser does not tire after long work hours and does not make errors What is more, unlike human officers, these systems can work 24/7 which speeds up investigations considerably, as more evidence is found in less time. On top of that, an analyser does not tire after long work hours and does not make errors. This is why police work can be helped greatly by AI Analytics, as it frees police officers to do high value work, instead of endlessly watching videos on a computer of listening to audio recordings, in search of evidence. As soon as the system finds what the officer has specified (a face, name, number plate, object, etc.) it sends an alarm to the officers’ phone, so he or she can take a look and decide what to do with that information. Despite AI being touted as a danger to many workplaces, in the case of law enforcement, it is a valuable tool to help police do more, with more accuracy, and in less time, freeing officers from the repetitive and boring work of checking mountains of evidence in search of clues. The AI Analyser landscape The field of AI analytics is expanding constantly and new types of analysis are being discovered that may be helpful to police or intelligence. The most used analysers today are probably Automatic Licence Plate Recognition (ALPR), object and face recognition. But OCR is equally useful not just for reading documents, but also signs and logos that may appear in pictures or videos, to help identify a location. And for audio (as in interception or surveillance recordings) there is speech-to-text (S2T), translation, Speaker ID, audio fingerprinting (AFP) and natural language processing (NLP) which is able to extract sentiment from what is said. All of these have their application in daily police work and can save time in investigations or make them possible in the first place. But looming on the horizon are new possibilities, which we will discuss later and that are even more powerful. So the field of AI Analytics is, by no means, a closed one. Generative AI in law enforcement LLMs will be an important part in all those tasks related to investigate large sets of documents For the past year, the term “Generative AI” has become part of our general vocabulary, although most of the time we just say ChatGTP, Copilot o similar. The large language models (LLM) use Deep Learning and different AI strategies to, amongst other things, analyse and summarise vast amounts of information, in order to generate a short report with the highlights. This can be of use for Law Enforcement in all those cases that have great amounts of documents that may contain evidence. Again, this is a case like the above, where AI helps speed up operations by doing the grunt work much quicker than any person could. The difference is in the Deep Learning part. The model can be tuned to specific needs (like financial crimes, for example) and will get better over time when dealing with specific sets of documents. Thus, LLMs will be an important part in all those tasks related to investigate large sets of documents during a case. What the future holds As with all technology, it is virtually impossible to predict what the future will hold. Because any breakthrough can upend complete sectors, as demonstrated by ChatGPT not that long ago. However, there are several promising AI technologies in the pipeline, some of which are already being tested and perfect around the world: Behaviour analysis: as facial recognition systems get better and better, they are not only able to recognise faces, but also facial expressions. This means that AI systems could be assisting during interrogations, to evaluate the truthfulness of what is being said. Combined with the analysis of small voice inflections, they can be a non-invasive “lie detector”. Robotics: already in use by many police forces around the world, robots are going to be ever so important. Particularly the autonomous kind, which is able to do missions on its own, without a human behind the controls. This, combined with swarm technology, could be an incredible help in disaster areas, where time is of the essence in locating victims. Predictive policing: thanks to pattern analysis, predictive policing, which has been to the test several times already, will be an important part of police work, to figure out where to send units or concentrate surveillance efforts. In short, AI has much more to offer, and we are going to see and incredible evolution of this technology applied to law enforcement, over the next years.
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Security beat
The practice of executive protection changed forever on Dec. 4, 2024, when UnitedHealthcare CEO Brian Thompson was shot outside a Manhattan, New York, hotel. The shocking event raised awareness in board rooms around the world about the need for, and challenges of, executive protection. Questions followed immediately, including why was the high-level executive not protected? Combination of risk and reward UnitedHealthcare’s stock price has gone down more than 20% since the shooting The event also highlighted what is at stake for companies, extending beyond the safety of executives and impacting many factors, even including a company’s stock price. UnitedHealthcare’s stock price has gone down more than 20% since the shooting, equating to tens of billions of dollars. “Companies are considering the combination of risk and reward like never before when it comes to executive protection,” says Glen Kucera, President of Allied Universal Enhanced Protection Services. “What are the chances this could happen? Before Dec. 4 many thought it was zero. And what are the financial implications for a company if it happens? Executive protection is a small investment to protect against a worst-case scenario.” Evaluation of an executive protection Before the UnitedHealthcare shooting raised awareness, fewer than 50% of executives had protection. But concerns that previously fell on deaf ears now have the full attention of companies, says Kucera. “Boards of directors are having to figure this out,” he adds. “They may not have executive protection, but now they have to do it.” A threat assessment, conducted by a company such as Allied Universal, provides an independent evaluation of a company’s executive protection needs. The assessment evaluates factors such as an executive’s travel habits, the safety of their home, etc. Does the executive need protection 24/7, or just when they travel into more dangerous areas? Risks increase related to corporate earnings Sometimes, cases increase the need for executive protection, such as an internal threat In assessing threats, security professionals also look beyond the individual to consider the safety of a corporate facility, for example. “Is there a visual deterrent, controlling who comes and goes?” asks Kucera. “If there is good security, it all ties together. We do home assessment, facility assessment, route assessment, and travel assessment as needed.” Sometimes, circumstances increase the need for executive protection, such as an internal threat. Timing is a factor, and risks increase related to corporate earnings releases, new product announcements, and corporate layoffs or consolidation. Monitoring social media tracks shifting threats that impact the need for executive protection. UnitedHealthcare shooting “He didn’t have it and probably didn’t think he needed it,” comments Kucera about the UnitedHealthcare executive who was gunned down in the streets of New York City. “He was staying at the hotel across the street and was used to walking down the street every day.” “Sometimes executives want to preserve their privacy and be able to walk down the street,” says Kucera. “Getting protection can be seen as a sign of weakness. Some CEOs in the past have said they just didn’t want it.” However, the UnitedHealthcare shooting raised the stakes of the need for more vigilance. “The bottom line is you have to yet beyond objections and make the investment to protect against a worst-case scenario,” says Kucera. Anti-capitalist sentiment in the general population An internal police bulletin warned of an online hit list naming eight executives and their salaries Threats to executives sometimes arise from anti-capitalist sentiment in the general population about perceived inequalities in wealth and power. Executives provide symbolic targets for anyone who fights the system, and social media has amplified the voices of those who oppose capitalism. For example, a "Most Wanted CEO” card deck seeks to shine a spotlight on "titans of greed." Also, in the aftermath of the UnitedHealthcare shooting, CEO "wanted" posters appeared across New York City, threatening various executives of large companies. An internal police bulletin warned of an online hit list naming eight executives and their salaries. Careful monitoring of social media posts Careful monitoring of social media posts and other sources enables executive protection professionals to analyse data and separate the dangerous threats from the merely negative ones. Sadly, positive support of the UnitedHealthcare shooting was expressed by the 300,000 or so followers of the shooter, who became a celebrity of sorts. A huge outcry of negative sentiment toward the insurance industry led to fear that copycat incidents might occur. “There has been an unprecedented amount of positive support for committing murder,” commented Kucera. Executive protection requests HR executives can be at risk, especially at a time of layoffs or consolidation “Let’s face it, there has been a lot of controversy, from COVID to the Middle East crisis, to the political campaign, and there is negativity on both sides,” says Kucera. “People have opportunities to pick sides, and there is a lot of sentiment going both ways, and there is a small percentage of people who will act aggressively.” Executive protection requests now extend beyond the CEO to include others in the management ranks of companies. Basically, any public-facing executive is at risk, including anyone who makes statements to the press. Human resource (HR) executives can be at risk, especially at a time of layoffs or consolidation. Private information on the Internet Typically, an executive is assigned a single armed operative for protection. The firearm serves primarily as a visual deterrent that hopefully makes a potential perpetrator think twice. “When they plan an event like this, their expectation is that it will be a soft target,” says Kucera. “If there is an officer, it gives them pause.” Controversial or high-profile CEOs are typically protected 24/7, including when they travel with their family. Adding risks is the fact that private information is now posted on the Internet, including where an executive lives and where their children go to school. Internet monitoring Internet monitoring also includes the “dark web,” which includes sometimes dangerous information “We offer social media monitoring, and we advise them to be more careful with what they post,” says Kucera. “We monitor reactions to posts including any that might be threatening. We watch social media carefully if a company announces earnings or a change in their service or product offering.” Internet monitoring also includes the “dark web,” which includes sometimes dangerous information that is intentionally hidden and requires specific software, configurations, or authorisation to access. Own layer of protection Public and government officials can also come under fire in a variety of scenarios. FEMA officials faced threats after the recent floods in the Southeast, for example, among other situations where perceived unfair treatment promotes thoughts of retribution. Although government agencies have their own layer of protection, there are instances when they call on companies such as Allied Universal for additional help. Ad hoc protection for various executives In the aftermath of the UnitedHealthcare shooting, calls to Allied Universal’s Command Centre increased by 600%, reflecting requests for ad hoc protection for various executives. These requests are in addition to the company’s business providing “embedded” operatives that travel with executives all or some of the time. On that side of the business, requests for services are up probably 300%, says Kucera. {##Poll1742194323 - Has the recent increase in violent threats changed your company's view on executive protection?##}
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Case studies
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over a two-year period by specialist security installer, Scottish Communications Group. HID Mobile Access licences University has purchased 10,000 HID Mobile Access licences to offer its academic community In addition, the University has purchased 10,000 HID Mobile Access licences to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. “We wanted a modern system which is safe, secure and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. HID solution: future-proof equipment Stebbing added: “Complying with forthcoming legislation was also another important project requirement. With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we have a duty to protect to ensure everyone is safe." "The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” Ambitious development plans University of Dundee is a research institute in Scotland, noted for its academic merit in dentistry The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering and life sciences. Based in the heart of the city, it is home to over 16,000 students, 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organisations flexible laboratory, meeting and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. New HID Signo readers The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP (Open Supervised Device Protocol) and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers, thereby speeding up the rollout. RFID cards access buildings The university used to print and issue plastic RFID cards so staff and students could access buildings Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week, when some 2,500 – 3,000 undergraduate and postgraduate students enrol. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Origo management software Shifting to HID Mobile Access – which utilises cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licencing, allocation of credentials, setting of building access rights, validating or revoking of IDs – all of which is now done virtually and remotely. Improve the mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Integrate with digital campus cards While the strategy and aspiration are for the university population to shift wholesale to mobile access While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach now is to operate a dual system. “We recognise that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO range of ID card printers Given that RFID cards are still required now, the University of Dundee utilises its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. HID’s reputation University of Dundee utilises its FARGO DTC4500e printers to back up this shift to digital change “HID Signo readers are going in now across the main buildings, including the new Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications and authentication standards. Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” MOTORTRBO Ion smart radios In addition, Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems and CriticalArc Safezone® App, security staff need carry only a single device to fulfil their duties.
Texas A&M University opened its doors in 1876 as the state's first public institution of higher learning. Now, it’s well known as a research-intensive flagship university dedicated to preparing Aggie pioneers to take on the challenges of the future. Located in the heart of the Houston-Dallas-Austin triangle, Texas A&M's main campus in College Station, Texas, is home to more than 69,000 students. Another 5,200 are at branch campuses. The challenge Staff would write tickets when they saw cars without valid parking receipts or hang tags The growing student and staff population at Texas A&M University led to more cars, bicycles, foot traffic, and bus passengers to manage. Manual processes couldn’t keep up. Issuing and managing physical permits required significant administrative work, and the parking enforcement team relied on foot patrols to walk each parking lot. Staff would write tickets when they saw cars without valid parking receipts or hang tags. It was a slow and cumbersome process, making it difficult to monitor parking lot occupancy to ensure the number of permit holders matches the number of available spots. The solution Efficient parking enforcement: Patrollers use vehicles equipped with AutoVu SharpZ3 cameras to enforce parking and track real-time data on parking lot usage — even during large events. Improved parking permit distribution: Vehicle information is in the system almost immediately after the customer purchases the permit, reducing overhead costs since hang tags don’t have to be printed and distributed. Increased customer satisfaction: Students, faculty, staff, and guests don’t need a hang tag or paper permit. Users can go online and change the plate on their account, and it’s in the system within minutes. “The reduction in time and resources required to enforce parking is notable. A patrol that used to take an hour now takes around 10 minutes. We’re able to reallocate resources in a more efficient way,” said Dell Hamilton, Parking Systems Manager at Texas A&M Results Now, parking enforcement is based on license plate registrations, and the university has eliminated physical permits for the majority of customers. Patrollers use vehicles equipped with AutoVu SharpZ3 cameras to enforce parking and track real-time data on parking lot usage — even during large events. Getting data more quickly also makes it easier to manage the variety of parking restrictions that exist on campus. This includes spaces reserved for specific groups of people, time of day restrictions, and timed parking limits in areas such as the student recreation center. “Going away from paper permits and hang tags was a huge success,” Hamilton said. “Today, the vast majority of permits issued can be validated with ALPR. Users can go online and change the plate on their account, and it’s in the system within minutes. We not only save on printing and shipping costs but also make it easier for the customer to exchange or return their permit.”
Thames Valley Police worked with local authorities to improve CCTV coverage, cut costs, and boost efficiency. It’s made public spaces safer and ensured long-term, reliable monitoring across the region. Thames Valley Police is the largest non-metropolitan police force in England and Wales, covering 2,218 square miles and a population of 2.42 million people. Its jurisdiction includes multiple towns, city centres and council areas across the three counties of Berkshire, Buckinghamshire and Oxfordshire. Setting a long-term vision for public space CCTV Public space CCTV is vital in deterring and detecting crime across the Thames Valley Public space CCTV is vital in deterring and detecting crime across the Thames Valley. However, significant pressure on local authority budgets has made it increasingly difficult for councils to provide public space CCTV. There was real jeopardy that financial constraints would result in unmaintained systems, with limited or no real-time monitoring. A fresh approach was needed, so the Thames Valley CCTV partnership between Genetec™ and Hanwha Vision was formed. The first major challenge was securing funding to overhaul several local authorities’ ageing systems, which were proving increasingly expensive to upgrade and maintain. The second was to manage the ongoing costs of staffing control rooms to ensure the long-term sustainability of monitored CCTV across the Thames Valley. Ownership and monitoring of public space CCTV Ambitious plans were devised to pool resources and replace many disparate systems with one police-owned system that could extend across multiple authorities. In effect, the aim was to transfer the ownership and monitoring of public space CCTV from local authorities to dedicated Thames Valley Police control rooms. It would be led by the Thames Valley Police & Crime Commissioner (PCC) Matthew Barber, collaborating with any local authority who chose to participate. It was a feat that had never been attempted in the UK on this scale that held the potential to drive efficiencies and enhance CCTV provision in areas it might otherwise have deteriorated. Ongoing commitment and investment “CCTV is an important part of community safety; benefitting police and local communities in helping to deter crime and antisocial behaviour, identify offenders and support prosecutions." "Ongoing commitment and investment enables high quality, consistent and sustainable CCTV provision now and into the future”, explains Matthew Barber, PCC, Thames Valley. Centralisation creates area-wide visibility and control Several control rooms in the Thames Valley, like Windsor & Maidenhead, had implemented Genetec Security Centre Several control rooms in the Thames Valley, such as Windsor & Maidenhead, had already implemented Genetec Security Centre and were very happy with its operation. Furthermore, as an open platform video management system, it could minimise costs by supporting a phased unification or “takeover” of existing systems across the Thames Valley. Finally, its hybrid cloud architecture provided Thames Valley with maximal flexibility to leverage any combination of cloud or on-premises infrastructure according to Name Thames Valley Police Industries Public Safety Location Thames Valley, United Kingdom Products Genetec Security Centre; Genetec Cloud Services; Federation Technology Partners Hanwha Vision Channel Partners CDS Systems what made sense for each application and location. This made it the obvious choice on which to standardise. Range of multidirectional AI-enabled cameras Following a competitive tender, Thames Valley chose CDS Systems to implement its proposed solution. This would be built on Genetec Security Centre and incorporate a range of multidirectional AI-enabled cameras from Hanwha Vision. A key driver in the decision was the high levels of commitment shown by all three parties to cybersecurity. Another was the recognition that the system design and technology selection could ensure a cost-effective implementation that could continue to evolve in line with the needs of its users. Integration between Genetec and Hanwha Vision technology Legacy cameras were retained and reused to maximise the return on existing investment wherever possible “We urgently needed to improve the quality of CCTV, enhance collaboration, and drive efficiencies for all partners. The respective capabilities and seamless integration between Genetec and Hanwha Vision technology was the optimal way of meeting Thames Valley’s requirements,” says Sam Thomas, CDS Systems. Phase one of the deployment involved CDS taking over an existing control room in Milton Keynes, replacing the legacy analogue infrastructure with a modern IP backbone. It then installed Genetec Security Centre to establish one platform through which officers could smartly interact with all incoming video feeds. Legacy cameras were retained and reused to maximise the return on existing investment wherever possible. A second Genetec workstation was also set up inside Slough Police Station, allowing officers to rapidly review footage for improved community response. Hanwha Vision’s AI-enabled multidirectional cameras CDS then introduced Hanwha Vision’s AI-enabled multidirectional 4k cameras to improve CCTV coverage and quality in public spaces. Each of these cameras incorporates up to five cameras in one device for wide-area surveillance, which would previously have required several separate devices, simplifying installation and resulting in significantly less associated cabling and infrastructure. They also provide powerful AI analytics, including accurate object detection and classification, to enable forensic search and save operators' time when responding to incidents. For example, identifying and establishing the movement of specific people or vehicles based on attributes such as vehicle type. Thames Valley CCTV partnership Phase two will see four additional control rooms in Oxfordshire merged into a single hub Phase two will see four additional control rooms in Oxfordshire merged into a single hub inside Abingdon Police station, also built on the Genetec Security Centre. This and the control room in Milton Keynes will be interlinked, adding further resilience as each site will be able to act as a fallback for the other. At this point, there will be a dedicated team of eighteen staff responsible for monitoring CCTV and enhancing CCTV for all participating communities in the Thames Valley CCTV Partnership. Innovative and cost-effective solutions “The CCTV Command Suite enabled by CDS, Genetec and Hanwha Vision has improved our workflows beyond recognition, enabling staff to quickly review and package evidence for frontline officers or more complex investigations. It has received several plaudits from officers for its ease of use,” says Jason Owen, CCTV Operations Manager, Thames Valley Police. “This collaboration between Thames Valley Police, Genetec, CDS Systems, and Hanwha Vision showcases the power of partnership in driving innovative, cost-effective solutions that improve public safety,” says John Boorman, Head of Product and Marketing at Hanwha Vision Europe. “Our AI-enabled cameras are designed to reduce false alarms and streamline operations, ensuring teams can focus on real incidents and drive efficiency across their monitoring.” Efficiency, at a lower cost All CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers Pooling resources and transferring ownership to the police has brought about significant cost efficiencies for participating authorities, while also enhancing the quality and reliability of public spaces CCTV. Just as importantly, it has dramatically improved the police’s direct access to quality video evidence. Unlike in a traditional council-run control room, all CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers. This means they have full access to Thames Valley’s suite of police databases and reporting software packages. They are better equipped to rapidly report incidents, support front-line officers, and communicate effectively with investigators as a result. On average, it handles between 300 – 500 incidents a month and has substantially increased the number of successful requests for supporting footage. “We’ve immediately seen the benefit of our investment in equipment and CCTV operators, with the police now much better equipped to deter and detect crime across the Thames Valley,” adds Barber. A solid platform for further improvements Control room operators’ intuition will always be the driving force that brings results Looking forward, Thames Valley has plans to use the Genetec platform to connect its people and mobile surveillance assets back to its control rooms for better cross-force interaction. Genetec Federation as a Service is already allowing live and recorded video to be shared with officers in the field. Soon it will also be extended to ensure video from police CCTV vans and drones is immediately available in the control room. In both cases this is achieved without complex network configuration, requiring only an internet connection. It is also at the beginning of its journey of fully realising the value of the AI-equipped Hanwha Vision cameras specified by CDS. Control room operators’ intuition will always be the driving force that brings results, but AI is freeing them up to do what they do best by saving time on routine monitoring and searches. Cost savings, resilience, and efficiencies Finally, talks continue that would see the addition of further control rooms across the Thames Valley to the Thames Valley CCTV Partnership. Having proven the model, would allow it to scale operations further to deliver even greater cost savings, resilience, and efficiencies. “We’re proud of what we’ve achieved to date but have no intention of resting on our laurels. The foundations we’ve established will ensure continued high-quality, consistent, and sustainable CCTV provision for our communities,” concludes Owen.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed at Scott County R-IV School District in Benton, Missouri, to mitigate gun-related violence. The deployment was facilitated by Freedom Security, a local security provider serving the greater Missouri Area. Robust security upgrades Located in a rural community near the borders of Illinois and Kentucky, Scott County R-IV School District consists of a single campus with three interconnected buildings serving students from pre-K through 12th grade. The district educates approximately 800 students annually and employs around 125 teachers and administrators. ZeroEyes is the newest addition to the district's robust security upgrades, which include window tints, HAVEN locks, integrations with CrisisGo, and more. Digital security cameras ZeroEyes’ AI gun detection and intelligent situational awareness software layer onto existing cameras ZeroEyes’ AI gun detection and intelligent situational awareness software layer onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administration as quickly as 3 to 5 seconds from detection. ZeroEyes safety strategy “ZeroEyes is not intrusive or invasive, and it does more than just detect; it alerts, responds, and continues to do so throughout any situation involving a potential threat,” said Dr. Bradley Kolwyck, Superintendent of Scott County R-IV School District. “This technology is the final piece we needed to ensure every layer of our safety strategy is connected, enabling us to provide the safest environment possible.” ZeroEyes deployment ZeroEyes and the district are hosting a Lunch & Learn session at 11:00 am at the Scott County ZeroEyes and the district are hosting a Lunch & Learn session at 11:00 am at the Scott County R-IV District Office (4035 State Highway 77, Benton, MO). It will feature demonstrations and discussion sessions, including reflections from school pioneers on the district’s successful ZeroEyes deployment. The event is open to local schools, law enforcement, and media. ZeroEyes’ innovation and protection “I commend Scott County R-IV School District for taking the initiative to lean into innovation and proactively protect its students from gun-related violence,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “ZeroEyes’ ability to provide first responders and law enforcement with advance warning and situational awareness empowers them to act quickly and save lives.”
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced that its technology has been deployed at East Hill Synagogue in Englewood, New Jersey, to proactively address gun-related threats. East Hill Synagogue is a 20+ year-old house of worship serving a diverse community of Modern Orthodox Jews, offering Shabbat and holiday prayer services, adult education and family activities. Proactive security measures ZeroEyes is one of multiple solutions in East Hill’s multi-layered security approach ZeroEyes is one of multiple solutions in East Hill’s multi-layered security approach, enabling members to participate in religious activities without fear or distraction. Anti-Semitic attacks have reached new levels in the past 18 months, with the Anti-Defamation League reporting that the U.S. has seen a 200% increase in hate crimes. This concerning fact highlights the need for increased proactive security measures to protect congregants during worship services and other events. Overall security initiative “Jewish law dictates that preserving (saving) life is a top priority, and we take that quite literally at East Hill Synagogue; safety is our top priority,” said Jonathan Blinken, Directory of Security, East Hill Synagogue. “ZeroEyes is one of the most important layers that we have in our overall security initiative. It is an extremely powerful tool to help us protect those that we love, our institutions and everyone that comes to visit them.” Digital security cameras ZeroEyes' AI gun detection and awareness software layers onto existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and synagogue staff as quickly as 3 to 5 seconds from detection. ZeroEyes to safeguard from gun-related threats "Every individual has the right to safety in their place of worship, and it’s deeply troubling when violence threatens that sense of peace," said Mike Lahiff, CEO and co-founder of ZeroEyes. "We thank East Hill Synagogue for trusting ZeroEyes to safeguard their congregation from gun-related threats, ensuring their community remains secure and welcoming."
In areas such as high-precision metalworking, accuracy is non-negotiable. This includes the automotive industry and its suppliers, which are in crisis in Germany for a variety of reasons. The industry is under enormous pressure to deliver products of impeccable quality and at the same time reduce operating costs, for example by increasing process speeds. The automotive industry's quality assurance standards are strict, the component geometries are complex and the demands on precision and process reliability are enormous. Fluctuations in detection, insufficient traceability to individual serial numbers or batches and changing environmental conditions can lead to costly errors, production downtime and complaints. Innovative solution for AI quality inspection VIVALDI Digital Solutions GmbH has set an exemplary, innovative solution for AI quality inspection VIVALDI Digital Solutions GmbH has developed an exemplary, innovative solution for AI quality inspection in real time. In addition to an edge server with an Intel processor, intelligent image processing plays a key role in the so-called SensorBox. Designed for an automotive supplier and its production site in the Czech Republic, up to 70 USB3 uEye+ XC autofocus cameras from IDS Imaging Development Systems perform automatic visual inspection for surface inspection in several inspection cells. AI recognises various surface defects "The IDS cameras integrated into the test cells capture high-resolution images of the surface of aluminium components from German OEMs, in this case an electric motor," says Uwe Siegwart, Managing Director at Vivaldi, explaining the camera's task. The captured images are pre-processed to optimise factors such as exposure, white balance and colour correction. The AI recognises various surface defects such as scratches, pores or dirt. Strict requirements at the plant Up to 2,400 electric motor housings per day are tested 100% automatically with the implemented system "There are strict requirements at the plant in the Czech Republic. According to the defect catalogue, defects from 0.2 millimetres must be reliably detected. The test time per component must not exceed 36 seconds," says Uwe Siegwart, explaining the stringent guidelines. Up to 2,400 electric motor housings per day are tested 100 percent automatically with the successfully implemented system. Why did the AI specialist choose the uEye XC camera from IDS? "The decisive factor was that the autofocus camera can capture several surfaces at different distances from the camera," says Eike Humpert from Vivaldi's Business Development department. This simplifies the testing process enormously and ensures greater efficiency and flexibility. This is a crucial factor when, for example, different component variants need to be tested. With the macro attachment lens, the minimum object distance of the camera can also be shortened very easily. BSI pixel technology "The BSI pixel technology enables the sensor to deliver consistently precise and reliable results, even in changing light conditions," explains Jürgen Hejna, Product Owner 2D cameras at IDS. It is not only the excellent low-light performance and minimal pixel noise that make the sensor particularly suitable for this application. "The 24x digital zoom, combined with auto white balance and precise colour correction, contributes significantly to the success of this demanding test procedure," emphasises Jürgen Hejna. AI-based image processing The simultaneous image processing task is complex and the challenges are diverse The simultaneous image processing task is complex and the challenges are diverse. Aluminium parts often have very shiny surfaces that reflect light and therefore have a strong influence on images. These reflections make it difficult to reliably recognise defects such as scratches, cold runs, chatter marks or surface irregularities, as they are often obscured or distorted by light reflections. This, along with other material and environmental variations, means AI-based image processing must therefore be able to distinguish precisely between the normal material structure and actual raw areas in surfaces to be processed that are considered defects. AI-supported and synchronous camera control via edge server Image processing is carried out via an optimised infrastructure. Up to eight cameras can be connected per USB hub, enabling simultaneous recording of several inspection areas. A maximum of two of these USB hubs are connected to a self-developed 'cam controller', which bundles and processes the image signals. Several cam controllers are networked with the edge server. This server not only calculates the AI-supported analyses, but also communicates directly with the system controller, which coordinates the triggering of the cameras and ensures synchronised recording. Digitised quality data acquisition Up to eight cameras can be linked per USB hub, enabling simultaneous recording of inspection areas "Image processing is a central component for traceability, which is the actual technological centrepiece of the solution, and IDS is the ideal partner for this point”, underlines Uwe Siegwart. "Digitised quality data acquisition in real time and linking with other production parameters not only increases efficiency, but also significantly reduces rejects and rework. Errors are minimised, costs are reduced and production processes are optimised." The system has already paid off in the Czech Republic: The number of complaints per year has been reduced by two-thirds and the number of unrecognised surface defects has even been reduced to zero. Outlook "The market for digital quality control is developing rapidly, particularly due to more favourable camera technology, for example with regard to higher resolutions. Optimised image processing processes and tools also make it possible for real-time analyses to be carried out by end users," states Eike Humpert. "Improved resolution, more compact design and price-optimised cameras are in demand." The portfolio of the industrial camera manufacturer IDS is designed to meet this demand with state-of-the-art technology.
HID, the worldwide pioneer in trusted identity solutions, announces that the University of Dundee is updating its city campus estate implementing HID® Mobile Access® and signature HID Signo™ readers throughout its buildings to guarantee it has a modern, secure and reliable access control system to allow staff and students to enter using both RFID cards and smartphones. The project will involve buying and installing new mobile-ready HID Signo readers at around 40 buildings – a staged rollout being completed over a two-year period by specialist security installer, Scottish Communications Group. HID Mobile Access licences University has purchased 10,000 HID Mobile Access licences to offer its academic community In addition, the University has purchased 10,000 HID Mobile Access licences to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities. “We wanted a modern system which is safe, secure and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. HID solution: future-proof equipment Stebbing added: “Complying with forthcoming legislation was also another important project requirement. With bills like Martyn’s Law soon to be enacted, ensuring the University is ready for this was important given that we have a duty to protect to ensure everyone is safe." "The HID solution enables us to not only lock down buildings immediately, but it has built-in functionality which we can leverage over time, meaning we’ve invested in ‘future proof’ equipment which will last us long term.” Ambitious development plans University of Dundee is a research institute in Scotland, noted for its academic merit in dentistry The University of Dundee is a public research university in Scotland renowned for its academic excellence in dentistry, medicine, science and engineering and life sciences. Based in the heart of the city, it is home to over 16,000 students, 3,300 staff and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious development plans, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organisations flexible laboratory, meeting and office space and, over the next 10 years, it is anticipated the Hub will help create up to 280 new high-quality jobs. New HID Signo readers The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth® and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are fast to install as the wiring uses common protocols like OSDP (Open Supervised Device Protocol) and Wiegand. Furthermore, existing access cards already in circulation can be used with the new HID Signo readers, thereby speeding up the rollout. RFID cards access buildings The university used to print and issue plastic RFID cards so staff and students could access buildings Historically, the University used to print and issue plastic RFID cards so staff and students could access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week, when some 2,500 – 3,000 undergraduate and postgraduate students enrol. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. HID Origo management software Shifting to HID Mobile Access – which utilises cloud-based HID Origo management software integrating with the AEOS system – completely changes this and delivers wireless credentialling. This significantly simplifies all the licencing, allocation of credentials, setting of building access rights, validating or revoking of IDs – all of which is now done virtually and remotely. Improve the mobile credential “Once registered by Student Services in AEOS, a student simply gets an email to their phone, they tap on a link, the app automatically uploads and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control Solutions. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore.” Integrate with digital campus cards While the strategy and aspiration are for the university population to shift wholesale to mobile access While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach now is to operate a dual system. “We recognise that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile credential,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.” FARGO range of ID card printers Given that RFID cards are still required now, the University of Dundee utilises its reliable FARGO DTC4500e printers to back up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves. HID’s reputation University of Dundee utilises its FARGO DTC4500e printers to back up this shift to digital change “HID Signo readers are going in now across the main buildings, including the new Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. “HID’s reputation is built on reliability and security with its solutions supporting the latest encryption, communications and authentication standards. Their devices have an open architecture so they’re easy to install and integrate which reduces the cost for the university and makes time to value that much quicker.” MOTORTRBO Ion smart radios In addition, Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the University’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link to the University’s CCTV, alarm systems and CriticalArc Safezone® App, security staff need carry only a single device to fulfil their duties.
Texas A&M University opened its doors in 1876 as the state's first public institution of higher learning. Now, it’s well known as a research-intensive flagship university dedicated to preparing Aggie pioneers to take on the challenges of the future. Located in the heart of the Houston-Dallas-Austin triangle, Texas A&M's main campus in College Station, Texas, is home to more than 69,000 students. Another 5,200 are at branch campuses. The challenge Staff would write tickets when they saw cars without valid parking receipts or hang tags The growing student and staff population at Texas A&M University led to more cars, bicycles, foot traffic, and bus passengers to manage. Manual processes couldn’t keep up. Issuing and managing physical permits required significant administrative work, and the parking enforcement team relied on foot patrols to walk each parking lot. Staff would write tickets when they saw cars without valid parking receipts or hang tags. It was a slow and cumbersome process, making it difficult to monitor parking lot occupancy to ensure the number of permit holders matches the number of available spots. The solution Efficient parking enforcement: Patrollers use vehicles equipped with AutoVu SharpZ3 cameras to enforce parking and track real-time data on parking lot usage — even during large events. Improved parking permit distribution: Vehicle information is in the system almost immediately after the customer purchases the permit, reducing overhead costs since hang tags don’t have to be printed and distributed. Increased customer satisfaction: Students, faculty, staff, and guests don’t need a hang tag or paper permit. Users can go online and change the plate on their account, and it’s in the system within minutes. “The reduction in time and resources required to enforce parking is notable. A patrol that used to take an hour now takes around 10 minutes. We’re able to reallocate resources in a more efficient way,” said Dell Hamilton, Parking Systems Manager at Texas A&M Results Now, parking enforcement is based on license plate registrations, and the university has eliminated physical permits for the majority of customers. Patrollers use vehicles equipped with AutoVu SharpZ3 cameras to enforce parking and track real-time data on parking lot usage — even during large events. Getting data more quickly also makes it easier to manage the variety of parking restrictions that exist on campus. This includes spaces reserved for specific groups of people, time of day restrictions, and timed parking limits in areas such as the student recreation center. “Going away from paper permits and hang tags was a huge success,” Hamilton said. “Today, the vast majority of permits issued can be validated with ALPR. Users can go online and change the plate on their account, and it’s in the system within minutes. We not only save on printing and shipping costs but also make it easier for the customer to exchange or return their permit.”
Thames Valley Police worked with local authorities to improve CCTV coverage, cut costs, and boost efficiency. It’s made public spaces safer and ensured long-term, reliable monitoring across the region. Thames Valley Police is the largest non-metropolitan police force in England and Wales, covering 2,218 square miles and a population of 2.42 million people. Its jurisdiction includes multiple towns, city centres and council areas across the three counties of Berkshire, Buckinghamshire and Oxfordshire. Setting a long-term vision for public space CCTV Public space CCTV is vital in deterring and detecting crime across the Thames Valley Public space CCTV is vital in deterring and detecting crime across the Thames Valley. However, significant pressure on local authority budgets has made it increasingly difficult for councils to provide public space CCTV. There was real jeopardy that financial constraints would result in unmaintained systems, with limited or no real-time monitoring. A fresh approach was needed, so the Thames Valley CCTV partnership between Genetec™ and Hanwha Vision was formed. The first major challenge was securing funding to overhaul several local authorities’ ageing systems, which were proving increasingly expensive to upgrade and maintain. The second was to manage the ongoing costs of staffing control rooms to ensure the long-term sustainability of monitored CCTV across the Thames Valley. Ownership and monitoring of public space CCTV Ambitious plans were devised to pool resources and replace many disparate systems with one police-owned system that could extend across multiple authorities. In effect, the aim was to transfer the ownership and monitoring of public space CCTV from local authorities to dedicated Thames Valley Police control rooms. It would be led by the Thames Valley Police & Crime Commissioner (PCC) Matthew Barber, collaborating with any local authority who chose to participate. It was a feat that had never been attempted in the UK on this scale that held the potential to drive efficiencies and enhance CCTV provision in areas it might otherwise have deteriorated. Ongoing commitment and investment “CCTV is an important part of community safety; benefitting police and local communities in helping to deter crime and antisocial behaviour, identify offenders and support prosecutions." "Ongoing commitment and investment enables high quality, consistent and sustainable CCTV provision now and into the future”, explains Matthew Barber, PCC, Thames Valley. Centralisation creates area-wide visibility and control Several control rooms in the Thames Valley, like Windsor & Maidenhead, had implemented Genetec Security Centre Several control rooms in the Thames Valley, such as Windsor & Maidenhead, had already implemented Genetec Security Centre and were very happy with its operation. Furthermore, as an open platform video management system, it could minimise costs by supporting a phased unification or “takeover” of existing systems across the Thames Valley. Finally, its hybrid cloud architecture provided Thames Valley with maximal flexibility to leverage any combination of cloud or on-premises infrastructure according to Name Thames Valley Police Industries Public Safety Location Thames Valley, United Kingdom Products Genetec Security Centre; Genetec Cloud Services; Federation Technology Partners Hanwha Vision Channel Partners CDS Systems what made sense for each application and location. This made it the obvious choice on which to standardise. Range of multidirectional AI-enabled cameras Following a competitive tender, Thames Valley chose CDS Systems to implement its proposed solution. This would be built on Genetec Security Centre and incorporate a range of multidirectional AI-enabled cameras from Hanwha Vision. A key driver in the decision was the high levels of commitment shown by all three parties to cybersecurity. Another was the recognition that the system design and technology selection could ensure a cost-effective implementation that could continue to evolve in line with the needs of its users. Integration between Genetec and Hanwha Vision technology Legacy cameras were retained and reused to maximise the return on existing investment wherever possible “We urgently needed to improve the quality of CCTV, enhance collaboration, and drive efficiencies for all partners. The respective capabilities and seamless integration between Genetec and Hanwha Vision technology was the optimal way of meeting Thames Valley’s requirements,” says Sam Thomas, CDS Systems. Phase one of the deployment involved CDS taking over an existing control room in Milton Keynes, replacing the legacy analogue infrastructure with a modern IP backbone. It then installed Genetec Security Centre to establish one platform through which officers could smartly interact with all incoming video feeds. Legacy cameras were retained and reused to maximise the return on existing investment wherever possible. A second Genetec workstation was also set up inside Slough Police Station, allowing officers to rapidly review footage for improved community response. Hanwha Vision’s AI-enabled multidirectional cameras CDS then introduced Hanwha Vision’s AI-enabled multidirectional 4k cameras to improve CCTV coverage and quality in public spaces. Each of these cameras incorporates up to five cameras in one device for wide-area surveillance, which would previously have required several separate devices, simplifying installation and resulting in significantly less associated cabling and infrastructure. They also provide powerful AI analytics, including accurate object detection and classification, to enable forensic search and save operators' time when responding to incidents. For example, identifying and establishing the movement of specific people or vehicles based on attributes such as vehicle type. Thames Valley CCTV partnership Phase two will see four additional control rooms in Oxfordshire merged into a single hub Phase two will see four additional control rooms in Oxfordshire merged into a single hub inside Abingdon Police station, also built on the Genetec Security Centre. This and the control room in Milton Keynes will be interlinked, adding further resilience as each site will be able to act as a fallback for the other. At this point, there will be a dedicated team of eighteen staff responsible for monitoring CCTV and enhancing CCTV for all participating communities in the Thames Valley CCTV Partnership. Innovative and cost-effective solutions “The CCTV Command Suite enabled by CDS, Genetec and Hanwha Vision has improved our workflows beyond recognition, enabling staff to quickly review and package evidence for frontline officers or more complex investigations. It has received several plaudits from officers for its ease of use,” says Jason Owen, CCTV Operations Manager, Thames Valley Police. “This collaboration between Thames Valley Police, Genetec, CDS Systems, and Hanwha Vision showcases the power of partnership in driving innovative, cost-effective solutions that improve public safety,” says John Boorman, Head of Product and Marketing at Hanwha Vision Europe. “Our AI-enabled cameras are designed to reduce false alarms and streamline operations, ensuring teams can focus on real incidents and drive efficiency across their monitoring.” Efficiency, at a lower cost All CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers Pooling resources and transferring ownership to the police has brought about significant cost efficiencies for participating authorities, while also enhancing the quality and reliability of public spaces CCTV. Just as importantly, it has dramatically improved the police’s direct access to quality video evidence. Unlike in a traditional council-run control room, all CCTV operators are civilian police staff vetted to the same clearance levels as sworn-in officers. This means they have full access to Thames Valley’s suite of police databases and reporting software packages. They are better equipped to rapidly report incidents, support front-line officers, and communicate effectively with investigators as a result. On average, it handles between 300 – 500 incidents a month and has substantially increased the number of successful requests for supporting footage. “We’ve immediately seen the benefit of our investment in equipment and CCTV operators, with the police now much better equipped to deter and detect crime across the Thames Valley,” adds Barber. A solid platform for further improvements Control room operators’ intuition will always be the driving force that brings results Looking forward, Thames Valley has plans to use the Genetec platform to connect its people and mobile surveillance assets back to its control rooms for better cross-force interaction. Genetec Federation as a Service is already allowing live and recorded video to be shared with officers in the field. Soon it will also be extended to ensure video from police CCTV vans and drones is immediately available in the control room. In both cases this is achieved without complex network configuration, requiring only an internet connection. It is also at the beginning of its journey of fully realising the value of the AI-equipped Hanwha Vision cameras specified by CDS. Control room operators’ intuition will always be the driving force that brings results, but AI is freeing them up to do what they do best by saving time on routine monitoring and searches. Cost savings, resilience, and efficiencies Finally, talks continue that would see the addition of further control rooms across the Thames Valley to the Thames Valley CCTV Partnership. Having proven the model, would allow it to scale operations further to deliver even greater cost savings, resilience, and efficiencies. “We’re proud of what we’ve achieved to date but have no intention of resting on our laurels. The foundations we’ve established will ensure continued high-quality, consistent, and sustainable CCTV provision for our communities,” concludes Owen.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed at Scott County R-IV School District in Benton, Missouri, to mitigate gun-related violence. The deployment was facilitated by Freedom Security, a local security provider serving the greater Missouri Area. Robust security upgrades Located in a rural community near the borders of Illinois and Kentucky, Scott County R-IV School District consists of a single campus with three interconnected buildings serving students from pre-K through 12th grade. The district educates approximately 800 students annually and employs around 125 teachers and administrators. ZeroEyes is the newest addition to the district's robust security upgrades, which include window tints, HAVEN locks, integrations with CrisisGo, and more. Digital security cameras ZeroEyes’ AI gun detection and intelligent situational awareness software layer onto existing cameras ZeroEyes’ AI gun detection and intelligent situational awareness software layer onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administration as quickly as 3 to 5 seconds from detection. ZeroEyes safety strategy “ZeroEyes is not intrusive or invasive, and it does more than just detect; it alerts, responds, and continues to do so throughout any situation involving a potential threat,” said Dr. Bradley Kolwyck, Superintendent of Scott County R-IV School District. “This technology is the final piece we needed to ensure every layer of our safety strategy is connected, enabling us to provide the safest environment possible.” ZeroEyes deployment ZeroEyes and the district are hosting a Lunch & Learn session at 11:00 am at the Scott County ZeroEyes and the district are hosting a Lunch & Learn session at 11:00 am at the Scott County R-IV District Office (4035 State Highway 77, Benton, MO). It will feature demonstrations and discussion sessions, including reflections from school pioneers on the district’s successful ZeroEyes deployment. The event is open to local schools, law enforcement, and media. ZeroEyes’ innovation and protection “I commend Scott County R-IV School District for taking the initiative to lean into innovation and proactively protect its students from gun-related violence,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “ZeroEyes’ ability to provide first responders and law enforcement with advance warning and situational awareness empowers them to act quickly and save lives.”
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced that its technology has been deployed at East Hill Synagogue in Englewood, New Jersey, to proactively address gun-related threats. East Hill Synagogue is a 20+ year-old house of worship serving a diverse community of Modern Orthodox Jews, offering Shabbat and holiday prayer services, adult education and family activities. Proactive security measures ZeroEyes is one of multiple solutions in East Hill’s multi-layered security approach ZeroEyes is one of multiple solutions in East Hill’s multi-layered security approach, enabling members to participate in religious activities without fear or distraction. Anti-Semitic attacks have reached new levels in the past 18 months, with the Anti-Defamation League reporting that the U.S. has seen a 200% increase in hate crimes. This concerning fact highlights the need for increased proactive security measures to protect congregants during worship services and other events. Overall security initiative “Jewish law dictates that preserving (saving) life is a top priority, and we take that quite literally at East Hill Synagogue; safety is our top priority,” said Jonathan Blinken, Directory of Security, East Hill Synagogue. “ZeroEyes is one of the most important layers that we have in our overall security initiative. It is an extremely powerful tool to help us protect those that we love, our institutions and everyone that comes to visit them.” Digital security cameras ZeroEyes' AI gun detection and awareness software layers onto existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and synagogue staff as quickly as 3 to 5 seconds from detection. ZeroEyes to safeguard from gun-related threats "Every individual has the right to safety in their place of worship, and it’s deeply troubling when violence threatens that sense of peace," said Mike Lahiff, CEO and co-founder of ZeroEyes. "We thank East Hill Synagogue for trusting ZeroEyes to safeguard their congregation from gun-related threats, ensuring their community remains secure and welcoming."
In areas such as high-precision metalworking, accuracy is non-negotiable. This includes the automotive industry and its suppliers, which are in crisis in Germany for a variety of reasons. The industry is under enormous pressure to deliver products of impeccable quality and at the same time reduce operating costs, for example by increasing process speeds. The automotive industry's quality assurance standards are strict, the component geometries are complex and the demands on precision and process reliability are enormous. Fluctuations in detection, insufficient traceability to individual serial numbers or batches and changing environmental conditions can lead to costly errors, production downtime and complaints. Innovative solution for AI quality inspection VIVALDI Digital Solutions GmbH has set an exemplary, innovative solution for AI quality inspection VIVALDI Digital Solutions GmbH has developed an exemplary, innovative solution for AI quality inspection in real time. In addition to an edge server with an Intel processor, intelligent image processing plays a key role in the so-called SensorBox. Designed for an automotive supplier and its production site in the Czech Republic, up to 70 USB3 uEye+ XC autofocus cameras from IDS Imaging Development Systems perform automatic visual inspection for surface inspection in several inspection cells. AI recognises various surface defects "The IDS cameras integrated into the test cells capture high-resolution images of the surface of aluminium components from German OEMs, in this case an electric motor," says Uwe Siegwart, Managing Director at Vivaldi, explaining the camera's task. The captured images are pre-processed to optimise factors such as exposure, white balance and colour correction. The AI recognises various surface defects such as scratches, pores or dirt. Strict requirements at the plant Up to 2,400 electric motor housings per day are tested 100% automatically with the implemented system "There are strict requirements at the plant in the Czech Republic. According to the defect catalogue, defects from 0.2 millimetres must be reliably detected. The test time per component must not exceed 36 seconds," says Uwe Siegwart, explaining the stringent guidelines. Up to 2,400 electric motor housings per day are tested 100 percent automatically with the successfully implemented system. Why did the AI specialist choose the uEye XC camera from IDS? "The decisive factor was that the autofocus camera can capture several surfaces at different distances from the camera," says Eike Humpert from Vivaldi's Business Development department. This simplifies the testing process enormously and ensures greater efficiency and flexibility. This is a crucial factor when, for example, different component variants need to be tested. With the macro attachment lens, the minimum object distance of the camera can also be shortened very easily. BSI pixel technology "The BSI pixel technology enables the sensor to deliver consistently precise and reliable results, even in changing light conditions," explains Jürgen Hejna, Product Owner 2D cameras at IDS. It is not only the excellent low-light performance and minimal pixel noise that make the sensor particularly suitable for this application. "The 24x digital zoom, combined with auto white balance and precise colour correction, contributes significantly to the success of this demanding test procedure," emphasises Jürgen Hejna. AI-based image processing The simultaneous image processing task is complex and the challenges are diverse The simultaneous image processing task is complex and the challenges are diverse. Aluminium parts often have very shiny surfaces that reflect light and therefore have a strong influence on images. These reflections make it difficult to reliably recognise defects such as scratches, cold runs, chatter marks or surface irregularities, as they are often obscured or distorted by light reflections. This, along with other material and environmental variations, means AI-based image processing must therefore be able to distinguish precisely between the normal material structure and actual raw areas in surfaces to be processed that are considered defects. AI-supported and synchronous camera control via edge server Image processing is carried out via an optimised infrastructure. Up to eight cameras can be connected per USB hub, enabling simultaneous recording of several inspection areas. A maximum of two of these USB hubs are connected to a self-developed 'cam controller', which bundles and processes the image signals. Several cam controllers are networked with the edge server. This server not only calculates the AI-supported analyses, but also communicates directly with the system controller, which coordinates the triggering of the cameras and ensures synchronised recording. Digitised quality data acquisition Up to eight cameras can be linked per USB hub, enabling simultaneous recording of inspection areas "Image processing is a central component for traceability, which is the actual technological centrepiece of the solution, and IDS is the ideal partner for this point”, underlines Uwe Siegwart. "Digitised quality data acquisition in real time and linking with other production parameters not only increases efficiency, but also significantly reduces rejects and rework. Errors are minimised, costs are reduced and production processes are optimised." The system has already paid off in the Czech Republic: The number of complaints per year has been reduced by two-thirds and the number of unrecognised surface defects has even been reduced to zero. Outlook "The market for digital quality control is developing rapidly, particularly due to more favourable camera technology, for example with regard to higher resolutions. Optimised image processing processes and tools also make it possible for real-time analyses to be carried out by end users," states Eike Humpert. "Improved resolution, more compact design and price-optimised cameras are in demand." The portfolio of the industrial camera manufacturer IDS is designed to meet this demand with state-of-the-art technology.


Round table discussion
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
As the new year dawns, it's a good time for the security industry to look ahead to 2024. We asked this week's Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionise physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?

The ultimate guide to mastering key control
Download
Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download