Network monitoring
OPSWAT, a global pioneer in critical infrastructure protection established in the U.S., announced its acquisition of Fend Incorporated. Fend is a pioneering data pipeline and cybersecurity company dedicated to securing operational technology (OT) against cyber threats, ransomware, and other evolving risks. Based in Arlington, Virginia, Fend is known for its expertise in protecting U.S. government agencies, utilities, oil and gas, manufacturing, and other critical industries where air-gappe...
Colt Technology Services, the digital infrastructure company, announced that it is first to successfully trial Cisco’s 800G ZR+ coherent pluggable optics in its production network using the Cisco 8000 series routers, powered by Cisco Silicon One. The Routed Optical Networking testing– carried out across the 667 km between Frankfurt and Munich, Germany– is the latest in a series of Colt trials with high-profile global partners designed to rethink technology’s previous lim...
AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its 2024 Endpoint Prevention and Response (EPR) Comparative Report, showcasing the exceptional performance of pioneering cybersecurity solutions. The report evaluates the ability of these products to detect, prevent, and respond to advanced threats in real-world scenarios. MITRE ATT&CK® framework AV-Comparatives' rigorous assessment covered products from Bitdefender, Check P...
Altronix, the pioneer in power and data transmission for the professional security industry, offers a new solution for remote security installations, highlighted with the new NetWaySP4TCW53. This 4-port outdoor hardened 802.3bt PoE switch provides a reliable and flexible means of powering the latest IP devices in remote locations – from industrial sites and city surveillance to critical infrastructure and transportation hubs. NetWaySP4TCW53 An integrated rapid battery charger provides e...
Colt Technology Services, the digital infrastructure company released key enterprise technology forecasts and market trends for 2025. Based on its proprietary research among over 1000 global CIOs, and gathered from market intelligence sources, Colt anticipates sustainability-driven innovation, AI regulation, and a ‘coming of age’ for Network as a Service (NaaS) to dominate the enterprise tech pioneer’s agenda over the next 12 months. Need for AI frameworks Mirko Voltol...
Nanodems, a global provider of Physical Security Information Management (PSIM) solutions, is pleased to share the success of its participation in ISC East 2024, held at the Javits Centre in New York City from November 19–21. As one of the Northeast’s pioneer security and public safety trade shows, ISC East provided an excellent platform for Nanodems to present its AI-powered PSIM software platform, NDIS. Advanced PSIM software The event showcased the company’s innovati...
News
5G Standalone (5G SA) and 5G Advanced are expected to be a key focus for communications service providers (CSPs) for the remainder of the decade as they deploy new capabilities to create offerings centred on value delivery rather than data volume. The analysis is included among a wealth of statistical network insights in the November 2024 edition of the Ericsson (NASDAQ: ERIC) Mobility Report, which extends the forecast period until the end of 2030. Network traffic data growth 5G networks are expected to carry about 80% of total mobile data traffic by the end of 2030 While the rate of mobile network traffic data growth is declining - estimated at 21 percent year-on-year for 2024 - it is still expected to grow almost three-fold by the end of 2030 from present-day numbers. Globally, 5G networks are expected to carry about 80 percent of total mobile data traffic by the end of 2030 - compared to 34 percent by the end of 2024. The Gulf Cooperation Council (GCC) countries are set to have 47 percent 5G subscription penetration by 2024. It is projected that the GCC will have the highest 5G penetration in 2030 at 93 percent, followed closely by Western Europe at 92 percent and North America at 91 percent. GCC region’s economic outlook Characterised by high mobile penetration, urbanisation, and strong consumer purchasing power, the GCC region’s economic outlook remains favourable, driven largely by sectors such as tourism, technology, and renewable energy. In the telecom industry, a key trend is the transformation of service providers from traditional telcos to technology companies. This transition is being fuelled by the rollout of 5G, enabling the introduction of advanced services, including AI and the cloud solutions and services, factory automation and content delivery where network slicing will be critical in delivering these services. Mobile subscriptions Mobile subscriptions in the GCC countries are forecast to grow at an annual rate of 3% High-performance networks, application programming interfaces (APIs) and a vibrant developer community are expected to drive growth. Up to 2030, overall mobile subscriptions in the GCC countries are forecast to grow at an annual rate of 3 percent, reaching 95 million. By the end of the decade, 93 percent of all subscriptions are expected to be 5G, with 88 million users adopting this technology. Future of mobile networks Nicolas Blixell, Vice President and Head of Gulf Cooperation Council Countries at Ericsson Middle East and Africa, says: “The November 2024 Ericsson Mobility Report highlights the pivotal role of 5G Standalone and 5G Advanced in the future of mobile networks, particularly in regions like the GCC, where high mobile penetration and rapid urbanisation are driving demand for advanced connectivity." "These technologies are set to enable capabilities such as programmable networks and AI connectivity-driven use cases, creating new opportunities for growth and innovation. As service providers in the GCC and beyond adopt these advancements, they will unlock the full potential of 5G, driving digital transformation and enhancing the way industries and consumers engage with technology.” Global 5G subscriptions Of about 320 CSPs currently offering commercial 5G services globally, less than 20 percent are 5G Standalone (SA). However, almost 60 percent of the 6.3 billion global 5G subscriptions forecast by the end of 2030 are expected to be 5G SA subscriptions. Fixed Wireless Access (FWA) continues to grow in popularity globally as the second largest 5G use case after enhanced Mobile Broadband (eMBB). Generative AI applications Service providers are already offering value delivery models based on differentiated connectivity The report highlights how early-mover service providers are already offering value delivery models based on differentiated connectivity - guaranteed uninterrupted high-end connectivity when you need it most - to create new monetisation and growth opportunities. The report also addresses how AI, including Generative AI Applications - already integrated across smartphones, laptops, watches and FWA products - could impact uplink and downlink network traffic, driving potential mobile traffic growth beyond current baseline predictions. Ericsson Mobility Report Other featured report statistics include the projection that global 5G subscriptions are expected to reach almost 2.3 billion by the end of 2024, amounting to 25 percent of all global mobile subscriptions. 5G subscription numbers are expected to overtake the global number of 4G subscriptions during 2027. The first 6G deployments are expected in 2030, building on and scaling the capabilities of 5G SA and 5G Advanced. Ericsson will host Ericsson Mobility Report online seminars at 09.00 (CET) and at 18.00 (CET) on Tuesday, December 3. Based on unique Ericsson and partner network insights, the Ericsson Mobility Report has been the key industry reference for network data, performance, statistics, and forecasts since its launch in 2011.
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is pleased to introduce three 6 MP cameras in its Value Series, offering customers enhanced clarity, extended range, and affordability. Available at a special promotional discount through December 31, these models—part of Hikvision’s innovative 3-Series lineup—feature AcuSense technology, enabling efficient and precise monitoring that outperforms traditional 4 MP cameras. Hikvision’s DarkFighter technology Compatible with new and living systems, these models are suited for domains and lighting conditions “Our 6 MP 3-Series cameras bring high-performance imaging, greater monitoring coverage, and advanced technology to the Value Series, allowing customers to improve their security systems affordably,” said John Xiao, Vice President of Marketing, Hikvision USA. “We’re making professional-grade security accessible for a broader range of users, ensuring high resolution and reliable performance.” The new 6 MP cameras offer clearer visuals and an extended monitoring range, featuring advanced low-light capabilities through Hikvision’s DarkFighter technology. Compatible with both new and existing systems, these models are suited for various environments and lighting conditions. 3-Series 6 MP camera models on sale 1. DS-2CD3066G2-IS: 6 MP AcuSense Fixed Mini Bullet Network Camera 2. DS-2CD3366G2-ISU: 6 MP AcuSense Fixed Turret Network Camera 3. DS-2CD3T66G2-4IS: 6 MP AcuSense Fixed Bullet Network Camera Key features of the 6 MP Value Series cameras AcuSense Technology: Enables precise object detection and classification, minimising false alarms for more efficient monitoring. High-Resolution Imaging: Provides sharp, detailed visuals that surpass the 4 MP models in the Value Series. Extended Monitoring Range: Enhanced sensor and lens technology enable broader coverage. Advanced Low-Light Performance: Ensures clarity in various lighting conditions, powered by DarkFighter technology. Efficient Compression: H.265+ compression optimises storage and bandwidth. Versatile Compatibility: Compatible with HEOP and third-party applications for flexible customisation. Take advantage of this special offer on Hikvision’s 6 MP Value Series cameras by December 31. For more information, visit a local distributor, contact a Hikvision representative, or explore the full range of products at Hikvision.com.
Colt Technology Services (Colt), the digital infrastructure company, announced the latest in a series of enhancements to its award-winning Network as a Service (NaaS) platform, Colt On Demand, with an additional 130,000 locations served by dedicated fibre (FTTX) in the UK, France, Luxembourg, the Netherlands and Poland, accessible through the platform. This bolsters the 32,000 Colt-connected buildings, 1,100 data centres and 275 Cloud points of presence already accessible to customers through Colt On Demand – in addition to millions of locations delivered via carrier partners in over 180 locations - offering businesses greater scale, speed and security. Colt’s On Demand platform The enhancement supports a move to greater automation for Colt and its customers The enhancement supports a move to greater automation for Colt and its customers. It brings businesses greater choice, flexibility and cost control, while the energy efficiency gained from consumption-based networks can help contribute to businesses’ power-saving goals In addition, a new user interface to Colt’s On Demand platform has made it even easier for businesses to navigate and support their geographic expansion plans through the platform, so they can quickly flex their bandwidth requirements to meet business demand and respond to changing market dynamics. Colt’s NaaS service Colt’s NaaS service, Colt On Demand, has secured more than thirty industry awards since its inception, with six recent wins - including the NaaS Global Service Provider of the Year - at the MEF NaaS Excellence Awards 2024. Peter Coppens, VP Infrastructure and Connectivity solutions, Colt Technology Services said, “We pioneered Network as a Service over seven years ago. Since then, our multi-award-winning On Demand platform has connected thousands of businesses to sites across the world, and we’ve refined and enhanced the platform based on their experiences." Colt’s recent research 58% said they are using more on-demand or NaaS features as a result of the growth in AI usage Coppens added: "The latest customer-driven changes are the most significant yet, giving businesses access to five times as many locations as before, providing unrivalled scale and improving automation. This is the beginning of a new era of NaaS, and once again, Colt is leading the charge.” The enhancements come as IT pioneers face new pressures, including measuring and forecasting the impact of AI on their digital infrastructure as well as driving down carbon emissions across the network. In Colt’s recent research of 1500 CIOs, 58% said they are using more on-demand or NaaS features as a result of the growth in AI usage. Colt’s ecosystem 81% of respondents in the study highlighted the positive impact of NaaS on their carbon reduction goals, with almost 30% citing it as a direct contributor to carbon reduction. The new locations are offered via Colt’s ecosystem of best-of-breed partners, with an additional 20,000 locations expected to be available through the platform by the end of the year, bringing the total to more than 180,000, of which 32,000 are ‘on net’, connected to Colt’s own digital infrastructure. As well as benefit from the scale and reach, businesses selecting Colt’s on net locations benefit from real-time quoting, ordering and delivery, and in-life real-time flexing.
According to the 2024 Access Control report by Omdia, Genetec., the pioneer in enterprise physical security software, has consistently gained market share over the last six years, solidifying its position as a worldwide market pioneer and building upon its #2 global position for access control software. In the Americas market, access control software has evolved beyond the physical security department to become an essential component of business operations. 2024 Access Control report According to the Omdia report, this broader adoption has increased demand for unified security platforms that allow organisations to manage systems - such as access control, video surveillance, and intrusion detection - through a single interface. By anticipating market needs for access control innovation, Genetec continues to expand its market share, growing at a 28% CAGR over the past six years. Access control innovation “While many legacy access control vendors rely on acquisitions to expand their market share, Genetec has achieved rapid organic growth through innovation and investment in new technologies,” said Christian Morin, Vice President of Product Engineering, Genetec Inc. Christian Morin adds, “Over the last year, we introduced Security Center SaaS, HID Mercury Security MP controllers, Axis Powered by Genetec, and an I/O module in partnership with STid as part of our European high assurance access control system offering. This demonstrates our commitment to expanding our access control portfolio through innovation and partnerships, paving the way for future growth.” Providing adaptable solutions Omdia also reports that end users in the region prefer open systems that offer flexibility and customisation In a highly fragmented EMEA market, Genetec remains among the top 10 access control software providers by focusing on open architecture systems that allow users to integrate components from different vendors. Omdia also reports that end users in the region prefer open systems that offer flexibility and customisation. This further supports the company’s strategy to provide adaptable solutions tailored to the region, as evidenced by its partnership with STid. Strong integration capabilities In the Asia-Pacific region (excluding China), Genetec continues to rapidly expand its market share, reaching #6 position (up from #10 in 2021). As enterprise users and multinational corporations modernise their access control infrastructure, they seek feature-rich, cyber-secure systems with strong integration capabilities. An open-architecture solution, such as the Genetec access control solution, allows organisations to secure assets and people, enhance business operations, and easily upgrade technology at their own pace. Full cloud deployments Genetec has retained its #1 global position in the VMS market while also ranking #1 in the combined VMS The Omdia report also indicates that the access control market is increasingly adopting hybrid cloud deployments. Genetec is at the forefront of this change. Security Center SaaS is a physical security solution that brings the power of Genetec access control and video management to the cloud. Security Center SaaS supports hybrid or full cloud deployments, allowing organisations to move components and sites to the cloud based on their needs and requirements at their own pace. Genetec solutions Because Genetec solutions are based on an open platform architecture, users choose the access control devices that best suit their needs while also preserving their existing investments. In addition to its success in access control, Genetec has retained its #1 global position in the VMS market, while also ranking #1 in the combined Video Management Software (VMS) and Video Surveillance as a Service (VSaaS) market, according to Omdia’s recently released 2024 Video Surveillance & Analytics Database Report.
The European Network for Cyber Security (ENCS) announces that IPTO (Independent Power Transmission Operator), Greece's transmission system operator, has officially joined the network as a full member. With this new partnership, IPTO will actively participate in shaping the ENCS's strategy, while benefitting from the extensive cybersecurity knowledge sharing, training, and research available to ENCS members. Reliable transmission of electricity IPTO operates and keeps Greece's high-voltage power grid, ensuring the reliable transmission of electricity IPTO operates and maintains Greece's high-voltage power grid, ensuring the reliable transmission of electricity across the country. This membership marks a significant step forward for IPTO in reinforcing its commitment to protecting the power grid against increasingly sophisticated cyber threats. Anjos Nijk, Managing Director of ENCS, comments: "We are delighted to welcome IPTO to our network. As the backbone of Greece's high-voltage power grid, IPTO plays a crucial role in maintaining the stability and security of Europe's energy infrastructure." Technical expertise and strategic insights Anjos Nijk added: "IPTO's deep technical expertise and strategic insights will significantly enhance our collective efforts to secure critical infrastructure across Europe." Nikos Raftopoulos, Director of ICT and Cybersecurity at IPTO, stated: "In today's fast-paced digital world, safeguarding the security of our power grid has become more essential than ever." Nikos Raftopoulos adds, "Through our membership with ENCS, we strengthen our own cybersecurity measures, while actively supporting Europe's collective efforts to secure the energy sector. We are excited to work alongside ENCS members to exchange knowledge, insights, and best practices."
Cloudbrink has won a major endorsement from Japanese system integrator NEC Networks & System Integration Corporation (NESIC), which is to use Cloudbrink’s personal SASE service as the foundation of its Virtual Trusted Overlay Network. Virtual Trusted Overlay Network facilitates high-performance zero-trust networking using Cloudbrink’s ultra-low-latency global edge mesh. NESIC is also integrating other services including end-point security and identity management, enabling accelerated connectivity and security to be brought together in a fully managed service. Development of the NESIC service NESIC chose Cloudbrink’s technology for its performance, integrated security and ease of deployment and management, and for its willingness to collaborate on the development of the NESIC service. Osamu Kikuchi, Senior Vice President of NEC Networks & System Integration Corporation said: “Our partnership with Cloudbrink began over a year ago, and we have successfully introduced their award-winning service to businesses in the Japanese market. With this new game-changing service, we look forward to disrupting the traditional enterprise networking and security architecture to deliver enhanced security, simplicity and speed to our global customers and partners.” Advanced security functions Key to the Virtual Trusted Overlay Network is the ability to deliver ultra-high version network access Key to the Virtual Trusted Overlay Network is the ability to deliver ultra-high performance secure network access. Independent testing has verified Cloudbrink’s claim to accelerate applications by a factor of 30x for mobile and remote users on consumer-grade broadband and wireless connections, without the additional costs and operational headaches of installing additional hardware. Routing and advanced security functions are provided by a global network of virtual PoPs called FAST edges, which use AI to locate the closest access point – typically less than 10ms away. Cloudbrink service Prakash Mana, CEO of Cloudbrink, said: “We feel honoured to play a significant role in the Virtual Trusted Overlay Network initiative. NEC has been an outstanding partner and we share the same vision of making SASE work for everyone – less to manage for the network and security teams, a better experience for end users, and better value for the enterprise.” NESIC, a subsidiary of Japan’s pioneering provider of cloud computing and network services, NEC Corporation, signed as a reseller of the Cloudbrink service in early 2023, later becoming a design partner to develop the Virtual Trusted Overlay Network. NESIC will offer services based on the Virtual Trusted Overlay Network starting in January 2025 as part of its Symphonict cloud service infrastructure.
Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
Case studies
EQUANS were engaged by Alfred Health to deliver an AV upgrade to their Centre for Health Innovation (CHI), where clinical staff and students can use simulation to develop skills and practice procedures in a safe learning environment, with the aim of capturing clinical and learning events for review, assessment and debrief. In addition, the facility also required the capacity to host workshops and networking events from major clinicians and health professionals. Centre for Health Innovation (CHI) CHI caters to all health specialties and can accommodate training in a variety of simulated environments, such as ICU, emergency, high dependency units, operating theatre and recovery rooms, ward spaces and procedure rooms. The Solution – CAE LearningSpace solution The system allows for up to 12,000 hours of video and audio recording EQUANS deployed the CAE LearningSpace solution. Based on a multi room enterprise grade IP platform, the local recorders in each of the training areas seamlessly upload to a central management and redundant storage server. The system allows for up to 12,000 hours of video and audio recording, live view from any network connected browser enabled workstation, and annotations of points of interest in real time. EQUANS deploys a Crestron touch screen and table kit EQUANS also deployed a Crestron touch screen and table kit for control of the learning space display, in addition to the cloud control via the CAE Learning Space One Hardware. The implementation of a Revolabs discrete microphone system provides users with great audio collaboration. The Benefit Immersive simulation-based education is used to facilitate teamwork and clinical management skills for multidisciplinary teams and individuals. The collaborative space allows clinical and innovation experts to use the latest technology and learning methods to facilitate courses and workshops, plus the recording and evaluation of usability research into new health technologies and processes. Participants are then able to practice procedures and hone clinical skill without patient risk, and have access to ratified technology that ultimately improves patient care. Overview Key facts: Deployed the CAE LearningSpace solution 12,000 hours of video and audio recording, live view and real time interactions
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
360 Vision Technology, the UK manufacturer of ruggedised HD, radar and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Invictus TX cameras for STC car parks Daniel Chappell, Technical Account Manager at North takes up the story: “Historically, South Shields had an existing public safety CCTV system, which was mainly street focused. However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate to a new surveillance solution, to cover its twelve town centre car parks.” He adds, “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirement and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation.” Low-cost video transmission Daniel Chappell continues, “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibre optic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive.” He further states, “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling.” Securing the best 4G network supplier The new Invictus PTZ TX cameras are now securing STC car parks with video streaming Daniel Chappell adds, “Taking-up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross referenced with network operators to provide the best quality of signal at each specific camera location.” Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are now securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. Control room monitoring In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said: “This investment forms part of wider improvements to our CCTV provision, which is a vital tool in helping to keep our residents and visitors safe.” Reliable video system for monitoring the cameras He adds, “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security and management of the car parks. Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real time more quickly and effectively.” Councillor Jim Foreman continues, “The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness and surveillance.” Close-up imaging and enhanced night-time vision The 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens Featuring continuous rotation pan, unobstructed 360-degree view and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. Daniel Chappell explains, “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available.” Advanced functionality Daniel Chappell adds, “This advanced functionality offers peace-of-mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras are now providing comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Integrated LED white light technology Adrian Kirk, Business Development Director at 360 Vision Technology, commented: “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks.” Adrian Kirk adds, “For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper and more defined colour images, even at night-time. We are proud to have delivered a practical Invictus TX based camera solution as part of the STC CCTV network upgrade.”
Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expanding the reach of learning for the community. Colleges' challenge Alamo’s challenges included leveraging technology to support its high standards of safety and security as a priority for its campuses. They were tackling a technology gap among users across the diverse landscape of the larger San Antonio area and also wanted to support an effective work-life balance by transitioning faculty and staff from desktop to mobile devices. Action taken To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms A long-time customer of Alcatel-Lucent Enterprise, Alamo Colleges has stayed focused on providing a secure, reliable, and accessible network for learning. To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms and Alcatel-Lucent OmniAccess® Stellar wireless networking across its campuses. They expanded the reach of the OmniAccess Stellar Access Points to develop Park and Learn, enabling students to connect and complete their studies from the parking lots without the need to physically be on campus. Alcatel-Lucent solution Security and safety are of the utmost concern, and Alamo has leveraged its Alcatel-Lucent OmniPCX® phone system to make emergency calls to Alamo Colleges dispatch, 911, and local Bear County authorities. They recently added the Alcatel-Lucent Visual Notification Assistant (VNA) solution, which can pick up a call from a user on a mobile device and provide their location, expediting response time. To manage all these systems, Alamo uses Alcatel-Lucent OmniVista® Network Management. With one view of all the networks, Alamo’s IT staff can monitor the network during the ongoing construction of centres and provide maintenance remotely across its far-reaching network. Products and solutions Alcatel-Lucent OmniPCX® Enterprise Alcatel-Lucent 8128 MIPT handsets Alcatel-Lucent OmniSwitch® 6900-X72-F Alcatel-Lucent OmniSwitch® 6960E-U28 Alcatel-Lucent OmniSwitch® 6860E-P48 Alcatel-Lucent OmniSwitch® 6450E-P48 Alcatel-Lucent OmniAccess® Stellar AP1101 Alcatel-Lucent OmniVista® 2500 Network Management System Alcatel-Lucent Visual Notification Assistant (VNA) Results obtained Technical benefits Delivers redundant, reliable networks and high data transfer rates with OmniSwitch layer 3 and chassis solutions. Provides consistent and complete Wi-Fi across campuses and parking lots with OmniAccess Stellar wireless network. Advanced phone system supports 911 calls and notifies college security and county authorities with Alcatel-Lucent VNA solution. Simplifies monitoring with a unified view of the network and visual maps showing the status of switches in all college facilities. Financial benefits Saves on recurring service costs with the ALE solutions. Network Management single view shows how many switches and how many ports are in use, which helps in decision-making. User experience benefits Provides messaging notification services, conferencing capabilities, and broadcast alerts during a crisis on campus with VNA connected with Rainbow™ by Alcatel-Lucent Enterprise. eSports' popularity with students is growing thanks to high-performance networks. “The Alcatel-Lucent Enterprise products are reliable and just work. What I like best about the partnership with Alcatel-Lucent Enterprise is they’re always there for us,” said Christopher Delgado, Senior Manager of Network Operations, at Alamo Colleges.
In Neuss, Düsseldorf, and Meerbusch, ISR (International School on the Rhine) offers an excellent international education from kindergarten to grade 12. The teachers at ISR prepare students for the world's most prestigious universities, placing great emphasis not only on academic excellence, but also on positive character development and the teaching of values. Since 2022, ISR has also been using the DeepHub whiteboard for this purpose. Test phase from 2022 "The modernisation of classrooms and the additional digitalisation of teaching methods are important concerns for us," explains Peter Soliman, Managing Partner of ISR, adding "Dahua's DeepHub whiteboard offers us versatile functionalities and the perfect solution for our needs." Mohammed Aloof, Head of IT at ISR, adds, "We have already deployed the DeepHub whiteboards in some classrooms since 2022. The feedback we have received from teachers and our students has been extremely positive. Therefore, we have decided to install a more modern whiteboard in every classroom for even better learning conditions." Improved visibility and interaction The new whiteboards have significantly improved the visibility of the learning content. Students can read the text on the screen very well from all angles of the classroom. And thanks to the optimised brightness of the screen, classrooms no longer need to be darkened. Whiteboard function "Being able to add handwritten information to documents on the whiteboard adds a lot of value for me," said Bianca McLeod, a Teacher at ISR and Head of Secondary Education. She adds, "The sensitivity here is just right. For example, I can also call up pre-made geometric shapes and use them for lessons. The whiteboard function allows me to save the pages afterward and call them up again at any time." DeepHub Bianca McLeod continues, "The students can save the learning content by scanning a QR code." She said, "Our teachers can also upload and use extensive materials and teaching aids on DeepHub, which is very practical and accommodates an increasingly paperless - and thus environmentally friendly - aspiration at ISR." Innovative and interactive teaching Classroom interaction is also further encouraged with the DeepHub. For example, teachers encourage students to participate directly via the whiteboard and answer the quiz displayed on the DeepHub screen. This two-way sharing system between DeepHub and the students' tablets is particularly practical and allows for innovative and interactive teaching. Benefits "After almost a year of experience with DeepHub, I have noticed a positive change in my teaching," Ms McLeod points out. She adds, "The students have become more engaged and even more proactive. We are convinced that further upgrading of the screens will bring even more benefits!" Administration work is simplified The Head of the IT department at ISR, Mr. Aloof, is also satisfied, "The Dahua DeepHub makes administration very easy." He adds, "A highly modern DeepHub device now replaces the old equipment, projector, speakers, microphone, countless cables, and much more. It makes the management work much easier." Clever all-in-one solution The DeepHub whiteboard ensures excellent presentation experiences and creative ideation by allowing participants to fully concentrate on the task at hand without having to worry about technical aspects. In doing so, its 4K 3840×2160 touch UHD display with a screen diagonal of 65 to 98 inches and a 178° viewing angle, combined with anti-glare technology, ensures a clear, more legible display, sharp images, and vivid colours. Interactive features In training situations and the classroom, knowledge can be conveyed intuitively and with fun One-touch projection from up to four terminals via the USB wireless screen sharing dongle or eshare software simplifies collaborative presentations. In training situations and the classroom, knowledge can be conveyed intuitively and with fun in this way. At the same time, as part of a quality control process, other teachers, as well as academic coordinators, have the opportunity to participate in lessons from any location with internet access, even if they are not on-site, thanks to the interactive features. High-quality, interactive touchscreen The touch-active screen supports an optimal writing experience: Smooth writing works virtually in real-time with less than ten ms latency. Responses to touch and support for simultaneous writing vary depending on the application. The integrated camera (up to 5MP) and up to eight microphones enable powerful video conferencing. Thanks to its high audio and video quality, the Dahua interactive whiteboard is also suitable for seminars, business negotiations, and training. Compatibility The integrated Android as well as an optional Windows operating system ensures full compatibility Of course, comprehensive compatibility is also taken care of: the pre-installed Android and an optional Windows operating system enable the use of a wide range of productivity tools. This makes perfect sense, as dual operating systems offer a wide range of apps and software. The device is also compatible with popular third-party video conferencing software. Its competitive price and a three-year warranty ensure a high return on investment. In addition, the integrated Android, as well as an optional Windows operating system ensure full compatibility with numerous teaching and learning programs. Conclusion "ISR has many Dahua products in use. In the past, our security system, but now also state-of-the-art interactive whiteboard technology in all classrooms. We are grateful for the support from a global leader in technology and IoT solutions," explains Peter Soliman. He concludes, "I am convinced that the new technology will add great value to ISR's students."
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Products
White papers
Connected video technology for safe cities
DownloadThe borderless control room
DownloadSecurity investments retailers should consider for their 2021 budget
DownloadMaking your surveillance cyber secure
DownloadHikvision DarkFighter Technology for high-quality images at night
DownloadEnhanced Ethernet Technology (ePoE)
DownloadVideos
Network monitoring: Manufacturers & Suppliers
- exacqVision Network monitoring
- Bosch Network monitoring
- Dahua Technology Network monitoring
- Honeywell Security Network monitoring
- Axis Communications Network monitoring
- Hikvision Network monitoring
- Vicon Network monitoring
- AMAG Network monitoring
- Video Storage Solutions Network monitoring
- LILIN Network monitoring
- Sony Network monitoring
- eneo Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- Eagle Eye Networks Network monitoring
- March Networks Network monitoring
- Messoa Network monitoring
- Hanwha Vision Network monitoring
- IndigoVision Network monitoring
- Surveon Network monitoring
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download