Network Video Recorders
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its systems and services are deployed and maintained to the highest available level of cybersecurity protections and protocols. As major news stories continue to proliferate about hacks, breaches and vulnerabilities — including the high-profile cyberattacks this past week that crippled CDK Global, which provides management software for t...
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, introduces its latest innovation: the 4 MP Panoramic Turret Camera, designed to elevate surveillance with its smart monitoring capabilities and flexible installation. It takes the functionality of two turret cameras and merges them into one effective, high-performance panoramic camera. “Our new 4MP Panoramic Turret...
Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, they will merge with the cloud-based video surveillance solutions provider, Arcules. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics and video surveillance as a service (VSaaS), providing a complete video technology offering. A vision for the future The VSaaS market is predicted to experience exponentia...
FLIR, part of Teledyne Technologies Incorporated, unveiled ADGiLE, a fixed-mounted methane monitoring solution. Featuring optical gas imaging (OGI) with comprehensive edge detection analytics, ADGiLE is the oil and gas industry’s solution to meeting environmental stewardship and efficiency goals. The system, featuring a pan-tilt gas imaging camera, edge computing device, connectivity, and FLIR United VMS software within a ruggedised package, can help companies address the ever-evolv...
Traffic monitoring systems are the silent sentinels of the roads, ensuring the safety and efficiency of the transportation networks. However, environmental challenges such as fog, heavy rain, dust storms, and even glare from the sun can hinder their effectiveness. Although standalone radar technology can operate in these environmental challenges, it lacks the ability to provide the detailed visual context which is so important for comprehensive traffic management. In this blog, they explore a...
The client is a renowned German global discount supermarket chain and ranks as the sixth largest grocery retailer in the UK, holding a 7.7 percent market share as of August 2023. Headquartered in Wimbledon, London, the company operates over 12,000 stores across every EU member state, as well as in Serbia, Switzerland, the United Kingdom, and the United States. With a large number of locations and diverse door access requirements, the client was facing challenges in managing visitor access acros...
News
By combining innovative radar, camera and software technologies, Navtech and Dallmeier Electronic now offer an integrated solution for optimised airside security at airports. By integrating the two systems, airport operators can achieve a very high level of objective security against a wide range of threat scenarios at a low total cost of ownership. Airside violations are a major security problem in air traffic. The scenario of possible threats ranges from disruptions of flight operations by activists to serious threats from terrorist activities. By integrating the innovative Navtech radar systems into Dallmeier’s Hemisphere® software suite, airport operators can now implement an optimal solution to improve airside security. Superior detection and “friend or foe” differentiation AdvanceGuard provides Hemisphere® users with the ability to create multiple virtual zones Navtech AdvanceGuard high-resolution sensors automate critical airside tasks such as general Perimeter Protection, Critical Part (CP) Line Monitoring, runway incursion detection, Surface Movement Radar (SMR) and Foreign Object Debris (FOD) detection. AdvanceGuard provides Hemisphere® users with the ability to create multiple virtual zones and alerts operators in advance, enabling proactive threat management. A “friend or foe” integration distinguishes between legitimate and non-legitimate activities, reducing false alarms and increasing operator confidence. The long-range 360° sensors cover large areas with minimal infrastructure, ensuring cost efficiency and effective deployment. Automatic tracking and effective event handling If one or more intruders are detected by the Navtech radar system, the system automatically controls connected Dallmeier or third-party cameras responsible for the area. Hemisphere® users can now conduct visual verification of the event and track the intruded persons or objects. Thanks to the bi-directional integration into the Dallmeier Hemisphere® software suite, users benefit from an extremely powerful workflow for handling alarms triggered by the Navtech system. Incidents can be managed from either of the systems. Maximum security performance, GDPR and NDAA compliance End users can rely on many years of experience of both casts providing keys in airport security The integrated solution of Navtech AdvanceGuard and the Dallmeier Hemisphere® software suite minimises the risk of human error and increases objective security by combining two superior technologies that complement each other perfectly. End users can rely on many years of experience of both companies providing solutions in airport security. With a high level of user-friendliness, excellent overview and high degree of automation, the integrated solution also requires comparatively low personnel costs. Both manufacturers follow the “Privacy and Security by Design” principles set out in the GDPR and are NDAA-compliant, ensuring maximum security against cyber-threats and compliance towards existing and upcoming legal regulations. Advanced camera and software systems “At a time when threats are constantly evolving, airside security is critical,” says Simon Mikuzis, Security Segment Leader of Navtech. “By combining our radar technology with Dallmeier’s advanced camera and software systems, we provide airport operators with a comprehensive solution that enables real-time threat analysis and management.” “We are pleased to partner with Navtech to offer our airport customers an even more comprehensive security solution,” says Karlheinz Biersack, Business Development Director Airports of Dallmeier electronic. “The integration of Navtech’s radar technology into the Dallmeier Hemisphere® software suite and our camera world marks a significant step in the development of integrated security solutions for airports. It emphasises the commitment of both companies to ensuring effective aviation security.”
The Monitoring Association (TMA), the non-profit trade association representing the professional monitoring industry, announced it has signed a multi-year managed services agreement with Mission Critical Partners (MCP) to power the growth of TMA’s Automated Secure Alarm Protocol (ASAP) Service. This award was made after a competitive procurement process. ASAP is the pioneer, standards-based service for the digital dispatch of alarm events to 911 centers. Since its introduction in 2011, ASAP has been helping public safety agencies reduce the time to dispatch first responders by an average of two minutes, enabling faster and more informed response for improved outcomes, saving lives and property. ASAP has the largest adoption rate in the industry, with over 80 percent of the alarm systems in the United States monitored by an alarm company connected to the ASAP Service. Next-generation solution TMA’s partnership with MCP will supercharge the rollout of the ASAP Service and drive the development of ASAP’s next-generation, cloud-based solution. The next-generation solution will allow for the real-time sharing of rich data, including camera video streams, live location, health information, photos, and interior blueprints, dramatically improving situational awareness for emergency responders. The ASAP Service, developed collaboratively with the Association of Public-Safety Communications Officials International (APCO), already enjoys widespread support across the 911 community. The solution is deployed in 911 centres in 23 states and the District of Columbia, covering a population exceeding 54.5 million. Vendor-neutral approach MCP is ideally suited for this initiative because of its subject-matter expertise and knowledge of the challenges According to TMA President - Steve Butkovich, MCP is ideally suited for this initiative because of its subject-matter expertise and knowledge of the challenges and opportunities in the 911 community. "MCP was chosen for its strong reputation throughout the 911 community and the trust it has earned by successfully completing thousands of projects in 911 centres nationwide," said Steve Butkovich, adding "Their team of professionals will bring unparalleled technological, operational, information technology, cybersecurity, and data-integration expertise, driven by a vendor-neutral approach, to this important initiative." Alarm notification processing "The ASAP service offers significant benefits to monitoring companies and 9-1-1 emergency communications centres by streamlining alarm notification processing," said Mel Maier, CEO and Executive Director of APCO International, adding "Automating alarm workflows through ASAP significantly reduces response times and manual intervention, ultimately enhancing public safety response." "TMA and MCP share a mission to improve emergency-response outcomes, which is why this collaboration makes perfect sense," said Darrin Reilly, MCP’s President and Chief Executive Officer, adding "We’re excited for the opportunity to help TMA expand the reach of its ASAP Service, and moreover, committed to the release of advanced features and functionality that will further enhance its performance and life-saving benefits."
MOBOTIX ONE is an extremely robust and maintenance-free video system 'Made in Germany' that impresses with both its application-oriented design and its high-quality components: fiberglass-reinforced, saltwater-resistant housing allows use in the harshest environments, strong processors and image sensors ensure excellent image quality. In addition, cyber-secure firmware developed by MOBOTIX with integrated AI video analysis tools for intelligent, video-based perimeter protection and object detection at the highest level. In addition to its unique design, the camera series also impresses with its enormous performance and connectivity. AI- and deep learning-based apps open up process-optimised workflows in industry or production, but also in the care sector or the transport sector, for example. MOBOTIX Image Engine MOBOTIX ONE delivers sharp and clear image quality around the clock, indoors or outdoors Thanks to its high-resolution image sensor and application-optimised MOBOTIX Image Engine, the MOBOTIX ONE delivers sharp and clear image quality around the clock, indoors or outdoors. Intelligent continuous recording switches to maximum resolution and frame rate on an event-driven basis, and the cameras feature a powerful 120 dB Wide Dynamic Range (WDR) and improved low-light performance with outstanding image quality even in very poorly lit environments. "With the secure and robust, yet intelligent and flexible MOBOTIX ONE camera platform, we have created a stable basis that can be expanded with the already installed MOBOTIX ActivitySensor ONE app, but also with other AI-based video analysis apps that are already in development, to create an unsurpassed security and process optimisation system for defined solutions," explains MOBOTIX CTO Christian Cabirol. Digital industrial espionage MOBOTIX is focusing on selective, sensitive and critical infrastructures and verticals, as these niche markets offer significant market potential. Focus industries include healthcare, industry/utilities, the public sector and transportation. "Customers in these sectors are already aware of the dangers that digital industrial espionage or hybrid attacks can cause and are willing to invest in reliable and trustworthy systems to ensure the greatest possible security and optimisation of processes and workflows," emphasises Thomas Lausten, CEO of MOBOTIX AG. Introducing the new MOBOTIX ActivitySensor MOBOTIX ActivitySensor ONE is especially suited for perimeter protection and intrusion detection The new MOBOTIX ActivitySensor ONE, available with the MOBOTIX ONE camera, offers features perfect for security and surveillance. Using AI-based object detection, the sensor can reliably identify and track the movement of people and vehicles, including cars, trucks, buses, motorbikes, and bicycles. But stationary objects are also detected. The MOBOTIX ActivitySensor ONE is especially suited for perimeter protection and intrusion detection, overcoming the limitations of traditional video motion-based image analysis tools. This significantly reduces false alarms and increases detection accuracy of relevant objects and movements strongly. The sensor can be activated in specific areas within the camera's view and works both indoors and outdoors, day and night. It is very easy to use, making it a dependable and user-friendly solution for various security needs as well as for workflow and process optimisation in the industrial, production, healthcare and logistics sectors. With the wholly-owned MOBOTIX subsidiary Vaxtor, the company also has market-pioneering app development expertise that can develop solutions for a wide range of future challenges. One camera, two options: MOBOTIX ONE M1A-S One model is equipped with fixed focal length lenses, the second variant with motorised varifocal lenses The MOBOTIX ONE M1A-S camera model marks the launch of the new platform. One model is equipped with fixed focal length lenses, the second variant with motorised varifocal lenses. With the varifocal lens, the user can easily adjust the optimum image angle for their security camera remotely via the camera software, depending on the planned installation position. The integrated on-board analytics with the MOBOTIX ActivitySensor ONE, which is based on deep learning, ensures reliable detection of relevant objects and movements. Both variations have an internal DVR that supports up to 1 TB of storage, eliminating the need for extra recording software or NVRs. Both variations also will mount on existing M16/M26 brackets, allowing for a more cost-effective upgrade from Mx6. MOBOTIX Management Centre MOBOTIX ONE variations also have high-quality audio capabilities with integrated bidirectional and lip-synchronised audio that requires no additional accessories. MOBOTIX ONE is built to last with a 5-year warranty and a high MTBF (Mean Time Before Failure) value of over 10 years. The cameras also have free lifetime software updates and use the MOBOTIX Management Centre, which is free of charge. These features ensure the camera will be useful and sustainable for a long time.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced a new partnership with Access Technology & Integration (AT&I) Systems, an end-to-end systems integrator, to protect U.S. schools and other organisations against gun-related threats. AT&I leverages cloud and AI technology to provide security solutions that grow with an organisation, including access control, gate entry, burglar alarms, video surveillance, licence plate recognition, and visitor management systems. The partnership with ZeroEyes addresses a critical and growing concern by identifying illegally brandished firearms in real time to enhance public safety and mitigate gun-related violence. ZeroEyes’ cutting-edge features “ZeroEyes’ cutting-edge features and 24/7 manned operations centre with human verification is a critical addition to our offerings, enhancing the security measures available to organisations against gun-related violence,” said Brett Weinberg, Director of Business Development at Access Technology & Integration Systems. “We are excited to provide our current and future clients with a solution that upholds the standards of the Department of Homeland Security.” ZeroEyes Operations Centre ZeroEyes' AI gun detection and intelligent situational awareness software layers onto digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to law enforcement and local staff as quickly as three to five seconds from detection. ZeroEyes’ stellar reputation “We look forward to working with AT&I to protect its extensive customer base against gun-related violence,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “With more than 18 years of experience, AT&I has the expertise and ability to uphold ZeroEyes’ stellar reputation and customer satisfaction.” AT&I now offers ZeroEyes’ best-in-class AI gun detection and situational awareness software to educational systems, commercial enterprises, government agencies, and healthcare providers across Florida, Georgia, Maryland, Nevada, New Mexico, New York, Texas, and more.
i-PRO Co., Ltd., a global pioneer in professional security solutions for surveillance and public safety, announced its new AI-enabled Corner Camera. Built-in Japan for the rigours of high-security facilities, this exceptionally compact and robust stainless steel camera represents the smallest form factor, which is IK11 compliant. Its ability to withstand a 70 Joule (70J) impact far exceeds the common IK10 (20J) impact ratings of similar devices. "The i-PRO Corner Camera represents a new standard for high-security environments, providing unmatched reliability and advanced AI-powered analytics all within the most compact form factor," said Gerard Figols, Chief Product Officer at i-PRO, adding "With its IK11+ 70J rating, it is clearly the most shock-resistant corner mount surveillance camera in the industry today." i-PRO Corner Camera The sensor provides a ±5° yaw adjustment and a ±5° tilt to further conform to installation requirements The camera’s wide-angle view (131° horizontal, 95° vertical) limits blind spots, providing full room coverage. The sensor provides a ±5° yaw adjustment and a ±5° tilt to further conform to installation requirements. An invisible IR-LED illuminates up to 15 metres using a 940nm wavelength. While the stainless steel body exceeds an equivalent IK11+ impact rating, any attempt to tamper with the camera, from impacts to opening the case, instantly sends an alarm to operators. With a dynamic range of 132 dB The i-PRO Corner Camera measures just 197x139x126 mm (7.76x5.47x4.96 inches). With a dynamic range of 132 dB, images remain clear in a variety of lighting conditions. "The engineers at i-PRO have done it again. When you factor in the additional licence-free AI applications, it’s truly an industry-renowned camera," said Gerard Figols. The camera’s all-important anti-ligature design prevents self-harm incidents, while minimising any attempt to remove the camera by force. Powerful AI-assisted edge analytics The corner camera supports up to three free i-PRO AI applications simultaneously, such as AI Video Motion Detection, Privacy Guard, and People Detection. To protect privacy, i-PRO’s AI Privacy Guard feature can automatically blur faces or entire bodies, creating a redacted stream. A built-in microphone facilitates AI-based sound detection of loud noise, screaming, glass breaks, and more. Cybersecurity For enhanced cybersecurity, the vandal-proof camera includes a secure boot feature and complies with the FIPS 140-2 level 3 standard. The new corner camera is expected to be available in September 2024 from i-PRO’s extensive global network of resellers.
SAGE Integration Holdings LLC welcomes Katie Krug to their team of security professionals as their Senior Account Executive. Katie Krug has joined SAGE Integration as a Senior Account Executive, bringing over 18 years of extensive experience in sales, marketing, and business development across various industries. Prior roles of Katie Katie led the charge of improving brand visibility and grasp via clever trade plans During her tenure as the AIoT Director at EPIC iO, Katie led the charge of enhancing brand visibility and awareness through innovative marketing strategies, successfully expanding the company's reach into new verticals. Her role involved generating sales prospects using value-based selling and the MEDDIC methodology and developing strategic marketing initiatives for enterprise clients. Addition to the SAGE Integration team Previously, Katie worked at Scylla AI, BodyViz, and Verizon Wireless, where she worked in sales, marketing, and business development, continuously demonstrating her expertise in driving revenue and customer satisfaction. Her diverse background and proven track record of success make her a valuable addition to the SAGE Integration team. "We are confident that Katie's expertise and leadership will contribute significantly to Sage Integration's continued growth and success," John Nemerofsky, Chief Operating Officer.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialogue and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organisation so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organisation. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognise and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of the machine and deep learning algorithms to recognise or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the colour of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours Analytics, on the other hand, refers to the process of analysing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviours. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behaviour. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognise. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behaviour information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilised. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organisation. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realise that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the colour of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognise something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognise unique, customisable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organisation might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognise that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Case studies
Omnilert, a pioneer in active shooter solutions, announced that it has integrated Omnilert Gun Detect with the Hanwha Vision Wisenet WAVE video management software (VMS) to provide a complete solution for gun violence and active shooters that can help save lives in the event a gunman comes onto a customers' facilities. Wisenet WAVE VMS is a software platform for IP video surveillance applications that detects, streams, records, and analyses live video from connected IP cameras and networked video sources. By integrating with Omnilert Gun Detect, the Wisenet WAVE platform now has the ability to rapidly respond to detected weapons in a fraction of a second, and once verified, activate a complete and robust response that could include locking doors, notifying police, sending alerts and providing situational intelligence throughout the entire event. Integration of Omnilert Gun Detect The Gun Detect events can trigger operations within WAVE such as sending notifications The Omnilert Gun Detect integration enables selectable bookmarking and/or event triggering in response to a gun detection within Wisenet WAVE VMS. The Gun Detect events can trigger operations within WAVE such as sending notifications and displaying on the Alarm layout. "The integration of Omnilert Gun Detect with Wisenet Wave VMS will bolster the security we can provide our joint customers to protect against the growing threat of active shooters and gun violence, which is at an all-time high in the U.S.," said Nick Gustavsson, CTO and Co-Founder at Omnilert. "This means that video feeds already being managed in the WAVE platform can now be monitored 24/7 for weapons, allowing for a proactive response before shots are fired." Integration into Wisenet WAVE Omnilert Gun Detect's end-to-end workflow of detection and activation allows for automatic initiation "Omnilert's gun detection platform provides especially strong gun detection analytics as well as one of the most flexible and powerful alerting systems on the market," said Mark Heintzman, Technical Partnership Manager at Hanwha. Omnilert Gun Detect's end-to-end workflow of detection, activation, and notification allows for an automated initiation of an organisation's active shooter response, with 24/7 monitoring and local first responder escalation, integrated notification, and integration into Wisenet WAVE. Omnilert's active shooter solution The integration enables selectable bookmarking and/or event triggering in response to gun detection within Wisenet WAVE. The Gun Detect events can trigger multiple operations within WAVE such as sending notifications and displaying on the Alarm layout. Additionally, Omnilert will automatically configure the camera setup, including IP address, camera name and location, which will help speed the deployment of Omnilert's active shooter solution.
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
Dahua Technology Indonesia has donated a Dahua DeepHub Smart Interactive Board to the Faculty of Economics and Business (FEB) at Universitas Gadjah Mada (UGM), demonstrating the company’s commitment to supporting the advancement of education in Indonesia. The Country Director of Dahua Technology Indonesia, Royce Ouyang, expressed his gratitude for this charitable opportunity during the handover event held at the Alumni Hall of FEB UGM on March 14. Royce Ouyang said, "We are pleased to contribute to the development of education in Indonesia. We hope this 75” Dahua DeepHub Smart Interactive Whiteboard can enhance students' learning experience, enabling them to be more interactive and innovative in class and be in line with the latest developments abroad." Artillery of sophisticated features The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device. Its package includes the smart interactive whiteboard, plug-in USB camera, 11th generation i5 processor 8GB+256GB, activated Windows 11 Pro, as well as a mobile stand and wireless screen sharing cable. This intelligent device is equipped with an artillery of sophisticated features, including a 4K screen, eight quick access buttons, fast charging, fast file sharing, the ability to switch between Android and Windows, a high-resolution camera, wireless screen sharing with various devices, and other advanced functions that enable smoother and more collaborative interaction in the classroom. Dahua DeepHub Smart Interactive Whiteboard The Dean of FEB UGM, Prof. Dr. Didi Achjari, M.Com., Ak., CA, expressed his appreciation for the generous donation, stating that the device will not only bring a more collaborative learning experience for their students, but also support various educational activities, research, and community service at FEB UGM. "We are committed to utilising it as best as possible to improve the quality of education in our environment," he said. "The support of advanced devices such as the Dahua DeepHub Smart Interactive Whiteboard facilitates FEB's academic community in adopting innovative teaching methods. Thus, it can improve student absorption and prepare them to face future challenges," said Gumilang Aryo Sahadewo, SE., M.A., Ph.D., Vice Dean of FEB UGM. He also stated that the use of the Dahua DeepHub Smart Interactive Whiteboard is expected to enhance the interaction between lecturers and students and facilitate collaboration in the learning process. Industrial sector and education In addition, this equipment can also support the development of innovative and technology-oriented curricula. "With this equipment, we hope that FEB UGM can continue to strengthen its existence as a pioneering educational centre that innovates and is competitive," he added. With the donation of Dahua DeepHub Smart Interactive Whiteboard to FEB Universitas Gadjah Mada, Dahua took a positive step towards strengthening the relationship between the industrial sector and education, empowering the youth of now and enabling a smarter society and better living.
Founded in 1913, the family-owned company CLAAS is one of the world's renowned manufacturers of agricultural machinery. Headquartered in Harsewinkel, Westphalia, the company is the European market pioneer in combine harvesters. CLAAS is the sole world market pioneer in the major product group of self-propelled forage harvesters, as well as pioneering in agricultural technology with tractors, agricultural balers and grassland harvesting machines. The product range also includes state-of-the-art agricultural information technology. CLAAS employs over 12,000 people worldwide and achieved a turnover of 6.1 billion euros in the 2023 financial year. Drivers of business success Customer service, therefore, focuses on the rapid availability of spare parts Innovative strength and the close integration of customer feedback in development are important drivers of business success. In addition to the reliability, productivity, efficiency and performance of the products, the development focus is also on low maintenance and low wear costs, as well as long-term value retention and an exceptionally long product life. During the harvest season, the machines are used intensively, and harvest interruptions due to breakdowns are particularly critical. Customer service, therefore, focuses on the rapid availability of spare parts. Intelligent video analysis system The CLAAS Parts Logistics Centre in Hamm-Uentrop has been supplying CLAAS customers worldwide with spare parts since 1999. From the highly automated logistics centre, which operates 365 days a year, 24 hours a day, CLAAS supplies customers with high-quality spare parts for agricultural machinery in the fastest possible way-by air freight, truck or cab. To secure the logistics centre, an innovative video surveillance solution was required to prevent and investigate crimes such as unauthorised entry into the premises or building areas. In addition, movements in all relevant security areas and the logistics centre's processes were to be extensively documented. Uniform security system A uniform security system was required, which could be used to analyse alarms from different areas and coordinate follow-up measures, as well as an intelligent video analysis system that reliably reports unauthorised movements in security areas with a low false alarm rate. Of course, data protection and the concerns of the works council had to be respected. Integration of scan data The requirements were implemented with the help of a Geutebrück system The requirements were implemented with the help of a Geutebrück system. Together with system integrator Hermann Einberger GmbH, Geutebrück designed and implemented a solution that comprehensively meets all current requirements and is open to future expansion. It allows the integration of scan data from deliveries for detailed process documentation and optimisation for example, as well as automated access control using licence plate recognition. Networking the site with other CLAAS sites for centralised operation and administration from the CLAAS headquarters in Harsewinkel is also an option. Cooperation with Einberger Christian Vogt, Vice President Group Security CLAAS, said: "It wasn't just the technology that convinced us. The good customer service and close cooperation with Einberger and the direct contact with the manufacturer Geutebrück guarantee us the best possible support even now, after the installation, during operation." Christian Vogt adds, "Whether questions from our operators, support for our administrators, ideas for the extended application or individual requests: we feel that these two companies really care about their customers. They are true family businesses, just like us."
i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety, announced that the Arkansas Department of Corrections (DOC) has chosen to modernise its surveillance camera system with i-PRO network cameras and recorders. More than 4,000 cameras help the Arkansas DOC oversee 17,000 inmates and 32 facilities. Working closely with system integrator Progressive Technologies, The Arkansas DOC has already replaced approximately 60% of their analog cameras with a mix of high-resolution i-PRO multi-sensor, fisheye, PTZ, bullet, dome, and compact dome cameras, and modernised their NVRs with i-PRO NX and NU recorders. Resolution, reliability, and cybersecurity Reliability is also a must-have for the DOC in an environment hostile to technology Arkansas DOC Containment and Surveillance Coordinator Drake Palmer talked about the impact of moving from analog to high-resolution digital cameras. “It’s like night and day. 4K is what allows us to see if someone’s handing an inmate a pen or a shank. We went from having blurry images to complete clarity. From a narrow field of view to a wide field of view. There are a hundred different things that these cameras have made easier and safer for inmates and staff.” Reliability is also a must-have for the DOC in an environment hostile to technology. Cybersecurity is also a key concern, which is why they replaced existing IP cameras that lacked cybersecurity features at a facility they took over. At that site, Palmer brought in the easy-to-install i-PRO NU all-in-one recorder, took out the low-end cameras and recorder, deployed i-PRO cameras and the NU recorder and had everything up and running in 10 minutes. Exploring video analytics At each of the DOC’s facilities, an officer monitors the video surveillance system on site. But with as many as 800 cameras on some sites, it’s impossible for one person to watch them all. Palmer anticipates taking advantage of i-PRO’s video analytics in the future to help with that. He is also exploring using line-crossing analytics to phase out the legacy microwave solution in place to surveil the facilities’ perimeters and identify/prevent contraband drops. Licence plate recognition is also of interest to Palmer as a way to identify vehicles of interest that frequent the facilities. As the Arkansas DOC continues to modernise its surveillance system in phases, Palmer says, “We’ll be able to move gradually from reactive to proactive use of our camera system.”
Burger King is a global chain of fast-food restaurants, founded in 1954 in Miami, Florida. It has since expanded into one of the world’s largest fast-food chains, with thousands of locations spanning over 100 countries. The company is known for its commitment to quality ingredients, innovative menu items, and iconic marketing campaigns. With a steadfast focus on continual improvement and innovation, Burger King remains at the forefront of ensuring a secure dining experience for its customers across its global network of restaurants. The company prioritises robust security measures within its restaurants. Challenge Integrate security system and video surveillance across all Burger King branches in Norway. Burger King, like many fast-food businesses, uses security systems and video surveillance to keep their property safe from theft, vandalism, and unauthorised access. This creates an atmosphere where staff and customers feel safe and comfortable. The main aim was to safeguard the buildings, equipment, employees, and customers while causing as little disturbance to the operation of the chain’s restaurants as possible. Solution Wireless security system with easy-to-use mobile management and flexible access control, ensuring seamless integration into daily operations. Hub 2 Plus Jeweller control panel Hub 2 Plus Jeweller control panel supports a great number of security devices and user groups AlarmLink Oslo AS is a security installation company that operates throughout the entire country. The installer has recommended Ajax devices as a professional solution that meets the most stringent security standards. Each restaurant was equipped with a Hub 2 Plus Jeweller control panel. This model supports a great number of security devices and user groups. Ajax Cloud It is crucial for further scaling, as it allows for accommodating expanding security needs without major infrastructure changes. With four communication channels and LTE support, the hub can be connected to two separate Internet providers over Ethernet and Wi-Fi while having two cellular services ready for backup. It guarantees connectivity to Ajax Cloud and the central monitoring station under any conditions. Motion and opening detectors control all possible entries into the building, protecting against intrusion and burglary KeyPad Jeweller Ajax solutions are designed for ease of use. Through the app, restaurant executives with admin rights can manage the security system directly from their smartphones. They receive immediate notifications when someone enters restricted areas, as KeyPad Jeweller is installed at the service premises entrance. Ajax app Restaurant staff smoothly integrated Ajax devices into their routine, using the Ajax app as the primary interface for the system. Managers arm the system when they leave and disarm it upon arrival. They can efficiently control access to restricted areas and receive real-time notifications for any security breaches. This integration not only ensures smooth restaurant operations but also enhances premises security and monitoring at all times. Seamless integration With Ajax technologies, the restaurant chain effortlessly eliminated the need for costly new installations All suggested features were seamlessly integrated with Burger King’s existing video surveillance system because third-party cameras can be easily added to the Ajax app. With Ajax technologies, the restaurant chain effortlessly eliminated the need for costly new installations. This straightforward integration not only enhanced security measures but also saved the company money. Sleek and modern look Additionally, Ajax devices are visually appealing and seamlessly fit into the interior. Ajax Systems offers security solutions that not only keep things safe but also blend in nicely with any environment. Therefore, the sleek and modern look of Ajax products contributes to a welcoming and safe dining experience for customers. Why Ajax Cost savings on installation: In certain countries, such as Norway, installing security devices can be expensive due to taxes and other related costs. Ajax reduced this expense item by half. The devices are ready to use out of the box, easy to install, and can be added to the system by scanning a QR code. Seamless integration with existing security system: Ajax’s partners, specialists from AlarmLink Oslo AS, took a balanced approach and effectively integrated the existing video surveillance system with the Ajax security system. Easy system management: Ajax solutions are excellent for chain companies, as they streamline the application of security features across all locations. Staff can quickly learn to use the system, which is especially important for businesses with high employee turnover rates. Products Hub 2 Plus Jeweller: Security system control panel DoorProtect Jeweller: Wireless opening detector MotionProtect Jeweller: Wireless motion detector KeyPad Jeweller: Wireless wall-mounted keypad MotionCam Jeweller: Motion detector with a photo camera to verify alarms
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
Cloud implementations enable organisations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in the world. But on-premise video management systems (VMSs) still have a role to play, don’t they? We asked this week’s Expert Panel Roundtable: What is the continuing role of video management systems (VMS), given the growth in Video Surveillance as a Service (VSaaS)?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Improving city mobility using connected video technology](https://www.sourcesecurity.com/img/white-papers/612/safe-city-3-920x533.jpg)
Improving city mobility using connected video technology
Download![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![Choosing the right storage technology for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/security-storage-data-920.jpg)
Choosing the right storage technology for video surveillance
Download![Video surveillance as a service: Why are video management systems migrating to the Cloud?](https://www.sourcesecurity.com/img/white-papers/612/vsaas-920.jpg)
Video surveillance as a service: Why are video management systems migrating to the Cloud?
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![The borderless control room](https://www.sourcesecurity.com/img/white-papers/612/borderless-control-room-920.jpg)
The borderless control room
Download![Wireless Access Control eBook](https://www.sourcesecurity.com/img/white-papers/612/wireless-access-control-ebook-920.jpg)
Wireless Access Control eBook
Download![Six things to look for when adding AI cameras to your operation](https://www.sourcesecurity.com/img/white-papers/612/hanwha-pic.jpg)
Six things to look for when adding AI cameras to your operation
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Security investments retailers should consider for their 2021 budget](https://www.sourcesecurity.com/img/white-papers/612/retail-security-investments-for-2021-budget-920_1603476210.jpg)
Security investments retailers should consider for their 2021 budget
Download![Enhanced Ethernet Technology (ePoE)](https://www.sourcesecurity.com/img/white-papers/612/Dahua-ePoE-620x360.jpg)
Enhanced Ethernet Technology (ePoE)
Download![IP in a box: The advantages of embedded network video recorders](https://www.sourcesecurity.com/img/white-papers/612/network-video-620x360.jpg)
IP in a box: The advantages of embedded network video recorders
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Network Video Recorders: Manufacturers & Suppliers
- Hikvision Network Video Recorders
- exacqVision Network Video Recorders
- Dahua Technology Network Video Recorders
- ADPRO Network Video Recorders
- Vicon Network Video Recorders
- Hanwha Vision Network Video Recorders
- Axis Communications Network Video Recorders
- Avigilon Network Video Recorders
- LILIN Network Video Recorders
- MOBOTIX Network Video Recorders
- Illustra Network Video Recorders
- Bosch Network Video Recorders
- AV Costar Network Video Recorders
- Milestone Network Video Recorders
- IDIS Network Video Recorders
- BCDVideo Network Video Recorders
- March Networks Network Video Recorders
- Speco Technologies Network Video Recorders
- Video Storage Solutions Network Video Recorders
- Surveon Network Video Recorders