Mergers & Acquisitions
Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS S...
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, today announced it is in the final stage of obtaining the ISO/IEC 42001 certification for its Artificial Intelligence (AI) management systems. Once completed, this certification will make i-PRO the first company in the physical security industry to reach this level of ethical AI governance, reinforcing its commitment to transparency, accountability, and securit...
Trackforce, a pioneer in security workforce management software, and Immix, a provider of commercial central station and remote SOC software for managed video and security services, announced a strategic partnership to enhance remote guarding operations through advanced automation and seamless security event management. The collaboration integrates Trackforce’s comprehensive front-line to back-office suite, TrackTik, with the Immix platform to create an industry-first automation...
Award-winning global security manufacturer, Gallagher Security, is proud to announce the signing of two Memorandums of Understanding (MoUs), which took place during New Zealand Prime Minister Rt Hon Christopher Luxon’s five-day trip to India last month. Aimed at enhancing New Zealand’s presence in key sectors in India, including education, technology, tourism, investment, manufacturing, food and primary industries, Prime Minister Luxon’s visit marked a significant milest...
ImmuniWeb Community Edition is a set of free online security tests that have performed over 380 million of successful security tests and scans since 2019. Publicly accessible data from the Community Edition is also utilised in the upcoming 2025 Data Breach Investigations Report by Verizon. In 2025, each day over 100,000 scans are run, testing web, mobile and cloud security, as well as detect phishing campaigns and data leaks on the Dark Web. Cyber threat exposure ImmuniWeb offers a foundation...
Delta, a pioneer in power management and smart green solutions, highlighted at Hannover Messe 2025 a versatile set of AI-driven smart manufacturing, energy infrastructure, and data centre solutions. These include the award-winning D-Bot series cobots, featuring advanced cognitive capabilities and integration with NVIDIA Omniverse to develop next-generation digital twins; and DeltaGrid®, the AI-enabled energy management platform to optimise efficiency in the energy infrastructure supporting...
News
As airports invest heavily in automation, biometrics, security, self-service and personalised commercial services, terminal layouts must evolve alongside these innovations. The traditional model involving rows of check-in counters, static security areas, and inefficient passenger flows no longer makes sense. Instead, airports need seamless integration, where smart technology and intelligent design work together to reduce congestion and make the most out of every square metre. Acquisition of CCM CCM is synonymous with world-famous high-quality Italian design in the airport space With this in mind, SITA, the pioneer in air transport technology, announced the closure of the acquisition of CCM, headquartered in Milan, Italy, a world-renowned expert and pioneer in the design, production, and creation of airport interiors. This strategic move aims to redefine how airports function by seamlessly blending technology and interior design to create future-ready spaces. CCM is synonymous with world-famous high-quality Italian design in the airport space. It works with pioneering architects and designers to create efficient, functional, memorable, and stylish traveller experiences. New approach to space management "This isn't just about expanding airports," said David Lavorel, CEO at SITA. "It's about reimagining them. With CCM's deep design and execution expertise, we're transforming airports to maximise their existing footprint, optimise passenger flow, and create smarter, more flexible and valuable airport terminal environments that evolve with the changing needs of the industry." As the pioneer in passenger processing technology, SITA is at the forefront of managing airport space more efficiently. The industry's transformation demands a new approach to space management, where traditional check-in counters are replaced with innovative designs that reflect modern travel habits. Built on tech solutions "Building efficient, tech-enabled environments is crucial for the future of travel. Airports are not just transit points; they mark a moment in a journey, no matter the destination." "By integrating our expertise, we bring to life the airports of the future - architecture that is built on tech solutions and driven by efficiency to improve the overall travel experience for passengers and the operations of airport staff," said David Lavorel. SITA's existing technology The acquisition of CCM adds valuable design and customer advisory elements to SITA's existing technology The acquisition of CCM adds valuable design and customer advisory elements to SITA's existing technology, reinforcing its commitment to pioneering the future of air travel. Sergio Colella, President, Europe at SITA, added: "The market needs a fundamental shift— where technology and design work together to make airports smarter in using their space for more capacity and with flexibility to support the next generation of travel. That's why we're bringing CCM into the SITA family." "By combining our technology and experience in airport operations with their deep understanding of design and space optimisation, we are bringing to the market a unique 'technology by design' capability and end-to-end integration from design to operations, all in harmony since the conception of the idea." AI-driven airport operations For 35 years under the management of the Marinoni family, CCM has worked on more than 300 airports worldwide, designing and delivering terminal spaces that balance efficiency, flexibility, and passenger experience. Now, with SITA's expertise in passenger processing, baggage handling, and AI-driven airport operations, this acquisition will help airport customers integrate technology and design as a single go-to solution, something that was not available up to now. SITA 2024 Air Transport IT Insights report These investments will only deliver their full impact if airports are physically designed to support them According to the SITA 2024 Air Transport IT Insights report, 63% of airports are prioritising self-service, biometrics, mobile apps, and IT spending has surged to $8.9 billion as airports focus on automation, AI, and digitalisation. But these investments will only deliver their full impact if airports are physically designed to support them. Technology alone won't fix congestion. It needs smarter layouts, frictionless movement, and an infrastructure that evolves with it. Monica Oberti has been appointed interim CEO of CCM, bringing decades of extensive expertise in reshaping and repurposing spaces at a large scale globally within CCM. Ms Oberti is a member of the founding Marinoni family. New opportunities in airport environments "For too long, airports have had to choose between efficiency and passenger experience. Now, they don't have to. By joining forces with SITA, we can finally bring together the best of both worlds – smart technology, intelligent design, and quality production. Together, we're not just improving airports, we're reshaping them for the future," said Monica Oberti, Interim CEO of CCM. SITA and CCM are moving fast to integrate their expertise, ensuring that existing customers experience no disruption in service, while opening up new opportunities to optimise their airport environments. The aviation industry is evolving at an unprecedented pace, and airports need solutions that don't just help them catch up but allow them to get ahead.
Allied Universal®, the world’s pioneering security and facility services company, is pleased to announce that a member of its Technology Services business unit has been named to the Security Industry Association (SIA) 2025 Women in Security Forum (WISF) Power 100 list. Candice Zelaya, regional strategic installation manager for Allied Universal Technology Services, was selected for her demonstrated excellence in leadership, innovation and impact of contributions on her team. Leadership roles for women “I’m honoured to be recognised by SIA for this prestigious accolade and privileged to be in the company of so many talented women who have had such a significant impact on the security industry,” Zelaya said. “I’m particularly proud to work for an organisation that focuses on fostering leadership roles for women at all levels, and one that promotes engagement and belonging within and outside our company.” Innovative contributions by women SIA’s Women in Security Forum is a community that works to engage all security professionals SIA’s Women in Security Forum is a community that works to engage all security professionals to promote, recruit and cultivate women’s leadership for a bolder presence within the industry. This initiative annually honours 100 women in the security industry whose outstanding accomplishments and success stories are breaking barriers, redefining the faces of leadership and showcasing the innovative contributions women bring to the industry. Achievements and contributions “Congratulations go out to Candice and we thank her for her outstanding professional achievements and contributions,” said Steve Jones, Allied Universal global chairman and CEO. “Our female team members around the world consistently lead with passion and enthusiasm, inspiring others every day. Their dedication fuels our success and contributes to a positive and supportive work environment.” Allied Universal is committed to becoming an Employer of Choice, including the removal of any barriers preventing women from having rewarding careers.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the introduction of PowerG +, the next generation of trusted PowerG technology. PowerG + adds new, in-demand features atop PowerG's strong foundational capabilities to power the next generation of security and home automation. Modern security protocols “PowerG + uplevels our proprietary wireless technology, helping us meet the evolving needs of dealers and end users while raising the bar for modern security protocols,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “The feedback loop we’ve established with our customers builds trust and enables us to deliver the most impactful features they need to scale and improve their businesses.” Next generation of PowerG + Power G + builds upon that strong foundation, launching immediately on 11 devices Power G is known for its vast ecosystem and trusted reputation, and Power G + builds upon that strong foundation, launching immediately on 11 devices. New devices included in the next generation of PowerG + include Indoor PIR Cam and Indoor Motion PIR, Door/Window Contact with Auxiliary Input, Vanishing Door/Window Contact, Wireless Repeater, Glass Break Detector, Water Tile with Freeze Detection, Smoke/Heat Detector, and PGP-IO, a device enabling the remote control of wired devices. Key product features of PowerG + sensors PowerG + sensors will enrol on all 4th Generation IQ Panels and the new features will be standard on all new devices as well as accessible on other systems through future releases. Key product features include: Enhanced functionality: With real-time battery life reporting, dealers can proactively check the exact battery percentage of all devices, not just low-battery notifications, to increase the efficiency of service calls and maximise their time. More control: Sensor lockdown is now accessible to every dealer, providing takeover prevention at the device level. Equipped with temperature sensing and other multi-sensing technologies, PowerG + devices are integrating more environmental data to become smarter than ever. Secure, future-proof technology: PowerG + sensors can be upgraded with over-the-air updates or promptly resolve any issues with devices remotely. Equipped with encryption against cyber threats, PowerG + devices also feature two-factor authentication during enrolment for added security. A modern design: PowerG + devices and packaging have been refreshed for a modern look and feel. Matte-finish shells in multiple colours can be fitted to the select PowerG + devices, offering flexibility to blend hardware seamlessly into any environment. Wireless connectivity of PowerG + PowerG + is now open for purchase globally, with select PowerG + devices available to purchase Johnson Controls will also preview the launch of IQ Panel 5. With trailblazing capabilities, future-ready updates and the pioneering wireless connectivity of PowerG +, the IQ Panel 5 offers the advanced security and automation the end users demand while maintaining the familiarity of IQ Panel 4. PowerG + will be on display at ISC West 2025 in Las Vegas from March 31 – April 4 (Booth #18033) for attendees to experience first-hand. PowerG + is currently available for purchase globally, with select PowerG + devices available to purchase at ISC West 2025. Next era for commercial buildings Johnson Controls proudly celebrates its 140th anniversary in 2025, marking a legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. The company continues to redefine building performance, driving the next era for commercial buildings, transforming industries and powering its customers’ missions.
Fire and Security Apprenticeship Specialist, Skills for Security proudly marks the success of an inaugural Careers Fair, taking place near its Walsall training branch at The Bescot Stadium Locker Room. The event, designed to introduce local school leavers to career opportunities in the fire and security industry, welcomed an enthusiastic turnout of students, educators, and industry professionals. Fire and security sector The event provided a unique platform for students aged 14 to 18 to explore potential career paths As the first careers fair of its kind dedicated solely to the fire and security sector, the event provided a unique platform for students aged 14 to 18 to explore potential career paths. Says David Scott, Managing Director of Skills for Security: "We asked, and the industry responded. With the support of our sponsors, the overwhelming response, as the first careers fair dedicated to fire and security highlights the enthusiasm and curiosity of young people when presented with clear career pathways." Fire and security apprenticeships Scott added: “The industry offers rewarding and long-term opportunities, and the event has provided a vital local platform to showcase the many ways students can build a successful future in the sector. Seeing so many students, teachers, and employers come together to engage in meaningful conversations has been truly inspiring." Organised by Skills for Security, the UK’s pioneering provider of fire and security apprenticeships, the fair aimed to bridge the industry’s skills gap by offering hands-on insights into apprenticeship pathways, career opportunities and real-world industry engagement. Latest technological developments Attendees had the option to interact with keynote speakers and explore live apprenticeship vacancies Featuring industry-pioneering sponsors, including a dedicated speech from Steve Riley, Division Director at Comelit-PAC on inclusivity in the workplace, exhibitors included Ajax, CSL, Fenix Monitoring, HKC, Orisec, RISCO, Pyronix, HID Global, Honeywell, Cento, AddSecure, Deep Alert, Smoke Screen, Videcon, Yuasa Battery, Obsequio, Protec, Marlowe, EDSB, Amulet and the Skills for Security Talent Acquisition team. Each was on hand to offer career guidance, CV-building support, and insight into the latest technological developments in the sector. Attendees also had the opportunity to interact with industry keynote speakers and explore live apprenticeship vacancies. Networking opportunities The event successfully connected students with potential employers, offering valuable networking opportunities and first-hand insights into the fire and security profession. Teachers and career advisors also benefited from the event, gaining a deeper understanding of the industry’s career prospects to better guide their students. Next generation with the skills and knowledge David concluded: “Following the success of this event, we are already planning future careers fairs to continue supporting young people in their career journeys." "We remain committed to raising awareness of the exciting opportunities within the fire and security sector and equipping the next generation with the skills and knowledge needed to thrive.”
Cozaint, a pioneer in innovative physical security and video surveillance solutions, announced a strategic partnership with Insurgo, a specialist in secure data erasure and LTO tape management. This collaboration aims to provide unparalleled long-term video surveillance storage solutions, leveraging the efficiency and cost-effectiveness of Linear Tape-Open (LTO) technology, enhanced by Cozaint’s MARCIA middleware and Insurgo’s Investigo tape tracking system. Seamless data integration LTO technology offers a reliable, scalable, and cost-effective alternative to traditional hard drive storage As the volume of video surveillance data continues to surge, organisations face increasing challenges in managing and storing these vast amounts of information. LTO technology offers a reliable, scalable, and cost-effective alternative to traditional hard drive storage, significantly reducing long-term storage costs and energy consumption. However, managing large LTO tape libraries can be complex, requiring robust tracking and management systems. This cooperation addresses these challenges by integrating Cozaint’s MARCIA middleware with Insurgo’s Investigo tape tracking system. Cozaint’s MARCIA platform simplifies the integration of LTO into video surveillance workflows, providing seamless access and management of all recorded video data. Secure data management Insurgo’s Investigo system adds a critical layer of security and auditability, ensuring tapes are tracked, managed, and accessed with precision and compliance. Key Benefits of the Partnership: Cost-Effective Long-Term Storage: LTO tape provides a significantly lower cost per terabyte compared to hard drives, reducing overall storage expenses. Enhanced Data Security and Compliance: Insurgo’s Investigo system ensures secure and auditable tape management, meeting stringent compliance requirements. Simplified LTO Integration: Cozaint’s MARCIA middleware streamlines the integration of LTO into existing video surveillance systems, minimising complexity. Scalable and Reliable Storage: LTO technology offers robust scalability and reliability, ensuring long-term data preservation. Efficient Data Retrieval: MARCIA and Investigo combined provide a streamlined process for locating and retrieving critical video footage. Efficient data archive “In today’s data-driven world, managing video surveillance archives efficiently and securely is paramount,” said Nauzad Sadry, CTO of Cozaint. “Our partnership with Insurgo and the integration of MARCIA with Investigo provides a comprehensive LTO solution that addresses the critical needs of our customers, offering a cost-effective and secure way to manage their video data.” Seamless security integration “By integrating our Investigo scanners with Cozaint’s innovative middleware, we are completing the chain of custody by leveraging our tracking software to enhance the CCTV management," said Gavin Griffiths, Managing Director of Insurgo.
WeSuite, the creator of award-winning sales management software for security technology providers, is thrilled to announce its strategic integration with System Surveyor. The pioneer platform for site surveys and system design. Security integrators often face the challenge of helping their customers visualise and fully understand proposed solutions during the sales process. Streamlining proposal process This powerful integration enables users to seamlessly link one or multiple System Surveyor surveys directlyBy integrating the site survey and design directly into the written scope of work within the proposal, customers can easily verify that the solution meets their specific needs. Proposals with clear, well-defined scopes of work streamline the decision-making process, making it faster and easier for customers to sign on the dotted line. This powerful integration enables WeSuite users to seamlessly link one or multiple System Surveyor surveys directly to estimates within the WeSuite platform. The partnership enhances proposal documents by automatically incorporating System Surveyor layouts into specified proposal pages, ensuring consistent, professional presentations that showcase system designs with precision. Seamless system integration “We’re excited to launch this integration with System Surveyor because it’s a natural fit,” said Tracy Larson, President of WeSuite. “WeSuite ensures precision and profitability in estimating and automates generation of proposal and contracts, while System Surveyor brings the design to life.” “Together, our platforms streamline the documentation and management of systems from sales through delivery and ongoing account management." Optimising workflows "This integration with System Surveyor and WeSuite is a great next step to streamline the sales process," said Maureen Carlson, Co-Founder and President of System Surveyor. "Our customer communities want to put their best foot forward to provide a professional design and an easy-to-understand, accurate proposal.” “Together, our platforms enable system integrators to more effectively and efficiently capitalise on the incredible opportunity to serve their customers in a growth market.”


Expert commentary
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
The practice of executive protection changed forever on Dec. 4, 2024, when UnitedHealthcare CEO Brian Thompson was shot outside a Manhattan, New York, hotel. The shocking event raised awareness in board rooms around the world about the need for, and challenges of, executive protection. Questions followed immediately, including why was the high-level executive not protected? Combination of risk and reward UnitedHealthcare’s stock price has gone down more than 20% since the shooting The event also highlighted what is at stake for companies, extending beyond the safety of executives and impacting many factors, even including a company’s stock price. UnitedHealthcare’s stock price has gone down more than 20% since the shooting, equating to tens of billions of dollars. “Companies are considering the combination of risk and reward like never before when it comes to executive protection,” says Glen Kucera, President of Allied Universal Enhanced Protection Services. “What are the chances this could happen? Before Dec. 4 many thought it was zero. And what are the financial implications for a company if it happens? Executive protection is a small investment to protect against a worst-case scenario.” Evaluation of an executive protection Before the UnitedHealthcare shooting raised awareness, fewer than 50% of executives had protection. But concerns that previously fell on deaf ears now have the full attention of companies, says Kucera. “Boards of directors are having to figure this out,” he adds. “They may not have executive protection, but now they have to do it.” A threat assessment, conducted by a company such as Allied Universal, provides an independent evaluation of a company’s executive protection needs. The assessment evaluates factors such as an executive’s travel habits, the safety of their home, etc. Does the executive need protection 24/7, or just when they travel into more dangerous areas? Risks increase related to corporate earnings Sometimes, cases increase the need for executive protection, such as an internal threat In assessing threats, security professionals also look beyond the individual to consider the safety of a corporate facility, for example. “Is there a visual deterrent, controlling who comes and goes?” asks Kucera. “If there is good security, it all ties together. We do home assessment, facility assessment, route assessment, and travel assessment as needed.” Sometimes, circumstances increase the need for executive protection, such as an internal threat. Timing is a factor, and risks increase related to corporate earnings releases, new product announcements, and corporate layoffs or consolidation. Monitoring social media tracks shifting threats that impact the need for executive protection. UnitedHealthcare shooting “He didn’t have it and probably didn’t think he needed it,” comments Kucera about the UnitedHealthcare executive who was gunned down in the streets of New York City. “He was staying at the hotel across the street and was used to walking down the street every day.” “Sometimes executives want to preserve their privacy and be able to walk down the street,” says Kucera. “Getting protection can be seen as a sign of weakness. Some CEOs in the past have said they just didn’t want it.” However, the UnitedHealthcare shooting raised the stakes of the need for more vigilance. “The bottom line is you have to yet beyond objections and make the investment to protect against a worst-case scenario,” says Kucera. Anti-capitalist sentiment in the general population An internal police bulletin warned of an online hit list naming eight executives and their salaries Threats to executives sometimes arise from anti-capitalist sentiment in the general population about perceived inequalities in wealth and power. Executives provide symbolic targets for anyone who fights the system, and social media has amplified the voices of those who oppose capitalism. For example, a "Most Wanted CEO” card deck seeks to shine a spotlight on "titans of greed." Also, in the aftermath of the UnitedHealthcare shooting, CEO "wanted" posters appeared across New York City, threatening various executives of large companies. An internal police bulletin warned of an online hit list naming eight executives and their salaries. Careful monitoring of social media posts Careful monitoring of social media posts and other sources enables executive protection professionals to analyse data and separate the dangerous threats from the merely negative ones. Sadly, positive support of the UnitedHealthcare shooting was expressed by the 300,000 or so followers of the shooter, who became a celebrity of sorts. A huge outcry of negative sentiment toward the insurance industry led to fear that copycat incidents might occur. “There has been an unprecedented amount of positive support for committing murder,” commented Kucera. Executive protection requests HR executives can be at risk, especially at a time of layoffs or consolidation “Let’s face it, there has been a lot of controversy, from COVID to the Middle East crisis, to the political campaign, and there is negativity on both sides,” says Kucera. “People have opportunities to pick sides, and there is a lot of sentiment going both ways, and there is a small percentage of people who will act aggressively.” Executive protection requests now extend beyond the CEO to include others in the management ranks of companies. Basically, any public-facing executive is at risk, including anyone who makes statements to the press. Human resource (HR) executives can be at risk, especially at a time of layoffs or consolidation. Private information on the Internet Typically, an executive is assigned a single armed operative for protection. The firearm serves primarily as a visual deterrent that hopefully makes a potential perpetrator think twice. “When they plan an event like this, their expectation is that it will be a soft target,” says Kucera. “If there is an officer, it gives them pause.” Controversial or high-profile CEOs are typically protected 24/7, including when they travel with their family. Adding risks is the fact that private information is now posted on the Internet, including where an executive lives and where their children go to school. Internet monitoring Internet monitoring also includes the “dark web,” which includes sometimes dangerous information “We offer social media monitoring, and we advise them to be more careful with what they post,” says Kucera. “We monitor reactions to posts including any that might be threatening. We watch social media carefully if a company announces earnings or a change in their service or product offering.” Internet monitoring also includes the “dark web,” which includes sometimes dangerous information that is intentionally hidden and requires specific software, configurations, or authorisation to access. Own layer of protection Public and government officials can also come under fire in a variety of scenarios. FEMA officials faced threats after the recent floods in the Southeast, for example, among other situations where perceived unfair treatment promotes thoughts of retribution. Although government agencies have their own layer of protection, there are instances when they call on companies such as Allied Universal for additional help. Ad hoc protection for various executives In the aftermath of the UnitedHealthcare shooting, calls to Allied Universal’s Command Centre increased by 600%, reflecting requests for ad hoc protection for various executives. These requests are in addition to the company’s business providing “embedded” operatives that travel with executives all or some of the time. On that side of the business, requests for services are up probably 300%, says Kucera. {##Poll1742194323 - Has the recent increase in violent threats changed your company's view on executive protection?##}
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Case studies
Jacksons Fencing successfully supplied and installed its state-of-the-art EuroGuard® Rebound sports mesh fencing at West Beach Tennis Courts in Whitstable, Kent. In partnership with LTA Tennis Foundation, this installation marks a key milestone in Canterbury City Council’s initiative to upgrade local sports infrastructure while reinforcing Jacksons Fencing’s reputation as a pioneer in high-quality, long-lasting fencing solutions for all applications, including sports and recreation. Addressing security and durability challenges The fencing had to withstand harsh weather conditions while maintaining its integrity The key challenges for the fencing were multi-faceted. First, security was a priority. The courts needed to be securely enclosed to prevent unauthorised access and vandalism, yet the boundary needed to remain welcoming and accessible to the public. Durability was another major consideration, especially given the coastal environment, where salty sea air and strong winds could quickly degrade materials that weren’t up to standard. The fencing had to withstand harsh weather conditions while maintaining its integrity and appearance over time. Visibility and safety Visibility and safety also had to be considered. The fencing needed to provide a clear boundary while ensuring that players' views of the court and the picturesque surrounding landscape weren’t obstructed. Additionally, the design needed to be aesthetically pleasing and complement the beachside location, offering a modern, sleek appearance without detracting from the natural beauty of the area. The existing chain link fencing, traditionally used for tennis courts, had fallen into disrepair and needed replacing with something smarter and more durable. A tailored fencing solution Jacksons Fencing supplied and installed EuroGuard® Rebound sports mesh fencing Understanding the unique demands of the project, Jacksons Fencing supplied and installed EuroGuard® Rebound sports mesh fencing, an advanced system engineered specifically for sports facilities. Constructed from galvanised steel mesh and finished with a marine-grade polyester powder coating in green RAL 6005, the fencing provides superior resistance to corrosion, ensuring longevity in the harsh seaside climate. Its innovative mesh configuration allows for excellent ball rebound, minimising disruptions during play while maintaining clear visibility of the surrounding landscape. Sleek and modern design The fencing’s vandal-resistant security clips and tamper-proof fixings further reinforce its integrity, preventing unauthorised interference and ensuring the facility remains safe and secure for years to come. Additionally, the sleek and modern design enhances the overall visual appeal of the courts, seamlessly integrating with the natural coastal surroundings. Enhancing community sports facilities Jacksons Fencing has played a crucial role in elevating the functionality and longevity of West Beach Tennis Courts By implementing EuroGuard® Rebound sports mesh fencing, Jacksons Fencing has played a crucial role in elevating the functionality and longevity of West Beach Tennis Courts. The installation not only secures the site but also enhances the playing experience for tennis enthusiasts, ensuring a professional and well-maintained facility for the local community. EuroGuard® Rebound system Peter Jackson, Managing Director of Jacksons Fencing, stated: “We are proud to contribute to the transformation of West Beach Tennis Courts by providing a high-performance, long-lasting fencing solution." "Our EuroGuard® Rebound system not only meets the practical demands of security and durability but also enhances the overall appearance of the facility. We believe this installation will benefit the community for years to come, offering a safe and enjoyable space for sports and recreation.”
Modern measurement technologies enable high-precision detection of the movement of liquids and gases - and thus provide valuable data for numerous applications. How does the air flow around an aeroplane? How does the blood move through our veins? And how can pollutant emissions in combustion processes be minimised? For this purpose, speed, direction, pressure and turbulence within a flow are analysed in order to increase efficiency, ensure safety and drive innovation in a wide variety of areas. Innovative sensor technology High-resolution cameras are used to track marked particles within a flow and analyse their movement A range of methods are available to measure these flows, including visual ones such as particle image velocimetry (PIV). High-resolution cameras are used to track marked particles within a flow and analyse their movement. iLA_5150 GmbH from Aachen (Germany) now also relies on EBIV. The abbreviation stands for Event-Based Particle Image Velocimetry and is a new optical method for the qualitative and quantitative visualisation of flows and flow velocities. It combines PIV with event-based cameras, here with a uEye EVS from IDS Imaging Development Systems GmbH. The innovative sensor technology of the industrial camera enables highly dynamic and energy-efficient detection, especially of fast and turbulent movements. Application In the EBIV method, tiny particles are added to a flowing fluid and illuminated in a plane, the so-called light section plane. They generate individual light pulses as they enter and exit the LED light section. This change in local brightness is recorded independently by the camera pixels and transmitted to the PC as a data stream of "change events". In contrast to conventional cameras, event-based models therefore only react to the changes in brightness registered in the image field. Stationary scattered light, such as background or a non-changing illuminated surface, does not generate a measurement signal. This reduces the amount of data considerably. Frame rates of up to 10,000 frames per second The data stream essentially contains information about what happens, when and where The data stream essentially contains information about what happens, when and where. In detail, these are the pixel coordinates on the sensor, microsecond time stamps of the pixel events and the information about the events: ON or OFF. This allows a distinction to be made between increasing intensity (ON event) and decreasing intensity (OFF event). Using suitable software, the stream can be converted into an image matrix in which both the spatial information and the linear time base of the stream are available. The result is comparable to the extremely high frame rate of a high-speed camera. EBIV measurement method "The EBIV measurement method differs fundamentally from conventional imaging methods. They usually generate very large amounts of data and require powerful peripherals that can process them. For exceptional frame rates of 1000 Hertz and more, the image-based cameras required are themselves very complex and expensive." "With the help of event-based camera technology, comparable frame rates of 10,000 frames per second are possible, whereby only standard PC interfaces such as USB with a few gigabits per second are required. The price of the event-based models themselves is significantly lower than that of corresponding high-speed cameras and is therefore also very interesting for smaller teaching and research institutions," explains Dr André Brunn - Head of Development at iLA_5150 GmbH. Further processing The user can optimise the display of the move paths and adapt them to unique study objectives The data stream is converted into image data and displayed in a front end - the so-called EBIV viewer - for direct online flow visualisation. The user can also select the integration time, which corresponds to the exposure time of an image camera, as well as the time increments of the sequence, i.e., the period between two consecutive shots. Classic image filters can also be used. With the help of these settings, the user can optimise the display of the movement paths and adapt them to individual examination objectives. Both fine flow details and large-scale patterns can be made more clearly recognisable. This ability to readjust the measurement results is another advantage of the event-based approach. Numerical analysis of the flow properties In the qualitative visualisation of the flow in the EBIV-View, particles are continuously illuminated so that they are visible as luminous traces. The method is therefore very well suited to visualising the flow. However, it does not provide exact measurements of its speed or direction. For a precise, numerical analysis of the flow properties, individual particles are illuminated for a moment using short, time-defined light pulses. Image sequences of the event-based camera As with classic PIV, the image sequences of the event-based camera can also be statistically analysed This allows their exact position to be recorded and their movement quantified. By comparing the particle positions in successive images, the speed and direction of the flow can be precisely calculated using PIV, for example. The result is a transient 2D vector field that changes over time - in other words, the vectors do not remain constant. As with classic PIV, the image sequences of the event-based camera can also be statistically analysed, for example, to determine mean values and fluctuations in the flow velocity. Camera and software On the camera side, iLA relies on a uEye XCP-E from IDS. The small, lightweight industrial camera offers event-based sensor technology in a robust die-cast zinc housing (29 × 29 × 17 mm) with screw-on USB Micro-B connection. It is compatible with all standard C-mount lens sizes. This makes it ideal for both industrial and non-industrial areas. The integrated event-based vision sensor (EVS) was developed by Sony and Prophesee. It is supported by the Metavision SDK, a seamlessly integrated suite of software tools and models, APIs and other training and development resources from Prophesee for efficient analysis, visualisation and customisation. Building on this, the EBIV viewer from iLA_5150/PIVTec is specially tailored to flow visualisation applications. Outlook The optimisation of fluidic systems and processes requires detailed knowledge of the flow conditions The optimisation of fluidic systems and processes requires detailed knowledge of the flow conditions. A qualitative flow visualisation is often sufficient to understand effects and develop suitable control mechanisms. Until now, however, imaging fast flows with high temporal resolution was usually only possible with expensive high-speed cameras. Event-based camera technology offers a cost-effective alternative that requires significantly less technical effort. These “simple” methods have been lacking in teaching and research in particular. Thanks to the extreme data reduction, this technology also allows the use of several cameras or large camera arrays without the periphery becoming a limitation for data transfer. The compact design of the uEye EVS models also makes them ideal for mobile applications. This means that real application environments can be analysed directly for the first time - without having to rely on artificial flow models or channels. Established flow measurement methods Event-based cameras enable efficient, cost-effective and high-resolution visualisation and quantification of flows. Due to the small amounts of data generated, many processes can be analysed almost in real time, which also makes them interesting for use in fully automated systems. Established flow measurement methods such as Particle Image Velocimetry (PIV) can be seamlessly integrated and expanded. The technology can be used wherever flow information is captured by changes in scattered light intensity - be it from moving particles or vibrating surfaces.
Comelit-PAC LOGOS video door entry monitors have been installed at the luxury Mercantile residential development in just two weeks from quotation to project completion, thanks to the enhanced security technology. Situated in Ropewalks, a central hub in Liverpool, the Mercantile is a cosmopolitan living environment situated at the heart of the city. Featuring 32 one- and two-bedroom apartments together with a collection of penthouses, the development is suitable for buy-to-live and buy-to-let clients. Ideal features and benefits of smart LOGOs monitors With premier interior specification, security specialist on site Digital Vision North West was introduced to Comelit-PAC via its gold partner distributor Moreton Alarms, with the smart LOGOs monitors proving ideal features and benefits to seamlessly blend with their surroundings. Says John Morley of Legacie Developments: “Every aspect of the Mercantile has been designed to be world-class and completed to an impeccable standard to maintain our impressive portfolio of luxury living environments in key UK cities. We knew of Comelit-PAC for its own reputation for high specification solutions and were happy to be introduced to the LOGOs monitors. All 32 monitors were installed quickly and offer our residents impressive features and benefits.” Power and use of NFC communications New Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality The new Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality. By harnessing the power of NFC communications and the dedicated MyComelit app, the LOGOS Monitor was selected over other brands for its high-quality video capabilities, user-friendly interface, and competitive pricing. Says Mark Lewis, Director of Digital Vision North West: “The streamlined design and efficient integration of the LOGOs monitors made it the ideal choice for this residential development. Its real benefit is the use of NFC communications, where we could programme each monitor quickly and efficiently, ready for resident use. From quoting to works completion is a top effort to offer such advanced smart door entry technology; we’ll definitely be using them more in the future.” Innovation and security excellence Tom McCabe of Comelit-PAC added: “Whilst Comelit-PAC is known for our focus on style and design, the LOGOs monitor demonstrates our commitment to innovation and security excellence." "We continuously strive to enhance our product portfolio and simplify the setup process, enabling more installers to offer smart door entry technology with ease. It’s fantastic to see LOGOs installed at such a prestigious project in Liverpool and to witness how its advanced functionality enhances both security and convenience for modern city living.”
Growing businesses require flexibility and easy scalability from their access management. Choosing a secure digital solution which easily adapts and grows as needs change, ensures the organisation is prepared not just for now, but for the future. H.R. Owen is a dealership specialising in the sale, service and repair of luxury and sports cars. Its portfolio of high-end brands includes Lamborghini, Bentley, Aston Martin, Rolls Royce and Lotus. Based primarily in London, the company expanded operations with a new facility in Hatfield to accommodate its growing business. As with all of H.R. Owen’s premises, this new showroom required high security due to the nature of its vehicle stock. Access management solution Unified access control solution that could encompass a wide range of openings “Security is paramount as we needed to ensure that we are not just protecting our high-value products, but also our staff and our customers,” explains Sean Nevatte, Group Aftersales Director at H.R. Owen. For the new premises, managers sought a single, unified access management solution which could encompass a wide range of openings including glass doors, fire doors and parking barriers. Investment in digital access H.R. Owen customers expect a degree of refinement in the showroom environment. So, as well as security and reliability, access devices must blend with the high-end interior design. Finally, they needed a solution which offered easy scalability. As a successful, growing company, they have to be confident their investment in digital access would meet evolving requirements for security, flexibility and aesthetics – now and long into the future. SMARTair® brings real-time control and easy scalability “During the planning stages with H.R. Owen and the architects, it was clear that ASSA ABLOY’s SMARTair solution was the only real choice for the site,” says Matthew Taylor, Operations Director at Knightsbridge Security, who installed the dealership’s system. SMARTair, part of a suite of connected digital access solutions from ASSA ABLOY, is an out-of-the-box system ideally suited to medium-sized premises with a broad range of openings to equip. Among more than 100 devices installed throughout the facility, SMARTair Wall Readers and SMARTair i-max Escutcheons were selected for their sleek aesthetics and versatility. Benefits of choosing a wireless solution The facility can manage access remotely, ensuring access rights may be monitored The devices are wireless, and therefore fast and cost-effective to fit. With no need for extensive cabling, they are quickly installed, minimising onsite disruption. Another benefit of choosing wireless, the reach of H.R. Owen’s solution can be easily extended or reconfigured anytime, protecting their investment for the long term. SMARTair is equally convenient to operate. The facility can manage access remotely, ensuring access rights may be monitored or amended in real time in response to any potential threat. SMARTair’s mobile access solution H.R. Owen also chose SMARTair’s mobile access solution Openow®: staff can use their smartphones for access, rather than physical cards or fobs. Access by secure mobile app boosts both security – fewer lost credentials – and sustainability performance by cutting single-use plastics. Particularly well suited to car showrooms and other premises with parking, Openow’s Parking Mode feature allows drivers to unlock barriers from 3m–5m away. They don’t need to get out of the car to open the barrier. This reduces the risk of opportunist theft or unauthorised access, which is a critical benefit for premises like H.R. Owen with high-value goods inside.
The City of Edinburgh is the capital of Scotland and the second most populous city in the country. It is the seat of the Scottish Government and the official residence of the British monarch in Scotland. As well as serving a vital role in government, the city is economically significant for the region, attracting global tourism as well as being home to a world-renowned university. Protecting citizens and visitors as they move through the city and keeping Edinburgh’s roads running smoothly is of the utmost importance. Transforming into a smart city City of Edinburgh Council leadership modernises security and surveillance across the capital The City of Edinburgh Council leadership needed to modernise security and surveillance across the capital. This involved upgrading the control centre to a new smart city operations centre to receive real-time data from Edinburgh’s surveillance network. The centre also integrates with traffic and transport platforms to enhance operational management and improve city planning. Hanwha Vision IP cameras The new control centre gives operators access to real-time data and analytics, for insights that improve response times and situational awareness. Smart technology solutions provider, North, designed a security solution built with more than 100 high-resolution Hanwha Vision IP cameras including the PNM-9322VQP multi-directional PTZ camera and XNO-8080R 5MP IR bullet camera. The solution also incorporates a video management system from Genetec. Comprehensive coverage and intelligence Multi-directional cameras are ideal for monitoring large and complex areas such as city centres Multi-directional cameras are ideal for monitoring large and complex areas such as city centres. The multi-directional PNM-9322VQP features five camera sensors in a single device, minimising the amount of cabling and server infrastructure required compared to installing five separate devices, to improve cost-efficiency while streamlining installation. The XNO-8080R is a 5MP IR bullet camera with accurate video analytics. These analytics - carried out on the device to reduce server needs - include loitering, directional detection, audio detection and sound classification. It features Hallway View to cover narrow areas such as alleyways. Additionally, using the proprietary compression technology WiseStream II improves bandwidth by up to 75% while retaining video quality. Best-in-class cybersecurity Cybersecurity is crucial in a smart city, given the number of connected devices that could be exploited. Hanwha Vision has been hardening its cybersecurity measures for many years with the National Defense Authorization Act compliance (NDAA), UL CAP Certification, and a dedicated security vulnerability response team (S-CERT). Furthermore, North is part of Genetec’s “network of trust” initiative, signalling the close partnership between the two solution providers and their shared focus on securing network and critical surveillance infrastructure. Low-carbon technology Hanwha Vision has been hardening its cybersecurity measures for many years with the NDAA “The new operations centre has been years in the making and it’s fantastic to see it live in action,” said Councillor Jane Meagher, Council Leader, The City of Edinburgh Council. “With cutting-edge low-carbon technology designed to keep the city moving and our communities safe, it drastically steps up our capabilities as a council. Edinburgh is fast becoming an example of a truly smart city and it’s thanks to trailblazing projects like this.” New video surveillance system Andrew Foster, MD – Public Services at North, added: “Helping to drive positive change through smart technology and improved operational systems across Edinburgh is something that North is incredibly proud of. Working together, the city now has access to real-time data that will influence the future of city planning, improve large-scale events and create a greener environment for generations to come.” The new video surveillance system provides Edinburgh with a future-proofed smart city solution with the option to expand and add connected devices such as air quality sensors, smart parking applications and flood sensors.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Union Community School District (UCSD) across La Porte City and Dysart, Iowa to protect students and staff from gun-related violence. Formed through the merger of the La Porte City Community School District and the Dysart-Geneseo Community School District, UCSD serves communities covering Benton, Black Hawk, and Tama counties, including Buckingham, Dysart, Garrison, Geneseo, La Porte City, and Mount Auburn. Multilayered approach ZeroEyes is the latest addition to the district’s security methods, enhancing its multilayered approach The district educates approximately 965 students across a preschool, two elementary schools, a middle school, and a high school. ZeroEyes is the latest addition to the district’s security methods, enhancing its multilayered approach to protecting students and staff from gun-related threats and ensuring a safe learning environment. Safety and security "It is a privilege for the Union Community School district to be the only district in eastern Iowa to collaborate with a well-known, respected company like ZeroEyes to enhance our school environments,” said John Howard, superintendent of UCSD. “Our number one goal has always been and will continue to be, the safety and security of our staff and students. Adding the equipment, technology, and personal expertise associated with ZeroEyes to our current measures further helps us achieve this goal on a daily basis. I am proud of all those who made this possible." Digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto UCSD’s cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto UCSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Advanced security methods “Every student deserves a safe learning environment,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “It's inspiring to see communities such as Union Community School District emphasise the importance of advanced security methods through the deployment of proactive measures such as ZeroEyes.”


Round table discussion
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
As the new year dawns, it's a good time for the security industry to look ahead to 2024. We asked this week's Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionise physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?

A modern guide to data loss prevention
Download
The truth behind 9 mobile access myths
Download
7 proven solutions for law enforcement key control and asset management
Download
Access control system planning phase 2
Download
Security practices for hotels
Download