Museum security
The wait is over! The Cyber Express proudly announces the return of World CyberCon, India Edition, set for September 27, 2024, in Mumbai. Under the theme “Strengthening India’s Digital Frontier: Preparing for Future Challenges,” this prestigious event is not just a conference but an award ceremony and exhibition. It offers a platform for recognition, networking, and showcasing the latest innovations in cybersecurity. Event highlights World CyberCon 2024 promises...
Security is more relevant than ever. Whether it’s cybersecurity, intrusion protection or access control - the demand for individual and tailor-made security solutions in industry, companies and private households is constantly increasing. As the pioneering trade fair, Security Essen brings together the security industry and showcases innovations and developments with around 500 exhibitors from September 17 to 20. At the same time, it celebrates its 50th anniversary. What began in 1974 wit...
“For a couple of bucks, I know where everything is. I can't speak glowingly enough about how well this works for us. We are in the middle of nowhere; there's no Wi-Fi connectivity here, and it (RFID) still works,” said Tom Hebert, Founder and Director of Earth Sciences Foundation. Leveraging technology from HID’s RFID tags, InfraMarker's RFID system and Esri’s field mapping software, Herbert and Earth Sciences Foundation, a fossil excavation non-profit, are excavat...
Infosecurity Europe, the most influential information security event running at ExCeL London from 4-6 June 2024, announced Mindgard, a start-up specialising in cyber security for AI, as the winner of the UK’s Most Innovative Cyber SME 2024 contest. The annual competition saw Nipun Gupta, Head of Product and Stefan Trawicki, Founding Machine Learning Engineer, Mindgard, presented with the award live at the event on the Innovation Stage on Wednesday 5th June in the Cyber Innovation Zone. Pa...
OPTEX, the pioneering global sensor manufacturer, will be showcasing its latest solutions in advanced intrusion detection technology for the African market at Securex South Africa 2024. For commercial and residential sites, OPTEX’s range of external and internal sensor range will feature on the stand. The new indoor sensor FlipX features a pyroelectric sensor that adapts to the human shape to provide highly accurate detection performance. Thanks to its innovative lens that can r...
G2E Asia and the Asian IR Expo – the key marketplace for the gaming, entertainment and integrated resorts sectors – hosted at The Venetian Macao, officially open their doors, expecting to welcome more than 8,000 industry professionals from 80 countries and regions. The joint event commences with a keynote address by Bill Miller, President and CEO of the American Gaming Association, followed by an opening ceremony featuring prominent industry pioneers. The day will also include a G2E...
News
Whether it’s the optimal use of drones, the latest developments in cybersecurity, or innovative ideas for protecting financial institutions: Security Essen's supporting programme offers valuable knowledge, concrete strategies, and actionable recommendations for current challenges. The leading security trade fair, featuring around 500 exhibitors, will take place at Messe Essen from September 17 to 20. Throughout the event, industry professionals can network with top security experts in lectures, conferences, and live demonstrations, gaining a crucial informational edge in an ever-evolving world. Innovation platform for knowledge Julia Jacob, Project Manager of Security Essen, reveals, “The supporting programme of Security Essen 2024 is our innovation platform for knowledge transfer in the security industry. Here, professionals as well as visionaries come together to experience and shape the future of the industry.“ Most events are intentionally held directly in the exhibition halls, providing participants with short distances and direct contact opportunities. Focus on Cybersecurity: DNS Conference Intelligence and crime analyst Mark T. Hoffmann will offer insights into the psychology of cybercrime The DNS Digital Networking Security Conference opens the supporting programme, addressing urgent issues of digital security. On September 17 and 18, discussions will cover recent incidents, critical interfaces between corporate and IT security, legal requirements, and practical implementation examples. Intelligence and crime analyst Mark T. Hoffmann will offer insights into the psychology of cybercrime in his lecture “Profiling Hackers“. Additional speakers will explore penetration tests, the use of AI, live hacking, and protecting Microsoft 365 environments. Participation in the event in Hall 7 is free of charge. Training and education day Fostering young talent in the security industry is the focus on September 17. The Training and Education Day, organised by the Federal Association of the Security Industry (BDSW) in cooperation with Messe Essen, targets young talents, apprentices, and career starters. They will learn how virtual reality can be utilised in security training. Additionally, the DSW will honor the best apprentices. Enhanced security for financial institutions Manufacturers will also discuss new protections against explosives, high-security rapid roll-up doors Spectacular explosive attacks on financial institutions have made headlines in the past. On September 19, Banks and Savings Banks Day showcases how these institutions can enhance their security. Thomas Stieff from the Federal Criminal Police Office presents the German initiative to reduce attacks on ATMs. Manufacturers will also discuss new protections against explosives, high-security rapid roll-up doors, and the application of AI in the banking sector. Organised by the International Physical Security Industry Association ESSA, Banks and Savings Banks Day takes place in Hall 6 and is free for trade fair visitors. First European Drone Conference The first European Drone Conference, occurring on September 19 and 20, highlights the diverse applications of drones in the security industry. This symposium, organised by BDSW, the Confederation of European Security Services CoESS, and Messe Essen, aims to foster interdisciplinary networking among all stakeholders. Topics will range from the use of drone technology in Germany and drone deployment conditions for authorities and organisations with security tasks to the training of drone pilots, the protection of critical infrastructure, and drone management or drone defence. Trade fair visitors can also participate in the symposium in Hall 7 free of charge.
Innodisk, a pioneering global AI solution provider, is showcasing its comprehensive new products at Computex 2024 with a focus on edge AI. Key highlights include the industry's pioneering CXL 2.0 memory expansion, E3.S SSD, and innovative MIPI over Type-C camera technology for machine vision. Live demonstrations of smart manufacturing PPE recognition and intelligent people tracking will emphasise Innodisk’s custom edge AI capabilities. This event also unveils Innodisk’s new brand vision, "Architect Intelligence," bringing out its commitment to building intelligent solutions with global partners. JEDEC's advanced standards Reliable and high-performance memory and storage are essential for AI and edge computing, particularly as edge servers evolve and demand high data throughput and resilience in extreme environments. This year at Computex, Innodisk will unveil the industry's first industrial-grade CXL 2.0 memory expansion for high scalability. Innodisk will unveil the industry's industrial-grade CXL 2.0 memory growth for high scalability Additionally, Innodisk is staying ahead of the curve by launching DDR5 LPCAMM2 and DDR5-8800 MRDIMM memory, both adhering to JEDEC's advanced standards. The showcase will further feature the award-winning E1.S Gen4 SSD series alongside wide-temperature SSDs tailored for edge servers, such as the E1.S/E3.S, available in various form factors. The range also includes 16TB high-capacity SSDs designed to meet evolving storage needs. Advancing edge AI applications Further, Innodisk’s recent focus on embedded camera modules for AI machine vision development is also crucial for advancing edge AI applications. Debuting at Computex, the innovative "MIPI over Type-C" camera technology converts signal through exclusive adapter board design and enhances platform compatibility, significantly extending the length of MIPI camera cables. This unlocks applications in areas such as autonomous mobile robots (AMR) and shared mobility. Innodisk will also display a full range of camera module products for USB and MIPI interfaces. AI in action: Smart cities and industrial applications Innodisk’s PPE award solution uses an FPGA forum to process real-time images from four cameras Beyond industrial modules, Innodisk integrates AI computing technologies with software, hardware, and third-party technologies to create various edge AI solutions. At Computex, Innodisk will introduce "InnoTracking," a smart people-tracking solution capable of accurately identifying and tracking specific individuals across multiple cameras and timeframes, enhancing public safety in cities, financial institutions, entertainment venues, and retail spaces. Under the simultaneous trends of ESG and industrial automation, worker safety in hazardous environments becomes a crucial focus for enterprises. Innodisk’s PPE recognition solution uses an FPGA platform to process real-time images from four cameras simultaneously, ensuring workers maintain adherence to safety protocols. Addresses ESG requirements Innodisk also teams with Network Optix, a premier enterprise video platform provider for security In case of violations, the system promptly notifies supervisors with detailed information to initiate appropriate responses. Moreover, Innodisk also collaborates with Network Optix, a premier enterprise video platform provider for security, transportation, and a wide variety of smart space solutions, to enrich user experiences of this solution. The "iCAP Air" air quality management solution addresses ESG requirements by combining patented air quality detection technology with sensors, edge servers, cloud management interfaces, and IoT ventilation controllers. This solution is suitable for smart factories and healthcare facilities, enabling real-time intelligent decision-making. "Architect intelligence"–Innodisk’s brand strategy for the AI era With nearly two decades in the industry, Innodisk has elevated its brand and become a global pioneer in product technology. The new "Architect Intelligence" concept aligns with Innodisk’s edge AI strategy, emphasising the practical implementation of AI at the industrial edge. Under this concept, Innodisk integrates various product lines into nine intelligent series, each represented by diverse colours, symbolising the limitless potential of AI applications and Innodisk's innovative spirit. Furthermore, these coloured blocks represent the flexibility of solutions and collaborative effort to architect AI solutions with customers. See the future of edge AI in actions! Visit Innodisk at Booth J0110, Hall 1, 1F, Nangang Exhibition Centre from June 4th to 7th to explore more.
Airport Show is all set for a smooth take-off for its 23rd edition on May 14 at the Dubai World Trade Centre (DWTC) with key stakeholders utilising the annual exhibition dedicated to the Middle East, Africa, and South Asia (MEASA) to explore and embrace new technologies and innovative products to handle the fast rebounding air passengers and cargo traffic. Airport passenger expectations The participants will also have their focus and attention on products and services designed to transform passenger expectations at airports, ease of flying, and enhance safety and security. The trademark annual B2B platform will bring to the Middle East’s vibrant aviation market four co-located events - Air Traffic Control Forum, Airport Security Middle East, the Global Airport Leaders Forum (GALF), and the Women in Aviation (WIA) Middle East Chapter Conference. Three-day trade-only exhibition The exhibition will provide opportunities to explore, experience, and source several advanced airport technologies The three-day trade-only exhibition will provide opportunities to explore, experience, and source several advanced airport technologies, innovations, and solutions along with networking with business pioneers and market movers. Organised by RX, the London-based company that hosts over 400 events in 22 countries across 42 industry sectors, the much-look-forward-to business platform will see over 6,000 decision-makers and professionals making their way to the three massive exhibition halls at a time when airports across the world are packed to their capacities. International passenger traffic The ever-surging passenger movement has prompted the Airports Council International (ACI), the trade association whose members operate 1925 airports in 171 countries including the DXB, the world’s top airport for international passengers, to claim that 2024 will be “a milestone for global passenger traffic recovery as it reaches 9.4 billion passengers, surpassing the all-time high 9.2 billion passengers handled in 2019. International passenger traffic is forecasted to grow to 4.4 billion international passengers in 2026. Aircraft movements are forecast to grow to 111.6 million by 2026. Airports worldwide will see 153.8 million aircraft movements by 2041. Business Connect Programme More than 150 exhibitors from over 20 countries will participate in the exhibition which will feature four country pavilions and over 120 buyers from more than 35 countries. The trade gathering will host 3,500-plus meetings under its popular Business Connect Programme. Attendees in participation Siemens, Honeywell, TLD, Aviramp GSE, ITW GSE, ADB Safegate, and Airport Labs are among the exhibitors Global companies like Smiths Detection, emaratech, Siemens, Honeywell, TLD, Aviramp GSE, ITW GSE, ADB Safegate, and Airport Labs are among the exhibitors. Among the key airport project pioneers participating include Air India SATS Airport Services, Airports of Thailand, Angkasa Pura Airports of Indonesia, Armenia International Airports, Singapore’s BOC Aviation, CAAB of Botswana, Egyptian Airports Company (EAC), Erbil International Airport, Hong Kong International Airport, Mactan- Cebu International Airport Authority, New Delhi Airport, Ntech Aviation of South Africa, Pakistan Civil Aviation Authority, Uganda Civil Aviation Authority, and Yerevan Zvartnots International Airport of Armenia. In-event networking and knowledge enhancement Innovation Trail, GSE Zone, Innovation Hub, and Youth in Aviation will provide in-event networking and knowledge enhancement opportunities. The four co-located events will see 60-plus speakers speaking on diverse topics, including Sustainability at Airports, Passenger Experience, Ground Handling, Airport Security, and Air Traffic Management (ATM). Being held under the patronage of His Highness Sheikh Ahmed bin Saeed Al Maktoum, President of the Dubai Civil Aviation Authority, Chairman of Dubai Airports, Chairman and Chief Executive of Emirates Airline and Group, it is being supported by the Dubai Civil Aviation Authority (DCAA), Dubai Airports, Dubai Aviation Engineering Projects (DAEP), Emirates Airline and Group, Dubai Air Navigation Services (dans) and dnata, one of the world's largest air services providers with services across five continents. DXB expansion The show is taking off as one of the three biggest airports in the world unveiled its ambitious expansion plans. In a fast-forward mode to handle zooming passenger numbers, the expansion of Dubai International Airport (DXB), the world’s busiest airport for international passengers for 10 consecutive years with 87 million passengers in 2023, will require US$2. 7 billion. That will make it stand out among the Middle East airports that will be handling 1.1 billion passengers by 2040. Sheikh Ahmed asserted that Dubai will undoubtedly become ‘The World’s Airport’ and the city will be an expanded global hub for an impressive number of industries including aviation, tourism, technology, and education. Dubai's airport terminal plans The US$35 billion Al Maktoum International Airport is envisaged to have a capacity for 260 million passengers In April-end, Dubai unveiled plans for the construction of the world’s largest airport terminal. The US$35 billion Al Maktoum International Airport is envisaged to have a capacity for 260 million passengers upon completion, five times the size of the current DXB. All operations at DXB will be transferred to the massive facility over the coming years. Once completed, Al Maktoum, which opened in 2010, will be the new home for Emirates Airlines with the airport boasting five parallel runways and 400 aircraft gates. Technology and innovative systems The participation in the Airport Show will provide excellent opportunities for airport security whose global market size will reach US$26 billion by 2030, according to Spherical Insights & Consulting. The participants will be updating their knowledge about technologies that facilitate smooth passenger screening facilitation, checkpoints, and baggage surveillance. Airports have been focusing on acquiring technology and innovative systems that keep glitches and shortcomings at a distance. Their search will also be ways for handling cybercrimes and explosive devices, filling up the gaps, and improving the systems and procedures. IATA-led workshop May Ismail, Event Manager at RX, said, “Along with concentrating on the picked-up pace of passenger and cargo business, the airport industry is focused on massive expansions and phenomenal improvements to be at the cutting edge of the game in the coming decades." "Their search for everything they want stops at the Airport Show. This year, we will have 20+ first-time exhibitors. We will be hosting for the first time an IATA-led workshop as a by-invitation event." Sustainability and Innovation It had been predicted that processes within airports will be fully autonomous by 2050 along with zero-queue terminals Organisers have appropriately chosen this edition’s theme - Sustainability and Innovation – as the industry players' focus has shifted to embracing cutting-edge technology and greener initiatives to drive growth and efficiency while grappling with the complexities of rising passenger volumes, changing governmental regulations changing assessment of potential risks. This is much needed as global consultancy Oliver Wyman predicted more than 19 billion passengers will pass through world airports each year by 2040, and the global commercial aircraft fleet be over 36,000 aircraft seven years earlier. It had been predicted that processes within airports will be fully autonomous by 2050 along with zero-queue terminals. Several companies have expressed their views about their association with the Airport Show. Enhancing efficiency and safety Jaffar Dawood, Senior Vice President, of Airport Operations UAE, and MEA, dnata, said, “We’re pleased to showcase our offering at the Dubai Airport Show during a time of remarkable growth throughout the region." "Our advanced equipment on display demonstrates our commitment to continually investing in our operations to enhance efficiency, safety, and sustainability. We look forward to meeting with our partners and fostering connections at this prestigious industry event.” Alternative fuel solutions B. Tarik Özeler, Export Sales Manager at BMC said, “As the sole manufacturer of Apron Buses in Turkey, we are actively enhancing our product range with various alternative fuel solutions and are in talks with pioneering ground handling service companies across Turkey, Europe, the Middle East, and Africa to expand our offerings." "To boost production and enhance the Apron Bus range, we are engaging with pioneering engineering firms in Europe and manufacturers in the Far East for joint venture collaborations.” Streamlining operations Tamer Samy, Sales Director for Middle East at ADB SAFEGATE said, “Technology and innovation have played crucial roles in transforming airports across the Middle East and South Asia into smart hubs." "These advancements have streamlined operations, enhanced passenger experiences, and improved overall efficiency." Airside 4.0 solutions "Our company is a pioneer in driving airports towards smarter functionalities with comprehensive solutions including airfield lighting, power systems, airport, and tower software, docking automation, apron management systems, and aftermarket services." "Our Airside 4.0 solutions not only enhance operational efficiency and safety standards but also elevate the passenger experience. The Airport Show is a pivotal platform for us to showcase our latest products and connect with industry pioneers, airport operators, and stakeholders.” Flexible digital solutions Bruce Bowman, Strategic Advisor & Project Director at Cairn Consulting, the Aviation Consultancy Partner, said, “A primary challenge for airports is the strict regulatory and infrastructural environments that often delay the adoption of new technologies, preventing them from aligning with the rapid innovations seen in domestic digital commerce." "At Cairn Consulting, we are committed to navigating these challenges, advocating for regulatory reforms while pioneering flexible digital solutions that enhance both efficiency and the consumer journey, ultimately aligning airport experiences more closely with cutting-edge consumer market trends." AR, VR, and LLM applications "We are exploring futuristic applications of AR, VR, and Large Language Models (LLM) to enhance passenger interaction with airport services, foreseeing a future where these technologies make airport stays more enjoyable and interactive, thus redefining what airports can offer beyond the traditional." "As airports refresh, renew, or build new infrastructure, incorporating these technologies from the ground up, will be crucial to creating spaces that are truly futuristic and responsive to the next generation of traveler needs.”
The GSMA, a global organisation that conducts the world's largest exhibition and conference for the mobile ecosystem across different continents — the annual Mobile World Congress (MWC) — has selected Regula as an identity verification provider for its event in Barcelona. In 2024 alone, the company’s solutions provided smooth and quick access for more than 100,000 attendees of the congress. MWC attracts tens of thousands of visitors, including representatives of mobile operators, device manufacturers, technology providers, vendors, and content owners. To ensure everyone's safety, the GSMA has traditionally conducted thorough registration and ID validation processes for each attendee. Efficiency of the registration process For many years, the ID validation process was done on-site at the venue, which caused queues and long wait times. With the advent of the pandemic in 2020, and attendance now regularly exceeding 100,000, the GSMA had to find a contactless solution to remove the need to have attendees wait in large numbers to collect badges and have their ID validated. The ID validation process was done on-site at the venue, which caused queues and long wait times To address these issues and improve the efficiency of the registration process, the GSMA decided to make it totally remote and digital, so that all attendees could swiftly get access to the venue through the entry gates. Any solution would also need to enable quick and efficient international document recognition, because attendees come from all over the world. Single-vendor solution by Regula To achieve their goal, the GSMA ran an extensive competitive tender process to find the best technology solution. Ultimately, they chose a complete, single-vendor solution by Regula which includes Regula Document Reader SDK and Regula Face SDK. Natively integrated, these solutions facilitate a smooth customer journey and rapid onboarding through seamless and secure identity verification, eliminating the possibility of fraud. This long-term coalition led to a significant enhancement of the visitor roll process Having successfully piloted Regula products during MWC Barcelona 2021, the GSMA fully transitioned to digital visitor registration and ID validation. After several years of collaboration, this long-term partnership led to a significant enhancement of the visitor registration process, enabling a fast and convenient user experience. Now, Regula Document Reader SDK and Regula Face SDK are easily integrated into the MWC’s existing registration platform for full-fledged production use. Regula Document Reader SDK Now, as part of the registration process, an MWC visitor simply uploads their ID on the official website. The identity document is automatically scanned by Regula Document Reader SDK. The solution instantly recognises the document type, reads its data, and verifies its authenticity with multiple cross-checks. Not only does it streamline the verification process (checks are completed in seconds), but it also minimises the chance of missing compromised IDs. Further, an MWC attendee has the opportunity to provide their selfie, which is rapidly captured by Regula Face SDK for user verification. Regula’s complete IDV solution GSMA managed to create a custom, smooth, and seamless roll experience for all MWC attendees With the industry’s largest and most comprehensive identity document template database, which contains over 13,600 templates from 249 countries and territories, Regula supports the verification of nearly any identity document from any part of the world. Taking into account MWC attendees’ geographical spread, this ability significantly facilitates the registration process. With Regula’s complete IDV solution, the GSMA managed to create a custom, smooth, and seamless registration experience for all MWC attendees. During the Barcelona event in 2024, Regula Solutions helped to efficiently validate more than 100,000 visitors – all of them registered online beforehand, so there was no need to queue at the venue. Advanced ID verification technologies "Our collaboration with GSMA for MWC highlights the power of digital transformation in handling large-scale international events. By integrating our advanced ID verification technologies, not only did we enhance the security and efficiency of the registration process, but also ensured a seamless experience for attendees," says Ihar Kliashchou, Chief Technology Officer at Regula. “The digital identity verification process has revolutionised the visitor experience, allowing more than 100,000 individuals to register and access the world’s pioneering connectivity event swiftly, safely, and without interruption," states Xavi Casals, Director of Technology, Innovation & Customer Experience at GSMA.
DeterTech, renowned as the pioneering gold standard for temporary site security, is pleased to announce it will be bringing its full portfolio of site security, crime intelligence and forensic marking solutions to the Welsh Construction Shows. Having just opened its new Welsh office, DeterTech invites visitors to the Cardiff City Stadium on the 15th of May and the Swansea.com Stadium on the 9th of October to get up close and personal with the ultimate intruder deterrence and detection technology. Comprehensive portfolio of solutions The Welsh Construction Shows are Wales’ largest trade exhibition, providing a platform for the building and construction industry to network, view live demonstrations and discover the latest innovations to optimise their operations. On the DeterTech stand, attendees can familiarise themselves with a comprehensive portfolio of solutions designed to predict, deter and detect theft, trespass and vandalism from construction sites. Attendees can familiarise themselves with a broad portfolio of keys designed to predict Taking pride of place on the DeterTech stand is the PID 360, a wireless, armoured, and rapidly deployable unit that is proven to reduce unauthorised site access and the project delays associated with the theft of stock and equipment and the additional costs of replacement. Connected to DeterTech’s state-of-the-art Alarm Receiving Centre, it ensures every activation is monitored and reviewed by qualified operators and escalated, where appropriate, in an average of just 47 seconds. SmartWater forensic marking solutions Visitors to the stand can also learn more about DeterTech’s crime intelligence services for police and industry, as well as the full range of SmartWater forensic marking solutions. SmartWater is feared by the criminal fraternity thanks to its status as a tried and tested component of crime prevention strategies that has been proven in domestic and commercial environments for over 20 years. SmartWater is a unique substance that is invisible to the naked eye but that glows yellow-green SmartWater is a unique substance that is invisible to the naked eye but that glows yellow-green when exposed to UV light. It is the only forensic marking technology that retains a 100% conviction rate in contested court cases, with scientists only requiring a trace of SmartWater the size of a full stop to irrefutably link people or property back to the scene of the crime. It is guaranteed to last for a minimum of five years in all weathers, even withstanding explosive blasts and harsh solvents, ensuring criminals can be convicted and recovered goods can be returned to their rightful owners. Deterrent and detection solution By combining SmartWater and PID360 DeterTech can offer a complete deterrent and detection solution supported by trained and experienced staff to reduce the risk of unwanted intrusion and theft on any construction site. Adam Birkitt, Head of Sales, South at DeterTech UK, says, “Wales is a hive of construction activity and we’re not going to let criminals take advantage of that. I’m looking forward to another great year at the Welsh Construction Show and the opportunity it presents us to connect with new and existing industry connections.”
G2E Asia, the pioneering gaming and entertainment marketplace in Asia, proudly announces its return to Macau on June 4-6, 2024, marking its 15th anniversary milestone. In collaboration with the Asian IR Expo, this year’s event is set to deliver an enhanced experience in all aspects of the expo, with 360-degree opportunities across the gaming, entertainment, and integrated resort industries. Aligned with the industry’s growing focus on technology, G2E Asia’s 15th edition will unveil a dedicated Technology Zone and Tech Talk Stage within the exhibition hall. This specialised area will spotlight the latest industry innovations and feature insightful presentations on identity management, security, hospitality, and customer relationship management. G2E Asia and Asian IR Expo Combined G2E Asia and Asian IR Expo will showcase more than 100 industry-pioneering exhibitors The combined G2E Asia and Asian IR Expo will showcase more than 100 industry-pioneering exhibitors across 20,000 square metres of floor space. Prioritising both quantity and quantity of exhibitors, both events remain committed to their primary goal of serving as a key marketplace for the industry and delivering value and opportunities for all stakeholders. The G2E Asia Conference consists of three content-rich days of sessions led by industry pioneers, influencers, and experts. Highlights include: An in-depth look at the financial outlook for Asian gaming markets. Two panels dedicated to emerging markets as well as a spotlight on Thailand and the Middle East. An insightful panel discussion on smart table innovations. Technology experts discussing AI and Cybersecurity. The IAGA Best Practices Institute, will examine compliance and regulation challenges in Asia, data protection measures, and the latest advancements in combating financial crime. Enriched networking events Featured speakers include Praveen Choudhary, Managing Director, Morgan Stanley Asia Limited; Angela HanLee, APAC Gaming & Leisure Senior Analyst, Bloomberg Intelligence; Evan Spytma, CEO, Hotel Stotsenberg; Ioannis Kontoulas, Board Member, Hellenic Gaming Commission; Angus Chan, Associate Director of Research, UBS AG; Daniel Li, Advisor, Cambodia Commercial Gambling Management Commission; Udorn Olsson, Chairman, Phoenix Aviation (Thailand) Co Ltd; Kelly Gass, President, San Marco Capital Partners LLC; Fredric E. Gushin, Managing Director, Spectrum Gaming Group; Rick McDonald, General Manager Table Games Strategy, The Star Entertainment Group and Kok Tin Gan, Partner, PricewaterhouseCoopers Ltd. The enriched networking events include the President's Reception, the 15th Anniversary Reception, and a conference luncheon that will offer abundant networking opportunities to connect with like-minded professionals from diverse backgrounds.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand car salesperson or estate agent of the popular imagination. Management of added services Yet we buy from retailers and marketplaces every day without complaint. As long as we see a middleman as providing value and convenience rather than getting in the way, they’re safe. This does mean, however, that resellers and integrators need to carefully manage how they are perceived and how much their added services are valued by their customers. The risk to security integrators Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies Businesses have often relied on security integrators to break down silos between security systems to strengthen both physical and cybersecurity postures. Typically, these have been seen as separate, but the increase in remote working and the adoption of cloud-based physical security has blurred the lines between the physical and the digital. Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies, rather than a siloed approach that will mean one is more secure than the other, and security integrators can help bridge this gap. Macroeconomic headwinds, digital transformation Security integrators have also proved invaluable in filling skill gaps within organisations. Not every business can be expected to have the staff and skills needed to successfully overcome integration challenges, they may have cybersecurity and physical security experts, but perhaps not both. And if they do have experts on staff, they may lack knowledge of the cutting-edge technologies that will protect their businesses best. This unique and esteemed role of security integrators is today at risk of disruption. Macroeconomic headwinds mean that businesses are scrutinising every budget line and asking if each is necessary. Digital transformation means they are questioning old ways of doing things are the providers they worked with five years ago, or longer, the same people who are going to give them the best value today? Research findings on current trends Unfortunately, many security integrators are not keeping up with change. Our research has found that only 26% of customers consider integrators up to date with the latest technologies. Businesses rely on these providers to navigate a new and confusing security landscape and only one in four say they are confident their partners have researched the road ahead. In the past, providers may have relied on having better knowledge than their customers. But 73% of security solutions buyers are doing their research on vendors and technology. Integrators risk being underprepared to serve a market that is more and more educated in the products they are providing a dangerous situation for any middleman. Finding the gap Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? The research suggests a shrinking gap for security integrators. Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? However, the problem may not be as dire as the research first suggests as long as integrators act to address the risks they face. Education Businesses are educating themselves about the market. They want to know what is available to stay safe, both in a physical environment and from online threats. This is understandable given how the news cycle, both of these spaces have seen an increase in potential threats, and the cost of cleaning up after a ransomware or similar attack has spiralled. Any sensible business will review what they have in place and their future options. Advance industry knowledge It has never been more important for the integrator community to advance their industry knowledge. They truly are the experts, and have an in-depth understanding of the latest trends, the advancement in cloud security, and the shifting demands of users. They also need to provide better service and consultancy. As the security world gets smarter and more cloud-based, security integrators who are well-informed and educated will have a clear advantage in the market. After all, most businesses don’t want to spend time researching and upskilling in areas where they can effectively outsource. Security integrators must be able to reassure their customers that they are up to the task. Bring on added value But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value The problem may be perceptions rather than the actual value that integrators can offer. If integrators are more informed than their customers realise, they need to do more to let their customers know. This could be down to being too reactive i.e., not anticipating customer needs and simply waiting for them to ask for particular services or products or not demonstrating knowledge as part of regular customer service. There is still very much of a gap for security integrators in today’s market. They can survive in this gap. But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value, more than a middleman, but a provider that can advise on the right products to meet specific needs and make those products work for their customers in an integrated way. Reinventing via consultancy They need to provide consultancy so their customers understand how best to ensure online and physical security work together to keep a business safe. Most of all, they need to demonstrate their knowledge to their customers and make sure they understand the value they bring. Businesses won’t be safer by relying on their research and knowledge to buy and install security products, but if they don’t understand the benefits of a specialist integrator, they may choose this route. It’s up to security integrators to reinvent themselves as the better kind of middleman if they want to remain relevant.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
IFSEC International took place over three days at the ExCel in London, presented alongside shows covering fire safety, intelligent buildings, facilities management, and safety and health. While perhaps not on the same scale as pre-pandemic events, the atmosphere was convivial and spirits high, everyone glad to be back amongst their peers in the industry. Predictably, the trending topics were steered by issues in the wider world: sustainability, moving services to a subscription-based model, and new ways of working inspired by COVID-19 safety measures. A place for cutting-edge innovation After a challenging couple of years, companies were keen to meet customers, showcase their products and reveal the latest innovations. Integrated Design Limited displayed their new Glassgate 400 Plus turnstile, a sleek design for the corporate market. Tony Smith, Major Accounts and Marketing Manager, Entrance Control and Turnstile Security, told SourceSecurity.com, “I feel trade shows are a very important part of IDL’s marketing effort. We are more than pleased to display alongside our peers and have customers make direct comparisons with our products and theirs.” Biometric access reader Biometrics, as ever, generated a lot of interest, including the European launch of RealNetworks’ new SAFR SCAN biometric access reader, which combines facial recognition, computer vision, and image capture technologies for a range of applications. “Overall, there was a really good footfall, and we met an excellent mixture of end-customers, system integrators, distributors, and consultants from both Europe and the Middle East who are exactly the types of people we were hoping to demonstrate SAFR SCAN to,” commented Charlie Bennett, Vice President UK & Europe – SAFR, RealNetworks. Access control systems going green HID Global is one company leading the way in the move away from plastics to focus on mobile access The eco-friendly trend and the need to be more sustainable is becoming a real force in the security industry, particularly in access control where there is considerable pressure to ditch the plastic. HID Global is one company leading the way in the move away from plastics to focus on mobile access. Gerald Grattoni, Physical Access Control Solutions Regional Business Unit Vice President at HID Global (part of the ASSA ABLOY Group), explained in a press briefing, “Making buildings smarter and more eco-conscious is high on the corporate responsibility agenda of many companies as the sustainability credentials of new buildings are now very important. With digitalised mobile identities there is less plastic waste and lower emissions.” Flexible, remote, and contactless Innovation in smart buildings is also being led by changes to how we work, live, and play, inspired in part by the recent pandemic. New technology is required to meet the needs of the hybrid workspace, as employers adopt more flexible working models and demand for contactless access control increases. Now, the most technologically sophisticated buildings are controlled by an app on a mobile phone, giving ease of access and full control without the need for plastic cards. Remote monitoring Advances in remote monitoring have escalated due to COVID-19, particularly in high demand in the health and education markets. Connecting via industrial standard network protocols allows for remote communication Ian Bridgewater, Director, Technical Sales Manager, TOA Corporation (UK) Ltd, explained further, “Connecting via industrial standard network protocols allows for remote communication. Working with specialist software developers has expanded this, giving greater flexibility to monitor and maintain systems remotely from a central hub.” AI-based autonomous access solution AI also has a role to play in this new high-tech, touchless world and various companies are utilising this technology. Alcatraz AI found IFSEC the perfect opportunity to exhibit their new Rock autonomous access solution. "We now live in a time in which AI can make precise real-time decisions at the door to authenticate or deny access using your face as a credential,” said Greg Sarrail, Senior Vice President of Sales at Alcatraz AI. “IFSEC 2022 allowed Alcatraz AI to demonstrate the speed and accuracy of autonomous access control. The number of qualified partners and end-users representing a broad international scope in attendance at IFSEC was encouraging.” Meanwhile, the Eagle Eye Networks stand attracted a lot of visitors keen for a demo of their new Eagle Eye Smart Video Search, which allows users to search for people, vehicles, or objects, and immediately find the exact video across all cameras in all sites. "AI and cloud are two trends that Eagle Eye, the media, and the security business community have been talking about for a while. We were excited to showcase Eagle Eye's new AI-powered technologies at IFSEC 2022," added Rishi Lodhia, Eagle Eye Networks Vice President and Manager Director EMEA. "Our stand was buzzing with activity and AI was the main topic of discussion for all three days. All in all, a great show." Investing in a secure future Engineers of Tomorrow gave apprentice finalists the chance to show off their skills in front of thousands of peers and professionals from the security sectors live on the show floor. The winners will go on to the WorldSkills UK (WSUK) LIVE competition – the nation’s premier skills, apprenticeships, and careers event. Although the products on display at IFSEC promised a contactless, digital future, this was a good reminder of the importance of the people who install and maintain these systems and the vital role of engineering apprenticeships in the industry.
Case studies
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can programme keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the Yorkdale Shopping Centre in Toronto, Canada, has unified its security operations based on Genetec™ Security Centre, Sipelia™, AutoVu™, and Mission Control™. With the Genetec platform, the security team at Yorkdale has been able to enhance operational efficiency, better collaborate with local police, and take a more proactive security stance. Yorkdale Shopping Centre With over two million square feet of retail space and 270 stores, Yorkdale Shopping Centre offers the country’s largest collection of designer labels and luxury brands. Managed by Oxford Properties Group, it goes beyond shopping, offering visitors valet services, a museum-quality art collection, and 24/7 on-site security. Breaking out of proprietary system limitations Additionally, having a closed security solution held them back from exploring new technologies With their proprietary video system and standalone access control solution, searching for information required the security operations team to navigate between the two systems, which slowed investigations and incident response. Additionally, having a closed security solution held them back from exploring new technologies such as cutting-edge cameras or system integrations. Genetec™ Security Centre and Omnicast™ The search for a new video management system (VMS) led them to Genetec™ Security Centre and Omnicast™, which not only provided state-of-the-art video management, but unified video, access control, and data from other sensors into one system. The Genetec solutions enhanced the team's ability to manage security policies, monitor events, and run investigations. Since it is an open platform, Yorkdale can expand the system with new technology as it emerges. A comprehensive view of mall security With Security Centre, we’re shaving valuable time from investigations and response" Since implementing the Security Centre, the Yorkdale team has been able to significantly enhance operational efficiencies. If an incident is underway, operators can see what’s happening and act fast from one unified view. “With Security Centre, we’re shaving valuable time from investigations and response," said Luca Aiello, Security Manager at Oxford Properties. Enhanced guest experience “Our security operators can identify potential risks, retrieve critical information, and deploy on-foot officers faster within the shopping centre." "Overall, we’ve become far more proactive and efficient in handling anything that comes up. That ensures we keep providing an exceptional guest experience.” Sipelia™ intercom module Sipelia allows them to initiate two-way conversations across 150 intercom stations Operators manage over 750 cameras, 500 access control readers, and 2000 cardholders using the Security Centre. They’ve also deployed the Sipelia™ intercom module. Sipelia allows them to initiate two-way conversations across 150 intercom stations located in parking garages, entrances, and other areas. AutoVu™ ALPR system The team also added the AutoVu™ automatic license plate recognition (ALPR) system, the Genetec Mission Control™ decision management system, and other technologies within the platform. All video, data, and calls come back into a state-of-the-art command centre, where security operators keep the shopping centre running smoothly. Security managers can also use the Genetec Mobile app on their phones to check in on situations from anywhere in the mall. Operational efficiencies, enhancing public safety To streamline incident response, the Yorkdale team implemented Genetec Mission Control™ Ensuring security operators can quickly respond and resolve the issues is critical to maintaining a five-star shopping experience. To empower their operators and streamline incident response, the Yorkdale team implemented Genetec Mission Control™. The collaborative decision management system helps operators better understand unfolding events and guides them through the best course of action according to SOPs. Proactive security approach Genetec AutoVu™ has been a key component in fostering a proactive security approach. With 52 AutoVu automatic license plate recognition (ALPR) cameras deployed, they’ve been able to extend security to their property’s perimeter, enhance vehicle-related investigations, and help serve the community. For example, if local police are searching for a vehicle of interest, Yorkdale can put that vehicle information into their AutoVu system, and if the vehicle comes onto their property, police are notified. Responsive to theft-related incidents As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent. Said Bob Vounotripidis, Senior Operations Manager at Yorkdale Shopping Centre, “Since implementing the AutoVu ALPR system, we’ve become significantly more responsive to theft-related incidents and investigations. Word has gotten out–Yorkdale is a property that takes security seriously, and the perpetrators will be caught.” Planning for future expansions The Yorkdale team is looking ahead to other technologies that can expand their security approach and system, such as deploying body-wearable technology and integrating video from those devices into the unified platform. They are also exploring using Genetec Clearance™ digital evidence management system to streamline evidence sharing with law enforcement. Said Aiello, “More shopping centres should be using Genetec Security centre. This security platform not only helps our team operate more efficiently, but we’re also evolving our deployment using the best technologies out there.”
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep track of who had the keys. The choice It’s very easy to manage and we can focus our time on providing quality care to our patients" “The Brivo system makes my job easier and frees me up for other things. With Brivo, it’s easy to find out what we need; the system doesn’t lie," Larry Kadin, Facilities and Purchasing Manager, Adelante Healthcare. "It’s very easy to manage and we can focus our time on providing quality care to our patients.” The change Adelante has issued access cards to over 200 staff and the cleaning crews at their seven facilities. Without lots of keys floating around, the healthcare provider no longer has security breaches. One person is administering multiple sites from a single web interface. Access can be programmed easily and quickly, it’s done remotely and in a manner of just minutes. The team has better records and easy access to data that can be provided to other departments. The new system has had significant positive effects on staff productivity and effectiveness. “I’ve not seen anything that comes close to what Brivo provides. The Brivo system is a joy to work with. It saves us so much time compared to other systems we were looking at, ” Larry Kadin.
Residents at Chapel View can receive and answer door entry requests via mobile while granting temporary access using QR codes, due to Comelit-PAC’s dedicated mobile app and use of the latest security technology. Chapel View Set in the quaint village of Gildersome in Leeds, Chapel View is an exclusive housing development, presenting seven residential homes in a discreet cul-de-sac, all secured with a communal gate. The community featured a legacy door entry system that required an upgrade to ensure the security of residents. Comelit-PAC worked with local installation specialists AC Secure from the initial design process, through the works programme to project completion. Door entry Each house has its licence and users can use the feature-rich Comelit app to control the gate Door entry, via Comelit-PAC’s VIP system, was specified, utilising its stylish Ultra door entry solution, to enable control of the gate to the housing estate. Each house has its licence and users can use the feature-rich Comelit app to control the gate while also creating QR codes to allow temporary access for visitors. Says David of the resident’s association of Chapel View, “With high expectations for our residents to deliver ultimate security, every element of the new door entry system also had to be considered from a convenience perspective, to enable them to answer door entry requests remotely, from their smartphone." Additional benefits “AC Secure worked with us right from the specification process and took the time to understand these requirements, before recommending Comelit-PAC as an ideal solution." "The additional benefits of utilising app technology to present door entry and QR codes for temporary access to visitors immediately appealed. And the system was installed with minimal disruption and a great benefit to our community." Smart home security systems Adam Cousens, Managing Director at AC Secure added, “Chapel View has the look and feel of a quaint village community where security and door entry is a high priority. All the smart home security systems had to be stylish and futureproof to suit the requirements of the community, whilst also ensuring ease of installation and simple use." “Comelit-PAC’s Ultra system with VIP technology, coordinating with its dedicated app was the natural choice for door entry." Ultra digital entrance panel The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app "Residents love the sleek design and the VIP technology is easy to use and allows them the convenience to receive calls and see visitors from anywhere. The combination has truly elevated the door entry experience.” The entrance to Chapel View has been enhanced with Comelit-PAC’s stylish, flush-mounted Ultra digital entrance panel. The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app. Mobile-first solution Stephen Wragg, Business Development Manager for Comelit-PAC concluded, "What our work with AC Secure at Chapel View demonstrates is how Comelit-PAC is ‘with you always.” There is no project too big or too small for us to work with our installers and partners to provide smart, yet stylish door entry solutions for residents to benefit from the latest in smart access control." "Ultra, together with VIP presents a powerful mobile-first solution that can ensure the ultimate security for this residential community.”
Amthal has installed a bespoke integrated system, designed to ensure the fire safety and security of staff, volunteers, and visitors at Youth Talk, a local youth counselling service. Youth Talk Based in St Albans, Youth Talk provides free confidential counselling services to young people aged 13 to 25 who live, work, or study in the local area. With over 3,500 counselling sessions taking place each year, the safety and security of its staff and clients are of paramount importance. Around-the-clock protection Amthal installed a security solution that included intruder alarms, fire safety measures, and access control To help Youth Talk meet its security and fire safety needs, Amthal designed and installed a comprehensive security solution that included intruder alarms, fire safety measures, and access control technologies. The system is designed to provide around-the-clock protection to the premises and ensure that any security breaches or incidents can be remotely detected and responded to accordingly. Safe, non-judgmental, and confidential space Says David Barker, CEO of Youth Talk, “Since 1997 thousands of young people have trusted us to provide a safe, non-judgmental, and confidential space to talk." He adds, "Demand for the service has never been greater and our recent move to new, larger premises is part of our five-year strategy for growth. Working with Amthal has been great and we are looking forward to a productive relationship going forwards." Safe and secure service They worked closely with us to design the system and ensure installation worked sensitively" David Barker continues, “They worked closely with us to design the system and ensure installation worked sensitively around our dedicated counselling services." He adds, "We now have peace of mind that our staff, volunteers, and those who attend our services are safe and secure and that our premises are protected around the clock.” Intruder alarm system The intruder alarm system is designed to detect any unauthorised access to the premises and instantly alert the monitoring centre, which can then notify the police if necessary. The system is also fully integrated with access control technologies, ensuring that only authorised personnel can enter the building at any time. Fire safety measures To further enhance safety, fire safety measures include smoke detectors, heat sensors, and emergency lighting, all of which are monitored 24/7. The system provides early detection of any fire risks and provides prompt alerts to the occupants, helping to minimise the risk of injury or damage. Installing an integrated security system We are confident that the new systems will provide long-term security for Youth Talk" Paul Rosenthal, Sales Director of Amthal, added, "We are proud to have partnered with Youth Talk to design and install an integrated security system that meets their unique and growing needs." He adds, "Our team of experts worked closely with the charity to ensure that the overall solution provides the necessary protection, while also being user-friendly and easy to operate. We are confident that the new systems will provide long-term security for Youth Talk and the young people it so closely supports." Advanced electronic fire and security solutions Independently owned, Amthal is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service, and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access, and CCTV systems. Amthal is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Bank security](https://www.sourcesecurity.com/img/emagazines/612/banking-security-magazine-technology-trends-international.jpg)
Bank security
Download