Network cameras
Matrix is thrilled to announce its presence at MahaSecure Tech Expo 2024, set for August 22nd-24th at Siddhi Banquets, Erandwane, Pune. As a pioneer in security and telecom solutions, Matrix will have the prime opportunity to showcase its state-of-the-art IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions at this prestigious event. Matrix is going to showcase its diversified security portfolio at MahaSecure Tech Expo 2024, especially conceptualised to cater to the div...
CyberSecurity Malaysia (CSM), the national cybersecurity specialist agency under the purview of Malaysia’s Ministry of Digital signed a Memorandum of Understanding (MoU) with Flexxon and AI MSP. Flexxon is a global pioneer of AI-powered hardware security solutions, and AI MSP is an IT and cybersecurity company that offers Flexxon’s X-PHY AI Cybersecurity Solutions and professional services in Malaysia. Digital transformation The MoU aims to establish a comprehensive framewor...
Kepler Vision Technologies continues to extend its reach across Europe by partnering with Norwegian company OneCo Technology. OneCo Technology is a pioneer in cutting-edge technology solutions, and Kepler Vision, a renowned healthcare service provider with a deep understanding of local requirements, has joined forces to create a synergy that promises to revolutionise the way healthcare is delivered and managed in Norway. AI and digital healthcare solutions The...
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometri...
Axis Communications celebrated the grand opening of its newest Axis Experience Centre (AEC) in Phoenix, AZ. Featuring an extensive variety of Axis surveillance solutions as well as meeting and demo spaces, the facility will allow Axis to build stronger bonds with partners and customers in the southwest, fostering collaborative growth and innovation to enable smarter and safer communities – both local and beyond. As Arizona’s capital, Phoenix is one of the fastest-growing cities in t...
Security pioneers are under increasing pressure to protect ever-more complex sites while proving the value and cost-effectiveness of their security systems. Now, multi-directional AI cameras are emerging as an effective solution for organisations in need of streamlined systems that provide comprehensive coverage and AI-driven insights. Multi-directional AI cameras combine multiple cameras into a single unit, giving the benefits of three, four and even five AI cameras — without the associ...
News
Matrix PRASAR UCS, an enterprise Unified Communication Server connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration. The PRASAR UCS, a pure IP PBX, proves to be a complete solution for inter-branch office collaboration and communications. Dispersed branches can be tied together over the IP network, with the IP PBX located at the Head office. It enables enterprises to enhance business processes by unifying communication mediums to simplify the daily workflow and increase their response time. Being a pure IP solution, the IP PBX, is scalable to up to 2100 users, as per the future communication needs of the organisation. Benefits of the pure IP PBX With the offering of Redundancy in PRASAR UCS, Matrix aims to address the large enterprise segment, needing a system with high availability and uptime. The customer-friendly licence structure, offering redundancy shall also benefit SMEs that aim to scale the number of users in the future. Matrix aims to address the large enterprise segment, needing a system with high availability and uptime The benefits of the pure IP PBX include enabling, effective Business Communication for making quick decisions and communication between the team members at headquarters, branch office, and on the move. Additionally, it aids in increasing productivity with instant communication anywhere, anytime along with increasing employee responsiveness toward customers by communicating over voice, video, and chat. Key features Up to 2100 IP Users Up to 550 Concurrent Calls 21 Three-party Conference 21 Concurrent Calls Tapping Other features Corporate Directory Integration Multi-lingual IVR Redundant Power Supply Port Auto-attendant
Blackline Safety Corp., a global pioneer in connected safety technology, has announced the launch of an international safety awards programme to recognise individuals and organisations who go above and beyond to keep their employees, communities, and the environment safe. Worker safety “Blackline’s No. 1 priority is ensuring that every worker returns home at the end of the day in the same form they arrived and that communities and the environment are protected from life-threatening situations,” said Christine Gillies, Chief Product & Marketing Officer of Blackline Safety, whose suite of safety devices are used by hundreds of fire and hazmat, oil and gas, petrochemical, food production, biotech, transportation, utilities, and water and wastewater organisations across North America, Europe, Middle East, Africa, Australia, and New Zealand. “Our goal is to recognise Blackline technology users who are aligned with our mission and have helped save lives by avoiding serious incidents or causalities in their pursuit of safety,” Gillies explained. Blackline Safety Impact Awards The Community Hero Award recognises an individual or group that has made a profound impact on their community Called the Blackline Safety Impact Awards, the first award was presented to two U.S. utility workers who saved a child’s life. The Blackline Safety Community Hero Award was awarded to Matt Overcasher and Steve Manypenny, field technicians with Columbia Gas of Ohio, at a July 29 ceremony at the utility’s training center in Gahanna, Ohio. The Community Hero Award recognises an individual or group that has made a profound impact on their community by going above and beyond to help save lives or protect the community from safety incidents. Two-way communication safety device Overcasher and Manypenny were on their way home from work in 2023 summer when they heard frantic screaming from a mother of an 18-month-old struggling to breathe. Using quick thinking, they pulled the emergency SOS latch on their Blackline two-way communication safety device and were able to get medical help dispatched within seconds. Communicating with an agent from Blackline’s 24/7 live Safety Operations Center throughout the incident, the duo was guided on what to do until EMS arrived on-site and revived the unconscious child. $10,000 donation For their heroic efforts, Overcasher and Manypenny each received a prestigious award, which also included a $10,000 donation to Ronald McDonald House of Central Ohio – the winners’ charity of choice. When a child is in the hospital, as the child was in this case following the rescue, the family needs to be close. Open 365 days a year, the Ronald McDonald House helps facilitate family-centered care that fosters health and well-being for the whole family. Incident response While working in the utility industry involves risks workers are fully safety trained to react to incidents Columbia Gas of Ohio is a brand of NiSource Inc., one of the largest fully-regulated utility companies in the U.S., serving approximately 3.5 million natural gas customers and 500,000 electric customers across six states. While working in the utility industry involves risks – from electrocution and falls to chemical exposure, fires and explosions – workers are fully safety trained to react to incidents. Layers of protection Both award winners say they have experienced emergencies before, but never one quite like this situation that involved a child. Blackline’s award-winning G6 wearable single-gas detector, G7 personal gas detectors, and G7 EXO area gas monitors are built for extremes and the toughest conditions, with GPS-enabled location tracking providing layers of protection to ensure a critical lifeline during an emergency. Cloud-connected monitoring platform Supported by Blackline Live, the company’s powerful, cloud-connected monitoring and analytics platform, the technology enables organisations to view in real-time all their workers’ locations and gas readings in the field and configure their devices, from any Internet-connected smartphone, tablet, or computer, no matter how remote the location. Blackline Safety Impact Awards will be presented annually in a variety of award categories, including customer, channel partner, and environmental heroes, in addition to community heroes.
Barco, a pioneer in professional visualisation technology, announces the refreshment of its OverView range of tiled LCD video walls. The new OverView LVD-5521D and OverView KVD-5521D are 55” 500-nit LCD video walls, part of the ENB 1.8 mm and UNB 3.5mm bezel generation respectively. The panels build further on the existing range, featuring automatic colour and brightness calibration and noiseless operation. Smooth visual experience Barco’s OverView range of mid-range LCD video walls perfectly complements the premium Barco UniSee platform. These new generations of OverView video walls showcase significant advancements in seam width reduction and uniformity enhancements. Ultra Narrow Bezel 3.5 mm generation for KVD) makes sure that the inter-modular seams are minimised The narrow bezel (Extreme Narrow Bezel 1.8 mm generation for LVD, Ultra Narrow Bezel 3.5 mm generation for KVD) makes sure that the inter-modular seams are minimised for a smooth visual experience. Additionally, Barco’s signature innovative Sense X algorithm – the unique automatic and continuous calibration system − ensures that a perfectly balanced image is consistently produced across the entire wall, delivering superior visual uniformity and performance. Easy installation and operation The Barco OverView LCD portfolio is designed to meet the needs of mission critical applications. The absence of cooling fans not only minimises noise, but also eliminates moving parts (which are susceptible to wear), optimising both the lifetime and the total cost of ownership (TCO). This makes the range suited for use in critical applications, including control rooms, television studios and corporate boardrooms. OverView LVD-5521D and OverView KVD-5521D OverView LVD-5521D and OverView KVD-5521D use the Video Wall Manager software The OverView LVD-5521D and OverView KVD-5521D use the Video wall Manager software to make it easy to install and control the video wall, while enhancing user-friendliness. The integration of DisplayPort v1.2, which makes it possible to feed 4 displays in loop-through with 4K@60Hz content, is vital for easy connection with a limited number of cables. Minimising energy consumption To conclude, both products are ecolabeled with a Barco ecoscore A. Compared to the previous model, the KVD-5521D consumes 20% less energy, representing a significant improvement in energy efficiency. By minimising energy consumption, businesses can lower operational costs while actively contributing to environmental conservation in alignment with their commitment to sustainability. This dual benefit of cost efficiency and eco-friendliness makes the next-gen OverView video walls an ideal choice for forward-thinking organisations. “The refreshed Overview LCD video wall range offers customers even more value for money,” says Gerrit Vermeire, Director R&D Displays at Barco, adding “Complemented with our flagship Barco UniSee range, this creates a complete LCD portfolio – which allows us to always suggest the solution that best answers the users’ needs and budget.”
Acre Security, a global pioneer providing state-of-the-art security systems, announced the launch of its new Partner Relationship Management (PRM) platform. The partner portal is a comprehensive, one-stop shop designed to streamline the partner experience by providing centralised access to support, marketing, sales and training materials. New PRM platform From onboarding materials to marketing and sales support, the new platform ensures that essential tools and information are readily available, empowering partners to operate more efficiently and effectively. It integrates various functions into one connected, interactive system, enabling partners to communicate more seamlessly, share best practices, and access updates and insights. Investment in Acre’s ecosystem The partner portal represents a significant investment in Acre’s ecosystem "We recognise that our success is linked to the success of our partners," said Val Cassidy, Aspire Partner Program Director, Acre Security, adding "That’s why we are investing in this platform and we are committed to accelerating our partner's growth in every way possible. Our new partner portal makes it easier for our partners to register new business, access training and support materials, all in one place." The partner portal represents a significant investment in Acre’s ecosystem. This investment underscores the company's belief in the importance of providing partners with the tools they need to excel and is a testament to its commitment to fostering long-term, mutually beneficial relationships. Acre community "We are dedicated to building stronger, more meaningful relationships with our partners," said Serra Luck, COO, Acre Security, adding "The partner portal is a critical component in achieving this objective. By offering a streamlined, connected, and resource-rich platform, acre enhances the support and value provided to partners." Existing partners can connect to the new portal by reaching out to their account managers. New partners interested in joining the Acre community can complete the enrolment form.
Aerospike, Inc. announced that the BSV Blockchain trials of Aerospike, which underpins its groundbreaking Teranode blockchain transaction platform, has achieved sustained throughput of over three million transactions per second (TPS), enabling Teranode to support over one million global BSV Blockchain transactions per second (100 billion a day). These results far outstrip the performance of traditional core banking infrastructure and payment systems. BitCoin (BTC), the first and most common implementation of Bitcoin, supports just seven transactions a second (605,000 a day). Scale of digital asset transactions BSV Blockchain is an enactment of the famous Bitcoin whitepaper written by Satoshi Nakamoto The BSV Blockchain is an implementation of the famous Bitcoin whitepaper written by Satoshi Nakamoto. BSV Blockchain is designed to overcome the limitations of earlier implementations, such as Bitcoin and Bitcoin Cash, around scalability, transaction speed, and realising a truly distributed network. This is achieved, in part, by having an unlimited block size, but a larger block requires a new infrastructure approach to achieve high performance and a low cost per transaction. Aerospike meets these challenges and enables Teranode and BSV Blockchain to support an unlimited scale of digital asset transactions across a host of new categories. These include protecting intellectual property rights, enabling direct financial transactions between two parties with no intermediary, and Web3, which, when implemented, will allow millions of microtransactions to take place daily, supporting new granular payment models, such as pay as they use data. Aerospike enables 100 billion Bitcoin transactions a day The BSV Association, which works to advance business on the BSV blockchain, explored multiple DBMS architectures to underpin Teranode. Traditional RDBMS solutions and other NoSQL technologies were cost prohibitive, however, requiring a disproportionately high investment in expensive RAM and other resources across the global network that push up costs and impact scalability. Conversely, Aerospike’s NoSQL architecture makes Teranode exceptionally efficient, maintains performance as Teranode scales, enables a cost per transaction that undercuts traditional payment providers, and is financially sustainable to support micro-transactions. Aerospike’s NoSQL architecture makes Teranode very efficient, keeps version as Teranode scales Siggi Óskarsson, Teranode Director at BSV Association, said: “Aerospike has enabled us to achieve our goal of creating a platform that supports boundless transactions far beyond the financial, with unmatched performance. The Aerospike database enables low and sustainable implementation costs and will scale with ease as the BSV Blockchain adds support for large-scale enterprise and governmental blockchain applications.” Faster and more reliable mining Aerospike’s performance and strong consistency gains also enable those mining for new coins. In cryptomining, cost, speed and scale are all equally vital to the individual miner. Solutions prior to Teranode could incur substantial latency on each interaction with the Blockchain, but the efficiency and distributed nature of Aerospike means that Teranode users experience <10 ms latency and much higher throughput on their existing infrastructure. Aerospike’s native consistency features also dramatically reduce the risks of inconsistencies, which would take a miner offline and result in loss of revenue when, all the while, they are paying for expensive infrastructure. Behrad Babaee, Principal Solutions Architect at Aerospike, said: “The potential for unboundedly scalable core systems could revolutionise financial infrastructure modernisation. This implementation of Aerospike clearly demonstrates its ability to outperform traditional RDBMS banking systems, which are often unscalable and inefficient on every metric. Aerospike, as part of Teranode, is transformative for the BSV Association, enabling it to easily scale, with no need for the complexity and risks associated with dedicated solutions to manage scaling.”
Matrix successfully showcased its advanced security products and solutions at the 5th edition of the Rail and Metro Technology Conclave, held at Hotel Le Méridien, in New Delhi, India, from July 23-24, 2024. As the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways, Matrix highlighted its STQC-certified network cameras, adhering to the OWASP ASVS 4.0 L2 standards for cybersecurity compliance. These cameras ensure that critical passenger video data remains secure during transmission and storage, safeguarding against cyber threats. Demands of railways and roadways RDSO 6.0-ready cameras deliver high-resolution imagery for enhanced clarity and protection During the event, Matrix experts engaged with attendees to discuss their cutting-edge IP Video Surveillance, Access Control, and Time-Attendance solutions tailored for Metro Rail Systems. A significant highlight was the newly launched Ruggedised IP Camera, EN50155 compliant, engineered to withstand the rigorous demands of railways and roadways. These cameras offer impeccable video quality, exceptional low-light sensitivity, and versatile monitoring capabilities, ensuring crystal-clear footage even inside fast-moving vehicles. Matrix also discussed its line of Project Bullet Network Cameras and Project Dome Network Cameras, designed for large-scale organisations. These RDSO 6.0-ready cameras deliver high-resolution imagery for enhanced clarity and protection. Matrix’s COSEC VEGA FAXQ210 In the realm of access control and time attendance, Matrix has COSEC ARGO FACE, an intelligent door controller featuring high-speed face recognition technology with Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion. This device ensures swift identification in under 0.5 seconds, with a user capacity of 50,000, addressing evolving security threats with its deep learning algorithm. Additionally, Matrix’s COSEC VEGA FAXQ210 is an embedded Linux-based AADHAAR-enabled biometric attendance device registered on the AEBAS Server. With authentication in under 1.5 seconds, it verifies users through their AADHAAR number stored in the smart card and fingerprint, offering reliability, convenience, speed, and data security for government organisations. Advancements in Railway and Metro security Kaushal Kadakia, Marketing Head of Matrix, remarked, "The Rail and Metro Technology Conclave provided an excellent platform for us to present our specialised security solutions for Indian Railways and Metro Rail Systems. We had fruitful discussions with key government decision-makers about potential collaborations and advancements in Railway and Metro security." Matrix looks forward to continuing its commitment to providing advanced security solutions for the Railway and Metro sectors.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Matsuo Sake Brewery in Arita Town, Saga Prefecture, is one of the historic breweries in Japan. Since its founding by the seventh generation head, Matsuo Sake Brewery has been producing sake in the Arita region, which has been blessed with clear water and abundant nature for over 150 years. Cloud-based security In the pursuit of operational excellence, Matsuo Sake Brewery embarked on a transformation journey on physical security by utilising VIVOTEK’s cloud-based security service - VORTEX. This improvement initiative aims to enhance security measures streamline workflows and maximise operational efficiency, all in pursuit of sustainable improvements for the brewery. Brewery's challenges Before utilising VORTEX, Matsuo Sake Brewery faced some hurdles and hoped to maximise product safety. Security Risks within the Winery: Concerns existed about security risks such as unauthorised access and theft, particularly regarding protecting valuable wine inventory. Measures were needed to prevent external intrusion and unauthorised access. Real-Time monitoring: In numerous instances, remote monitoring and real-time video retrieval prove challenging, if not entirely unattainable. This lack of real-time access significantly hampers the ability to respond to site conditions promptly. Challenges in Proper Resource Utilisation: Insufficient information regarding the proper allocation and utilisation of resources, including personnel and equipment, hindered efficient resource utilisation. Reasons for VORTEX integration VORTEX can provide comprehensive monitoring capabilities with high-definition video and audio feeds, allowing administrators to remotely monitor the operation of the brewery without interruption. The ability to access live and recorded video footage from smartphones empowers managers to monitor operations from anywhere, at any time, facilitating swift decision-making. Leveraging VORTEX's advanced AI features enhances security measures such as intrusion detection and attribute search, while also improving operational efficiency. Benefits of VORTEX By utilising VORTEX, Matsuo Sake Brewery streamlines workflows, reducing operational complexities and enhancing productivity. Real-time insights provided by VORTEX empower administrators to make informed decisions promptly, enabling proactive responses to operational challenges. Optimisation of resource utilisation and streamlined workflows contribute to cost savings, enhancing the brewery's profitability and sustainability. VORTEX's advanced security features, including intrusion detection and real-time alerts, minimise security risks and ensure regulatory compliance. Results and customer feedback The implementation of VORTEX at Matsuo Sake Brewery maximised operational efficiency and optimised workflows. By addressing key challenges and leveraging advanced technology solutions, the brewery enhanced productivity and cost-effectiveness while strengthening security measures. This initiative established a robust foundation for future growth and success in the competitive brewing industry.
One of the pioneering players in the global packaging ecosystem, this manufacturing facility transforms over 100,000 tonnes of paper, paperboard, and laminates annually into diverse, high-value packaging solutions. Established in 1925, it caters to industries such as food and beverage, personal care, and consumer goods, with a robust presence across India and select global markets. Recognised for operational excellence and innovation, the business holds numerous prestigious awards and certifications. With a strong focus on customer delight and sustainable packaging, it partners with major brands like P&G, Nestle, and Unilever. Business Scenario To address these challenges effectively, the facility of a video surveillance system was felt essential Without a video surveillance system in place, the company faced recurring security breaches and unauthorised access to its manufacturing units, which raised significant concerns for employee safety and the protection of assets. Instances of product mishandling and operational inefficiencies went unnoticed, underscoring the critical need for a video surveillance system. To address these challenges effectively, the installation of a video surveillance system was deemed essential. Additionally, they wanted a video surveillance system that ensured uninterrupted monitoring to avoid missing crucial events. Challenges Security Vulnerabilities: The absence of a video surveillance system posed risks to employee safety and the protection of valuable assets such as machinery, raw materials, and finished products. Operational Oversight: Instances of product mishandling were not promptly detected or addressed due to the lack of a robust video surveillance system. This compromised productivity, and quality control within the manufacturing unit. Loss Prevention: The inability to monitor activities effectively increased the risk of inventory shrinkage, theft, or damage to goods. This not only affected financial losses but also disrupted supply chain operations and customer deliveries. Inaccurate Weighbridge Monitoring: Inaccurate weighbridge monitoring made it difficult to verify truck weights before and after loading, which caused fraud and serious operational issues. Regulatory and Compliance Risks: Without a proper video surveillance system, it was challenging for the manufacturing unit to meet stringent regulatory standards, potentially leading to regulatory penalties. Solution Solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the digit plate All the vehicles entering and exiting the premises were monitored with Matrix Automatic Number Plate Recognition Solution. This solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the number plate. SATATYA SAMAS - Video Management Software then uses OCR technology to convert this captured number plate image into a digital number and store it in the database. The loading and unloading facility was closely monitored with the help of Matrix Weighbridge Monitoring Solution. This aided in the accurate tracking of shipments, which prevented fraud. Matrix 5MP Dome Cameras were strategically placed above production floors, assembly lines, packaging areas, and quality control stations within the manufacturing and warehouse facility. These cameras provided detailed monitoring of manufacturing processes, ensuring product quality and operational continuity with clear footage. Additionally, they were installed in administrative offices, break rooms, and training areas contributing to workplace safety. Matrix 5MP Bullet Cameras were deployed for robust outdoor and perimeter surveillance. They monitored loading docks, outdoor storage yards, parking lots, and security checkpoints. These cameras secured critical infrastructure such as HVAC rooms and electrical rooms, ensuring the safety and integrity of vital systems. SATATYA SAMAS - Video Management System The video surveillance system was configured in such a way that ensured uninterrupted recording All 100+ cameras were integrated with SATATYA SAMAS - Video Management System aiding in live view, and playback of the network cameras in the premises. The facility also opted for the CREAM (Cognitive Response Engine and Automated Monitoring) module in SATATYA SAMAS to improve employee safety. Two IVAs were configured in this case - Tripwire and Motion Detection. The Tripwire IVA could be used to monitor specific areas that had to be obstructed, while Motion Detection IVA helped in identifying accidents or unusual activities in the obstructed areas. Both IVAs worked in tandem, providing real-time alerts and video pop-up notifications. The video surveillance system was configured in such a way that ensured uninterrupted recording. Even if the recording server failed, the recording would be pushed to the management server by the network cameras. When the recording server was functional again, the footage was again pushed to the management server. Products Offered: SATATYA SAMAS PLT (1No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM5 (24 Nos.): Licence for Adding 5 Additional Cameras SATATYA SAMAS USER3 (01No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR3 (01No.): 3 Camera Licences for Automatic Number Plate Recognition SATATYA SAMAS CREAM5 (01No.): 5 Camera Licences for Automated Monitoring SATATYA CIBR50MVL12CWP P2 (04 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIBR50FL40CWS P2 (63 Nos.): 5MP IR Bullet Camera Fixed 4mm Lens SATATYA CIDR50FL40CWS P2 (53 Nos.): 5MP IR Dome Camera Fixed 4mm Lens Benefits The manufacturing facility is extremely satisfied with Matrix Video Surveillance System and is now planning to rely on Matrix for its needs at additional plant locations across India. Matrix's Automatic Number Plate Recognition (ANPR) and Weighbridge Monitoring Solutions streamlined operations by accurately tracking vehicles entering and leaving the premises, reducing manual errors and cutting down on weighment fraud. Employees experienced a greater sense of security with the help of CREAM in Matrix VMS, as it lowered the risk of accidents in the facility. With regular monitoring, the video surveillance system minimised product mishandling and prevented process errors, while also protecting assets and machinery. Matrix Network Cameras kept a constant watch over inventories, warehouses, and storage yards, making it easy to track stolen goods using surveillance footage. Matrix VMS and the server systems ensured 24/7 recording of the facility, maintaining continuous surveillance even in critical situations, providing a reliable and secure environment.
One of India's fastest-growing entertainment networks, renowned for its iconic brands, offers a diverse array of experiences across multiple platforms. This network profoundly impacts the Indian entertainment landscape, engaging audiences through its on-air, online, on-ground, cinema, and merchandise properties. With a portfolio of over 30 channels, it captivates audiences nationwide with a variety of programming, including general entertainment, movies, sports, youth content, music, and children's genres. Additionally, the network has been successfully producing and distributing acclaimed Hindi and regional films in India for over a decade. Challenge/requirements The client required a unified communication solution, prioritising emergency communication, for over 500 users. Future scalability was a crucial factor as well. A major challenge involved integrating Matrix devices with existing SIP-enabled systems. Their key requirements were as follows: Unified Communication Solution: Implement a system that ensures seamless connectivity across various devices via a single unified communication platform. Mobility: Guarantee connectivity for users on the go. SIP Integration: It was essential to integrate Matrix devices with the existing SIP-enabled systems to maximise investment efficiency without revamping the current infrastructure. Emergency Communication: Provide features that facilitate contacting emergency services during times of distress. Redundancy: To minimise or eliminate downtime, particularly during emergencies, redundancy was a critical requirement. Solution Matrix, in collaboration with Space Office Systems (I) Pvt. Ltd., created a Unified Communication solution that integrated existing devices with Matrix devices via SIP. This solution included the ANANT unified communication server, standard SIP desk phones, and the VARTA softphone. The deployment was carried out as follows: The server-based PBX, ANANT, housed in the server room, provides LAN and WAN connectivity with the crucial feature of redundancy. The media house utilised ANANT's LAN connectivity, facilitated by a network switch that allowed multiple devices on the premises to access IP connectivity. The network switch, connected to ANANT via LAN, provides connectivity for SPARSH VP510 and SPARSH VP210 phones, along with the VARTA softphone. Moreover, a connection through the router facilitates SIP integration with third-party devices via the SIP trunk. Results Emphasising SIP integration of Matrix devices with existing systems optimised investments The results included significant enhancements to their communication capabilities. Collaboration was streamlined through a unified communication solution, and mobility was boosted with VARTA. Emphasising SIP integration of Matrix devices with existing systems optimised investments. Overall, the solution markedly improved operational efficiency with advanced calling features. Now, let's delve into the specifics of the solution provided. Collaboration: The unified communication solution, featuring the server-based PBX ANANT, enabled seamless teamwork between office-based and mobile staff through VARTA. This ensured uninterrupted transfer and reception of information. Investment Optimisation: The SIP integration with Matrix Solution seamlessly integrated into the existing network infrastructure, meeting the client's uncompromising requirement. This integration effectively utilised current resources, eliminating the need for additional investments. Operational Efficiency: The redundancy offered by ANANT ensured minimal to no downtime, enabling smooth information flow and greatly enhancing workflow efficiency. This capability was especially critical during emergencies and related communications. Modern Features: The office now enjoys enhanced capabilities with Matrix Standard SIP desk phones such as SPARSH VP210 and SPARSH VP510. These include advanced call routeing, integration with global directories, VPN connectivity support, thereby significantly bolstering the media house's communication capabilities. The Matrix solution empowered the media house to elevate its communication capabilities with advanced call features. Notably, it excelled in emergency communication functionality, provided scalability for future needs, and seamlessly integrated with third-party devices through SIP.
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
RODE, the acronym for RObotic DEpalletiser, is a pioneering product from AWL in the intralogistics market. The robotic solution can efficiently process packages randomly arranged on a pallet, setting it apart from conventional systems. Need for increased automation According to the German Parcel and Express Logistics Association (Bundesverband Paket und Expresslogistik e. V.), 4.15 billion courier, express, and parcel shipments were sent in Germany alone in 2022. Annual shipment growth to around 4.9 billion is realistic by 2027. Against this backdrop and the generally prevailing shortage of personnel, there is only one solution for shipping and logistics companies to cope with this immense volume of orders: increased automation. RODE The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution. One of the locations where RODE adds value is for DHL eCommerce in Rotterdam. In this machine, two Ensenso 3D cameras from IDS Imaging Development Systems GmbH are implemented to provide the required image data. Application The intelligent robot-supported depalletiser, therefore, automatically destacks any packaged goods such as cartons, bags, or containers from pallets and thus ensures their continuous processing - without delays or downtime. Even "extra shifts" at peak times can be implemented at any time, e.g., to cope with the increased workload during Christmas. This frees up staff for more qualified tasks, such as the subsequent processing of consignments or handling customer inquiries. At the same time, it relieves employees of physically and ergonomically demanding tasks and reduces the risk of injury. Up to 800 packages in continuous operation The particular difficulty here lies in the robot's picking of parcels of different sizes and weights At DHL eCommerce in Rotterdam, RODE processes up to 800 parcels per hour with a maximum weight of 31.5 kg each and places them on the corresponding sorting belt. The particular difficulty here lies in the robot's picking of parcels of different sizes and weights. It must independently recognise the position of the objects in three-dimensional space and decide which package to pick next. It then has to determine the best gripping position and avoid collision with other parcels or the machine. Ensenso X36 3D cameras "This intelligent robotic solution integrates AI image processing and high-tech gripper technology," explains Sander Lensen, R&D Manager at AWL. "The system recognises products and can flip the items to ensure that the required long side is leading." Two Ensenso X36 3D cameras provide the necessary image data. Integrated image processing system They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm and a maximum height of 2400 mm. The integrated image processing system processes this further and enables the depalletiser to identify each package and determine the corresponding gripping position for robust robot-assisted picking. 3D cameras for future-oriented robotics Each Ensenso X36 3D camera system consists of a projector unit and two GigE cameras with either 1.6 MP or 5 MP CMOS sensors. AWL has opted for the 5 MP variant for its solution. Mounting and adjustment brackets, three lenses as well as sync and patch cables for connecting the cameras to the projector unit are also included in the scope of delivery. The integrated FlexView2 technology ensures an even better spatial resolution as well as a very high robustness of the system with dark or reflective surfaces. Easy to set up It is also easy to integrate into its working environment and aims to give its users a competitive edge The 3D systems are delivered assembled and pre-calibrated. However, focussing and calibration are also easy to set up using the setup wizard integrated into the software. The latter they have in common with the RODE depalletiser - it is also easy to integrate into its working environment and aims to give its users a competitive edge in the world of logistics automation. Outlook "The intralogistics market is a growth market. The number of robot solutions required will increase rapidly in the coming years." "The type of products that need to be recognised will change constantly. This will be a challenge for all components and the demands on the camera," explains Sander Lensen. Camera technology with artificial intelligence However, image processing is also developing rapidly. Smart solutions that combine camera technology with artificial intelligence are on the rise. They hold great potential for tackling both increasingly demanding tasks and the worsening shortage of skilled workers. Carton by carton, parcel by parcel, pallet by pallet.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Every day, the physical security industry succeeds in applying technologies that make the world a safer place. Manufacturers, integrators, and end users are eager to share their success stories, and their successes can inspire others to implement the same technology solutions. But, occasionally, technology does not live up to expectations and, in fact, fails to perform as promised. We asked this week’s Expert Panel Roundtable: How has the physical security industry failed to meet customer needs?
For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace?
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Integrated access control: reap the benefits of connected security](https://www.sourcesecurity.com/img/white-papers/612/image.jpg)
Integrated access control: reap the benefits of connected security
Download![Securing unmanned infrastructure at the network edge](https://www.sourcesecurity.com/img/white-papers/612/securing-unmanned-infrastructure-network-edge-920.jpg)
Securing unmanned infrastructure at the network edge
Download![Connected video technology for safe cities](https://www.sourcesecurity.com/img/white-papers/612/milestone-safe-city-video-technology-920.jpg)
Connected video technology for safe cities
Download![10 top insights in access, cloud and more](https://www.sourcesecurity.com/img/white-papers/612/vanderbilt-whitepaper-headerimage.jpg)
10 top insights in access, cloud and more
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![How to migrate to an IP-based access control system](https://www.sourcesecurity.com/img/white-papers/612/genetec-us-websiteimage2.jpg)
How to migrate to an IP-based access control system
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Making sense of today’s security camera options](https://www.sourcesecurity.com/img/white-papers/612/vicon-todays-security-camera-option-920.jpg)
Making sense of today’s security camera options
Download![Smart security cameras: excellence in retail](https://www.sourcesecurity.com/img/white-papers/612/920x533_1596117357.jpg)
Smart security cameras: excellence in retail
Download![Access control & intelligent vehicle screening](https://www.sourcesecurity.com/img/white-papers/612/uveye-920x533_1582820920.jpg)
Access control & intelligent vehicle screening
Download![How to get buy-in from IT departments on IP video installations](https://www.sourcesecurity.com/img/white-papers/612/getting-buy-in-from-it-option-2-920_1540308414.jpg)
How to get buy-in from IT departments on IP video installations
Download![Hikvision DarkFighter Technology for high-quality images at night](https://www.sourcesecurity.com/img/white-papers/612/hikvision-darkfighter-620.jpg)
Hikvision DarkFighter Technology for high-quality images at night
Download![Enhanced Ethernet Technology (ePoE)](https://www.sourcesecurity.com/img/white-papers/612/Dahua-ePoE-620x360.jpg)
Enhanced Ethernet Technology (ePoE)
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Network cameras: Manufacturers & Suppliers
- Hikvision Network cameras
- Dahua Technology Network cameras
- Axis Communications Network cameras
- exacqVision Network cameras
- Bosch Network cameras
- Honeywell Security Network cameras
- VIVOTEK Network cameras
- Hanwha Vision Network cameras
- AV Costar Network cameras
- LILIN Network cameras
- Messoa Network cameras
- Panasonic Network cameras
- Sony Network cameras
- eneo Network cameras
- Vicon Network cameras
- Pelco Network cameras
- FLIR Systems Network cameras
- Surveon Network cameras
- IDIS Network cameras
- Milestone Network cameras
![Access control system planning phase 2](https://www.sourcesecurity.com/img/white-papers/612/920x533_1722432285.jpg)
Access control system planning phase 2
Download![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![DNAKE Cloud Intercom: Dive into V1.5.1 Updates](https://www.sourcesecurity.com/img/virtual-events/612/dnake-cloud-intercom-webinar-920x533.jpeg)
DNAKE Cloud Intercom: Dive into V1.5.1 Updates
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download