Network / IP security
With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse future trends. Or you could try statistical or economic modelling. Or you could develop multiple scenarios based on various assumptions to explore potential outcomes. Or you could just check your email. At this time of year, my email is full of industry folks looking to predict what the future holds in 2025. Ranging from...
In 2025, over 100,000 online platforms in the UK must start effectively verifying the age of their users to comply with the Online Safety Act (OSA). Adult sites are the first in Ofcom’s spotlight, needing to implement age verification tools to prevent underage users from accessing their platforms in January 2025. Why is it important? The incidence of online harm has never been higher, and all stakeholders are keen to see action to protect children. The research (among 2,000 UK children)...
Sentrycs, a technology pioneer in the Counter-Unmanned Aerial Systems (C-UAS) industry, announced its continued progress globally within the public safety market. The company recently closed agreements with two new law enforcement organisations, including one in North America. These new agreements will deliver core protocol manipulation sensor solutions across a wide variety of scenarios, from fixed sites to vehicle-mounted (mobile) operations. Drone sightings The company has seen a noticeabl...
OPSWAT, a global pioneer in critical infrastructure protection established in the U.S., announced its acquisition of Fend Incorporated. Fend is a pioneering data pipeline and cybersecurity company dedicated to securing operational technology (OT) against cyber threats, ransomware, and other evolving risks. Based in Arlington, Virginia, Fend is known for its expertise in protecting U.S. government agencies, utilities, oil and gas, manufacturing, and other critical industries where air-gappe...
DigiCert, a pioneering global provider of digital trust, announced that DigiCert ONE solutions are now available for purchase through Microsoft Azure Marketplace, offering customers and partners an efficient way to access DigiCert's digital trust solutions. With DigiCert ONE now listed on Azure Marketplace, customers gain streamlined access to DigiCert's comprehensive platform for managing digital certificates and securing data and devices at scale. This partnership simplifies purchas...
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security...
News
DigiCert, a pioneering global provider of digital trust solutions, announced the release of its open-source Domain Control Validation (DCV) library, building on its contributions to the PKI community. The release of the new library is designed to strengthen the domain validation process and reduce errors in certificate issuance. This latest release joins pkilint, another open-source tool from DigiCert that ensures certificates are accurate and comply with standards. DigiCert’s open-source library DCV process is vital for ensuring that only the owner of a domain can be issued a certificate for it The DCV process is critical for ensuring that only the proven owner of a domain can be issued a certificate for it. Until now, many CAs have had to develop their own proprietary code to meet compliance requirements—a task that can be resource-intensive and inconsistent. DigiCert’s open-source library solves this problem by providing a pre-vetted, standards-compliant solution that raises the bar for industry transparency and security. New standard for transparency “This library reflects our commitment to advancing the security and reliability of the internet,” said Deepika Chauhan, Chief Product Officer at DigiCert. “By open-sourcing our DCV library, we’re not only sharing the tools we’ve refined over years of experience, but we’re also fostering trust and collaboration across the Web PKI community. We believe making this library available to everyone will set a new standard for transparency and compliance, ultimately benefiting the entire digital trust community.” Key benefits of the open-source DCV library Compliant DCV Practices: Offers CAs a robust, pre-built solution for performing domain control validation in alignment with industry standards, eliminating the need to create and maintain proprietary code. Enhanced Transparency: Open access allows the global community to review, test, and validate the code, fostering trust and collaboration. Community-Driven Hardening: Public scrutiny will identify and mitigate vulnerabilities, further strengthening the library’s security and efficiency for DigiCert and other users. Two critical challenges The release of DigiCert’s DCV library is an industry first for the certificate authority ecosystem. While open-source PKI solutions are not new, no organisation has specifically open-sourced a dedicated DCV library until now. This initiative addresses two critical challenges: Accessible, Scalable Implementation: The library provides developers with an open, transparent, and scalable solution for domain control validation. Many certificate authorities lack the resources to develop and maintain a robust, field-tested implementation of this critical digital trust process, making the library an invaluable option. Enhanced Security Through Community Scrutiny: As the first open-source DCV implementation, the library invites widespread industry scrutiny, enabling vulnerabilities and other bugs to be identified and addressed more quickly. Closed-source implementations often leave risks undetected for years due to limited testing resources. By fostering collaboration and accountability, this initiative strengthens digital trust across the ecosystem, incentivising CAs and developers to ensure the library meets the highest standards of quality and security. Expanding the commitment to the Web PKI community The open-source DCV library builds on DigiCert’s legacy of leadership in advancing transparency and best practices within the Web PKI space. Just as DigiCert has enhanced trust through innovations like Certificate Transparency and pkilint, this initiative represents another step forward in safeguarding the integrity of the internet.
PureTech Systems Inc., a pioneer in geospatial AI-boosted video analytics for wide-area perimeter and border security, is proud to announce the launch of its Rapid Deploy Autonomous Perimeter Surveillance System (RDAPSS) configured for Drone detection and tracking. Designed to meet the demands of rapid, flexible security deployments, the RDAPSS delivers unmatched autonomous surveillance and can be equipped with an advanced sensor suite, including counter-drone capabilities. PureTech’s system features RDAPSS is an all-in-one, self-powered solution for organisations requiring reliable drone detection The RDAPSS is an all-in-one, self-powered solution for organisations requiring immediate, reliable drone detection and awareness either as an addition to an existing security system or as a new standalone system. The system features PureTech’s patented AI-boosted video analytics for a near 100% autonomous detection of humans, drones, animals and vehicles, with a near-zero nuisance alarm rate. The RDAPSS adapts to diverse mission profiles, including critical infrastructure protection, border control, special events and temporary facility monitoring. Key features of RDAPSS Rapid Deployment: Designed for ease of transport and installation, RDAPSS can be fully operational within minutes. AI-Boosted Perimeter Surveillance: Equipped with PureTech’s PureActiv® software, RDAPSS delivers real-time, autonomous detection and tracking of targets of interest. Multi-Sensor Integration: Supports a tailorable sensor suite, including radar, cameras, and RF sensors for maximum threat detection. Counter-Drone Capabilities: Detects, identifies, and tracks drones to help mitigate unauthorised aerial threats. Scalable: Operates independently or as part of a larger surveillance network, enhancing operational flexibility. Advanced sensor integrations “As security challenges continue to evolve, the need for adaptable, autonomous surveillance solutions has never been greater,” said Larry Bowe, President of PureTech Systems. He adds, “The RDAPSS combines rapid deployment with advanced sensor integrations and AI-boosted video analytics to address emerging threats, including the growing risks posed by drone intrusions.” RDAPSS empowers security teams With its customisable sensor suite and counter-drone capabilities, RDAPSS empowers security teams to detect and mitigate ground and aerial threats with unmatched precision and efficiency.
Onity, a global pioneer in electronic access solutions and mobile credentialing and a Honeywell brand, announces the expansion of its partnership with Extra Space Storage, Inc., the largest self-storage company in the United States. Onity and Extra Space Storage are advancing storage unit access across the country with next-generation mobile access technology, allowing customers to enter storage units quickly and safely without a traditional lock and key. Onity's Passport locking solution Successfully ended field trials and growth site installations at Extra Space Storage areas across the US The two companies have been working together to integrate Onity’s pioneering DirectKey technology into Extra Space Storage’s customer mobile app and to trial Onity’s newly released Passport locking solution. Now, they’ve successfully completed field trials and expansion site installations at Extra Space Storage locations across the U.S. "By integrating Onity's smart locks into our storage units and Onity's DirectKey mobile access technology into our customer mobile app, we're enhancing the tenant and facility operator experience, while increasing security, convenience and operational efficiency," said James Hafen, Vice President of Product, Extra Space Storage, adding "We look forward to bringing Onity's Passport locking solution to additional locations in the future." New industry standards for security In its testing, Onity’s Passport solution facilitated nearly 5000 door openings with the locks demonstrating a reliability rate of 99.8%, and overall system availability of 99.9%. Additionally, the projected battery life for the installed locks is over 5 years, an increase from the original projection of 3 years. "These field trials have been critical to ensuring the safety and reliability of our mobile access solutions for Extra Space Storage users," said Fayyad Sbaihat, President, Onity, adding "Together, we’re setting new industry standards for security and convenience in self-storage solutions, ensuring the protection of people’s most valuable, essential items." This collaboration underscores Honeywell’s alignment of its portfolio to three compelling megatrends, including automation.
Allied Universal®, the world’s pioneering security and facility services provider, announced its acquisition of Unified Command, an event safety and security technology provider. Specialising in event surveillance video, command centre operations and situational awareness services, the addition of Unified Command supports Allied Universal’s growth strategy to become the most technologically advanced security services provider in the world. Integral role in evolution Members of Unified Command’s team will join the Allied Universal management team “It’s an exciting time for Allied Universal and this acquisition marks a significant milestone in expanding our technology-enabled growth strategy,” said Steve Jones, global chairman and CEO of Allied Universal. “We are pleased to have Unified Command join our team and play an integral role in the company’s evolution.” Members of Unified Command’s team will join the Allied Universal management team, including founder and CEO Chad Ladov. Allied Universal’s extensive portfolio “We are excited to join the world’s premier security provider. Becoming part of an organisation with the resources, technology and depth of services that Allied Universal offers enable us to provide greater value to the customers we serve in the event space,” Ladov said. “Our entire team is extremely motivated to bring our unique offering of temporary surveillance solutions to Allied Universal’s extensive portfolio of customers.” Between 2022 to 2024, Allied Universal completed 24 acquisitions – 15 in North America and nine internationally. In 2021, Allied Universal acquired 10 companies, including G4S.
Global cybersecurity firm Performanta celebrates the recognition of its Head of Security Automation, Torvald Johnson, as one of Microsoft’s first Security Copilot Most Valuable Professionals (MVPs). The first of only 10 Security Copilot MVPs worldwide, Johnson has been recognised for his practical expertise, leadership and guidance across the cybersecurity sector and wider industries, and commitment to pursuing a future of cyber safety. Performanta’s cyber innovation “It is an absolute honour to be named among the world’s first Security Copilot MVPs by Microsoft,” stated Johnson. “Microsoft’s powerful solutions and Performanta’s dedication to driving cyber innovation create a partnership that can only benefit our sector and customers. It is a mission I am proud and grateful to be a part of. I must extend my sincere thanks to Rod Trent and James Key at Microsoft, both resolute and passionate experts we have the pleasure to work with, for recommending me as an MVP.” Innovation with Microsoft products Microsoft MVPs are selected not only for their expertise and innovation with Microsoft products Microsoft MVPs are selected not only for their expertise and innovation with Microsoft products, but also for the demonstration of exceptional leadership, industry impact, and proactive efforts to support and expand the broader community. Microsoft MVP candidates are selected exclusively through nominations from within Microsoft before they are put through a rigorous judging process. What cybersecurity solutions are capable of? Guy Golan, Founder and Executive Chairman of Performanta said, “Torvald’s appointment as one of the first MVPs for Security Copilot is a huge achievement, on both an individual and company level." "Together, our work pushes the possibilities of what cybersecurity solutions are capable of. Recognition of this regard provides us with Microsoft’s stamp of approval and the credibility of knowing we have world-pioneering cyber professionals guiding our customers, at a time when businesses face rising digital threats. As our partnership with Microsoft continues to grow, we are excited to work together to pave the way to a safer digital environment for all.” Microsoft Security products Johnson is a donor to cyber events and a written host on emerging cybersecurity trends With a rich background working with Microsoft Security products like Defender and Sentinel, Johnson now specialises in Microsoft Security Copilot, using the AI-enabled solution and Safe XDR platform to cut incident response time from days to minutes. Alongside his work, Johnson is a regular contributor to pioneering cyber events and regular written commentator on emerging cybersecurity trends. Johnson is the second member of the Performanta team to achieve the status of Microsoft MVP. Application of Security Copilot Performanta and Microsoft collaborate closely to drive innovation in the application of Security Copilot. Johnson recently spoke alongside James Key, Microsoft’s Principal Product Manager for Security Copilot, on the future of cybersecurity and AI at a joint Cyber AI Summit in December. He expressed an optimistic view of the industry’s future, innovations to cyber tools such as Safe XDR, and continued partnership.
Shelly Group, a global pioneer of IoT and smart building solutions, announces the expanded Shelly Wave lineup for the U.S. market, enhanced with Z-Wave® Long Range (ZWLR) technology. This development represents a significant advancement in smart home connectivity, delivering extended transmission range, robust network scalability, and improved energy efficiency. Benefits by ZWLR technology The expanded lineup features eleven Shelly Wave solutions super-charged with support for ZWLR The Shelly Wave product portfolio, built on the Z-Wave 800 Series, includes new products that have been purpose-built to support ZWLR functionality as well as existing UL-certified Z-Wave devices that have been upgraded to take full advantage of the benefits offered by ZWLR technology. The expanded lineup features eleven Shelly Wave solutions super-charged with support for ZWLR and includes three battery-powered devices, demonstrating a dedicated focus on delivering versatile, power-efficient solutions. Key benefits of ZWLR to Shelly wave devices Extended range and coverage: ZWLR provides a substantial range boost, enabling devices to communicate over distances exceeding 1 mile (line of sight) at full power. Scalable Networks: ZWLR supports up to 4,000 devices on a single network, representing a 20x increase in Z-Wave node support compared to Z-Wave mesh with the added benefit of co-existing on the same network as Z-Wave mesh. Security and Compatibility: Advanced encryption and backward compatibility with existing Z-Wave devices and networks ensure seamless integration and secure operations. New Shelly Wave products Shelly Wave product line caters to a range of applications and device deployment designs The upgraded Shelly Wave product line caters to a range of applications and device deployment configurations, from basic point-to-point home automation to complex and robust device installations. Enhanced with ZWLR, the new Shelly Wave products are ideal for environments where long-range connectivity and energy efficiency are essential, such as large homes, multi-unit properties, commercial settings, and edge-of-property installations. Smart home connectivity barriers “With new devices featuring support for ZWLR, Shelly is helping break down smart home connectivity barriers, empowering homeowners, security installers, and commercial property owners and managers with unmatched range, scalability, and energy efficiency to redefine their automation experience,” said Leon Kralj, CTO of Shelly Group. “As the only technology we trust to seamlessly support powered devices and battery-operated solutions, as well as outdoor applications and multi-floor buildings, ZWLR delivers unprecedented range and interference-free performance on Sub-GHz frequencies, ensuring unparalleled reliability and versatility.” Adoption of Z-Wave advancements “The integration of ZWLR technology into the Shelly Wave product lineup is a testament to the transformative power of Z-Wave innovation,” said Avi Rosenthal, Chairman of the Board for the Z-Wave Alliance. “As a standards development organisation, we rely on future-focused manufacturers, such as Shelly, to drive the adoption of Z-Wave advancements and are thrilled to see a comprehensive product line that delivers all of the benefits of ZWLR to customers worldwide, redefining what is possible in smart home and IoT connectivity.” Lineup of US Shelly Wave devices The expanded lineup of US Shelly Wave devices enhanced with ZWLR includes: Shelly Wave Plug US Shelly Wave Door/Window Shelly Wave H&T Shelly Wave Motion Shelly Wave Dimmer Shelly Wave Pro Dimmer 1 PM Shelly Wave Pro Dimmer 2 PM Shelly Wave 1 Shelly Wave 1 PM Shelly Wave 2 PM Shelly Wave Shutter Shelly Wave ZWLR devices are slated to be available in the U.S. in H1 2025.
Expert commentary
A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Integrity of gift card programs While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies. They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are certified to improve the monitoring and analysis of gift card trade patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Latest versions of AI and LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift card revenues, client trust, and label integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams as well as customer trust and brand integrity.
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
Security beat
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
Case studies
Silverstein Properties, a pioneering real estate development, investment, and management firm, and its partners SwiftConnect, Allegion, and Kastle, announced they are live with resident keys in Apple Wallet for all apartment units at a multi-family housing location: Silverstein’s Silver Towers residential property at 606 West 42nd Street in New York City. Silverstein’s residential tenants now have an easy and secure way to add a resident key to Apple Wallet to access the apartment building and unlock their homes with a simple tap of an iPhone or Apple Watch—thus eliminating the need to use a traditional, physical key. Resident key in Apple Wallet The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry “We’re excited to make it easy for our residents to use their resident key in Apple Wallet to get into their buildings, homes, and common areas, which builds upon our previous offering to office tenants who use their employee badge in Apple Wallet to access offices and shared spaces including lounges, cafes, conference facilities, and yoga studios,” said Tal Kerret, President of Silverstein Properties. The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry, as property owners and employers reimagine the home and workplace experience for residents, office tenants, and employees. SwiftConnect’s success: Enhance security for residents “The Silver Towers project builds on SwiftConnect’s success in delivering seamless access via NFC wallets across the most iconic commercial real estate properties in New York and beyond,” said Matt Kopel, co-CEO and President of SwiftConnect. “We are excited to once again partner with Silverstein Properties and to extend our leadership into the multi-family housing market. Now, residents can easily access their personal spaces with their iPhone and Apple Watch, and property teams are able to enhance security for their residents—while also automating the process of managing keys and access.” Modern access-control solution SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials To provide residential tenants with this experience, SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials; and access control devices from Allegion™, as well as all other necessary business platforms and systems to create a unified digital network for hassle-free mobile access. “Kastle is thrilled to be a partner on the Silver Tower project, leveraging Kastle’s robust and proven access-control products to create a modern access-control solution that delivers an unparalleled experience both property owners and residents can trust,” said Haniel Lynn, CEO of Kastle. Schlage mobile-enabled wireless locks “We are excited to work with SwiftConnect and play an important role in Silver Tower's resident key in Apple Wallet multifamily housing deployment,” said Mark Casey, Vice President of National Electronic Sales of Allegion. “Resident Keys in Apple Wallet—alongside our Schlage mobile credentials and Schlage mobile-enabled wireless locks—not only enhances security and convenience for residents, but also exemplifies our commitment to driving the future of seamless access and smart apartment technology.” How seamless access works at Silver Towers Tenants can add their resident key to Apple Wallet after an initial set-up through Silverstein’s Inspire app, using SwiftConnect’s AccessCloud platform. Once added, tenants can hold their iPhone or Apple Watch near a door reader or smart lock for seamless access to the apartment building, their home, and shared fitness and amenity spaces. With Express Mode, tenants don’t need to wake or unlock their device to use their resident key—they can simply hold their device near a reader and go. If an iPhone needs to be charged, they can still use their device to access their apartment and amenity spaces with Power Reserve. Resident key in Apple Wallet takes full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when and where a resident uses a home key in Wallet. Silverstein’s holistic customer experience program The new offering falls under Inspire, Silverstein’s holistic customer experience program that reshapes how, when, and where the company’s customers live and work. Inspire brings hospitality services, social and wellness programming, data-driven workplace technology, and a flexible workspace solution under one umbrella. Since its inception 67 years ago, Silverstein Properties has been recognised for driving innovative technology adoption to enhance the tenant experience. The company has built a reputation for developing exceptional projects, enhancing local communities, providing outstanding services to customers and partners, and driving innovation within the industry.
One of the UK’s major jails is enhancing surveillance with the help of video wall experts Ultimate Visual Solutions (UVS), who specialise in control room installations at prisons and other high-security establishments. The prison, which can’t be named for security reasons, has been operating a 10-screen LCD video wall and video wall controller, installed by UVS, 24/7 since 2009, including regular upgrades to ensure it benefitted from the latest technology. High-security prison UVS has now been recruited to install its very latest Lucidity video wall controller technology for the system, which will become an emergency backup control room at the high-security prison. A completely new control centre has now been built at the site and UVS have been selected to provide the very latest in video wall technology for this application, with a 10 55-inch narrow bezel screen LCD video wall and Lucidity WBC110 controller. Several security management systems Lucidity controllers merged with many security management systems that are in use at these sites During the past 15 years UVS have also supplied video wall controller technology and LCD video walls for five other high-security prisons in the UK. Due to UVS’s extensive work in the high-security prison sector, its Lucidity controllers have also been integrated with several security management systems that are in use at these sites. UVS Managing Director Steve Murphy said: “We are very proud to have once again been selected to provide the very latest in video wall technology at a site where it is essential that control rooms have reliable 24/7 operation." Long-term technical support Murphy added: “The level of support provided by UVS, from system design, to implementation, to long-term technical support, has been highlighted by our partners as one of the key factors in our selection, alongside proven reliable operation in these highly-critical 24/7 applications.” UVS, based in the Burnley First – Burnley Business Centre, is led by four senior colleagues who, between them, have more than 85 years’ combined Audio Visual, Control Room and Visual Solutions experience.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
Since 2024, Maringá, a city of approximately 500,000 residents consistently recognised as the best city to live in Brazil for over 6 consecutive years, has further strengthened its reputation by addressing the growing need for public safety. Smart surveillance solutions In this pioneering project, ALCA NETWORK and ALLNET were responsible for the project design and partnered with VIVOTEK, the global provider of security solutions, to implement one of the most advanced smart surveillance solutions in Brazil. This system integrates cutting-edge cameras, facial and licence plate recognition, and Big Data technologies. By consolidating data from the municipal, state, and federal sectors, this collaboration increases the safety of residents, solidifying Maringá’s position at the forefront of innovation in public safety. City's challenge The city government and security agencies recognised the need for smarter security measures Despite Maringá’s reputation as a peaceful and hard-working city with one of the highest Human Development Indexes (HDI) in Brazil, it faced evolving public safety needs. The city government and security agencies recognised the need for smarter security measures. “The Public Safety Department initially aimed to capture and analyse video data to support decision-making in cases such as drug trafficking, vehicle theft, tax fraud, and the protection of women and minors at risk,” explains Security Secretary Ivan Quartaroli. Public safety To meet these objectives, VIVOTEK was chosen by ALCA NETWORK and ALLNET for its advanced technology and quality, perfectly aligning with the city government’s requirements. The implementation of Maringá’s Integrated Control Center (CCI) began in July 2022, with strategically positioned cameras installed by the city’s public safety guidelines. Vivotek solutions VIVOTEK played a key role in upgrading Maringá’s security infrastructure by providing a comprehensive suite of solutions. This includes cameras with built-in video analytics processing technology and advanced software with facial and licence plate recognition capabilities. This integration leverages Big Data to cross-reference captured information, facilitating streamlined processing and providing reliable analytics for informed decision-making. To ensure full coverage, 70 VIVOTEK cameras supplied by ALLNET were strategically installed in key locations throughout Maringá, including urban mobility terminals, major avenues, squares, high-traffic intersections, and public corridors. Results and customer feedback Continuous monitoring of CCI allows officers to identify suspicious activity and promptly alert The implementation of CCI Maringá with VIVOTEK solutions has improved public safety, causing a notable reduction in crime rates and an increased sense of security among residents. Continuous monitoring of CCI allows officers to identify suspicious activity and promptly alert nearby law enforcement with accurate information. Benefits VIVOTEK’s advanced imaging technology supports crime prevention and investigation and serves as crucial evidence in legal proceedings. Key benefits include: Reduced investigation costs and time. Greater efficiency and safety for public agents working in the sector. Reduction in car thefts. Reduction in criminal activities. Increased quality of life for the population. Vehicle management As Acting Mayor Ulisses Maia emphasised, “This investment is capable of protecting the law-abiding citizens of Maringá, preventing all types of accidents that can happen in our city.” The integration of video analytics, particularly licence Plate Recognition (LPR), greatly increases safety by managing the flow of vehicles in and out of the city, reinforcing Maringá’s status as a smart city in Brazil.
RGB Spectrum®, a pioneering designer and manufacturer of real-time audio-visual solutions for defence and public safety, announces that Trident Military Systems, LLC, a pioneering provider of flight simulation systems for military organisations, has teamed up with RGB Spectrum to enhance the effectiveness of its F-16 training programs. With a focus on delivering realistic, synchronised training experiences, Trident has successfully integrated RGB Spectrum’s SuperView®, DGy™, and QuadView® solutions, transforming how pilots and instructors engage with their training data. The Challenge Trident Military Systems supports the Air National Guard and Air Force Reserve by building and maintaining F-16 simulators across multiple sites nationwide. Trident aimed to provide instructors with real-time cockpit data, synchronised video sources, and effective debriefing capabilities for improving pilot training. Why RGB Spectrum? RGB Spectrum’s technology proved vital in delivering high-quality training to the Air National Guard Trident turned to RGB Spectrum for its flexible, reliable, and scalable solutions. These products allowed Trident to seamlessly integrate custom applications, synchronise video with network data, and ensure fail-safe operations under critical conditions. RGB Spectrum’s technology proved essential in delivering high-quality training to the Air National Guard and Air Force Reserve. “We needed a solution that could integrate cockpit data with real-time network information and ensure that our training systems performed flawlessly under the high-stakes conditions of military training,” said Jerry Giacinto, Chief Technology Officer at Trident Military Systems. “RGB Spectrum’s products have provided the reliability and flexibility we need to offer exceptional training experiences.” How RGB Spectrum’s technology powers training? Trident Military Systems utilises the following RGB Spectrum products to support training and debriefing: SuperView Multiviewer: Displays a real-time "glass cockpit" on a large monitor, giving instructors a comprehensive view of cockpit data, including multi-function displays (MFD), flight data, and simulated out-of-cockpit visuals. DGy Video Codecs: Records video and audio during training sessions using JPEG2000 compression, providing visually lossless video for accurate post-mission analysis and debriefing. QuadView Multiviewer: Integrates multiple video sources on a single screen, enabling instructors to present critical training data in customisable layouts for enhanced clarity and context. The Results The integration of RGB Spectrum’s technology has had a profound impact on Trident Military Systems’ ability to deliver high-quality, synchronised training: Enhanced Training Capabilities: Instructors gain real-time access to all cockpit data, improving the depth and quality of feedback during training. Improved Debriefing: DGy’s video and audio recording features have streamlined post-mission analysis, allowing for a more detailed and effective debriefing process. Operational Efficiency: RGB Spectrum’s customisable solutions have increased operational efficiency by seamlessly synchronising video playback with network data. “The SuperView, DGy, and QuadView have made a difference in how we deliver and review F-16 training missions. The clarity, real-time synchronisation, and ability to record and play back training sessions have improved our ability to debrief and educate pilots,” said Giacinto. “These tools have become indispensable in our daily operations.”
A premier cancer research and treatment institute in India, renowned for advancing oncology, serves as a national centre for specialised healthcare. Committed to delivering innovative treatments and holistic care, the institute integrates state-of-the-art technology with a highly skilled medical team. It emphasises comprehensive patient management, pioneering research, and educational initiatives to enhance oncology expertise. The institute's cutting-edge facilities are tailored to support groundbreaking research, driving progress in cancer treatment and care. Challenges/requirements The research institute relied on a legacy network setup that gradually introduced multiple challenges: Integration with Existing Infrastructure: The institute sought a Unified Communication System that could effortlessly adapt to its intricate legacy setup. Maintaining compatibility was essential to preserve seamless connectivity and ensure the continuity of critical daily operations. Scalability for Future Growth: With plans for expansion, the institute foresaw growing communication needs, including enhanced connectivity and advanced functionalities. Matrix was entrusted to provide a solution that not only resolves present challenges but is also designed to scale effortlessly for future requirements. Secure Communication: With the critical sensitivity of medical communications, ensuring data security and compliance with healthcare standards was paramount. Matrix was tasked with delivering a robust solution designed to safeguard privacy and protect against security risks. Solution The Matrix Unified Communication System incorporated a VoIP-PRI gateway and an embedded IP-PBX server, effectively integrating with third-party IP phones. This configuration bridged modern communication technology with the institute's legacy systems, ensuring seamless functionality. The solution highlights are as follows: Integration with Legacy Network: The Matrix Unified Communication System incorporated two SETU VTEP1P VoIP-PRI gateways, seamlessly connecting with the existing legacy PRI network to ensure smooth integration and enhanced communication capabilities. IP Network: The embedded IP-PBX server, PRASAR UCS-SPARK200, facilitates the IP network connection via a router, enabling seamless communication across the system. Integration with Third-Party IP Phones: The IP-PBX server, connected via the LAN, powers the IP network to support over 300 third-party IP phones, creating a comprehensive and unified communication system. Results The implementation of the Matrix Unified Communication System significantly enhanced the Cancer Research Institute's communication infrastructure. The key outcomes were: Smooth Transition with Legacy Infrastructure: The system effortlessly connected with the institute’s existing PRI network, allowing the retention of its current setup while introducing modern VoIP capabilities. This ensured operational continuity and efficient workflows without the need for costly upgrades or disruptions. Future-Ready Scalability: The IP-PBX server, capable of supporting up to 2100 users, provides the institute with a flexible and adaptable communication solution. Designed to accommodate future growth, the system ensures increased connectivity and the integration of advanced features, aligning seamlessly with the institute’s expanding needs. Optimized Licencing Structure: The deployment of the Matrix SIP server enabled the institute to reduce licencing costs by up to 20%, delivering significant savings while maintaining high-quality communication capabilities. Enhanced Device Connectivity: Reliable IP connectivity across over 300 third-party IP phones has streamlined internal communication within the institute. This seamless integration allows staff to collaborate efficiently across departments, enabling quicker decision-making and more unified operations. The Matrix Unified Communication System empowered the Cancer Research Institute to transition to a scalable and integrated communication infrastructure. This solution not only supports current operations but also accommodates future growth, effectively resolving core challenges with a seamless and sustainable approach.
Products
Round table discussion
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly, but they can also be misused or misunderstood. Within a specific industry, such as security, buzzwords can create a sense of shared understanding and belonging. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the security industry?
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
White papers
Palm vein recognition
DownloadPhysical access control
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadCybersecurity for enterprise: The essential guide to protecting your business
DownloadThe 2024 state of physical access trend report
DownloadThe security challenges of data centers
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadHoneywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadHow to lower labour costs when installing video surveillance
DownloadTotal cost of ownership for video surveillance
DownloadThe truth behind 9 mobile access myths
DownloadPalm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download