Network Video Recorders
Under the motto “Navigating Tomorrow”, MOBOTIX partners participated in this year's MOBOTIX Partner Conference in Langmeil, Rhineland-Palatinate. It was an impressive industry meeting at which MOBOTIX partners were able to discuss trends and developments in video technology and get to know the latest MOBOTIX solutions, in some cases even before they were launched on the market. European and international partners The MPC for the Latin American market had already taken place in Ca...
Matrix reinforced its position as a key player in the IT sector with a strong presence at the CMDA B2B IT Expo 2025, held in Pune. The event, a pivotal platform for IT industry pioneers, showcased cutting-edge innovations, fostering collaboration and growth in the ever-evolving technology landscape. Showcasing IT-centric Innovations At the expo, Matrix exhibited its Enterprise-Grade Security and Telecom Solutions, designed to meet the evolving demands of businesses and government entities. Fr...
IDIS Americas has confirmed the appointment of Darron Parker as Vice President of Sales, Northeast US & Canada, one of a series of recent appointments as the company continues to enlarge its team as part of an ambitious growth strategy. IDIS Americas has been expanding its operations across North America, following a restructuring last year, with a strengthening presence in key security verticals, including transit, retail, education, logistics, critical infrastructure, traffic (ITS), and s...
Matrix made a strong impact at the FSAI Project Heads, Architects & Consultants Conclave (PACC) 2025, held at ITC Grand Chola, Chennai, from February 6-9. This major event brought together 750+ industry pioneers, including Smart City CEOs, government officials, architects, and security experts, to discuss the future of security solutions. Latest security solutions PACC 2025 provided Matrix with a significant platform to showcase its latest security solutions PACC 2025 provided Matrix wit...
Matrix, a pioneering OEM in Security and Telecom solutions, is excited to announce its participation in the 12th edition of IBEX India 2025, scheduled for February 13-14 at Jio World Convention Centre, BKC, Mumbai. IBEX INDIA is a premier trade fair and conference connecting the BFSI Tech and Fintech sectors with cutting-edge banking technologies, where Matrix will showcase its advanced security solutions tailored for the banking sector, ensuring robust surveillance and access control for a sec...
As organisations navigate an increasingly complex threat landscape, security pioneers are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intellig...
News
Skills for Security is proud to announce strategic partnerships with Videcon, Eagle Eye Networks, and Paxton Access Control to enhance training opportunities for its apprentices. The three new partnerships with the UK’s pioneering provider of fire and security training and apprenticeships will enable a wider scope for hands-on experience with advanced security technologies. Modern security landscape By collaborating with these industry pioneers, Skills for Security is integrating real-world applications into its courses and curriculums. Apprentices will gain new insights into AI-driven surveillance, cloud-based access control, and smart security solutions, equipping them with the knowledge and skills required for the modern security landscape. David Scott, Managing Director of Skills for Security, stated, “As the fire and security industry evolves, it is essential our training reflects the latest advancements. Our partnerships with Videcon, Eagle Eye Networks, and Paxton allow apprentices to gain invaluable, hands-on experience with innovative security systems, ensuring they are well-prepared for real-life integration operations.” Modern security solutions Videcon’s expertise in video surveillance, intrusion and access control, including the renowned brand Concept Pro Videcon’s expertise in video surveillance, intrusion and access control, including the renowned brand Concept Pro. Offers apprentice's active experience with top-tier cameras, recorders, and market-pioneering AI technology. Featuring high-resolution imaging, night vision, and intuitive interfaces, these technologies enhance apprentices' understanding of modern security solutions for improving threat detection and active prevention in residential and commercial settings. Future-proof security solutions Eagle Eye Networks equips learners with a comprehensive understanding of cloud video surveillance, the fastest-growing segment of the security industry. In this hands-on training, apprentices will understand the basics of cloud technology, AI-powered analytics, and secure remote video management. They’ll also discover why an open, cloud-based Video Management System (VMS) that easily integrates with third-party technologies is the key to scalable, future-proof security solutions. Skills for Security’s commitment Paxton provides in-depth training on future-proof access control, demonstrating seamless security Paxton provides in-depth training on future-proof access control, demonstrating seamless security integration for businesses and institutions. Learners will gain hands-on experience with smartphone-based access via Bluetooth and NFC, as well as integration with cameras, alarms, and building management systems—preparing them to implement scalable, intelligent security solutions. These partnerships highlight Skills for Security’s commitment to providing high-quality training that aligns with industry needs. By working alongside pioneering technology providers, the organisation ensures that apprentices receive up-to-date, practical training, making them valuable assets to employers. Latest technologies and practices David Scott concluded, “Our mission is to ensure our apprentices continue to receive training that goes beyond theory, integrating the latest technologies and practices to meet industry demands." "Forming such strong strategic partnerships with innovative brands allows us to remain at the forefront of apprentice development, equipping them with the tools and knowledge needed to thrive in a dynamic and ever-evolving security landscape.”
Video security systems have become a critical asset across industries, with pioneers confident in their systems’ resilience against cyber threats. Research from Hanwha Vision Europe shows that more than nine in 10 security and IT managers in the UK, France, Germany, Spain, and Italy believe their video systems are well-protected. Security practices Overall, confidence is high across different organisation sizes, countries, and sectors. In Italy, confidence reaches 97%, while Spain, albeit still high, has a lower confidence level at 83%. Sectors such as finance boast a nearly universal confidence level of 99%, with data centres at a more modest 80%. Given the lack of adequate security practices implemented by organisations, finds the research, this confidence may be misplaced. While 92% of IT and security managers believe their video systems are highly secure against cybercrime, just 23% implement basic video security measures. Cause for concern Best practices that align and comply with these regulations and improve cyber-resilience overall Indeed, the research found that respondents also display a worrying lack of awareness of relevant cybersecurity legislation such as the Network and Information Security Directive 2nd edition (NIS2), which came into effect in October 2024, and the Cyber Resilience Act (CRA). Best practices that align and comply with these regulations and improve cyber-resilience overall are also not being regularly implemented, finds the research. Baseline for cybersecurity Fewer than half (47%) of respondents are familiar with NIS2 and only 23% are aware of the CRA. Larger organisations do show slightly higher awareness at 45% on average, but this is still low given the rise in cyber-attacks on businesses in 2024 - hitting an annual high of 1,876 per week in Q3 of 2024. Simple yet essential measures including changing default passwords and updating firmware, a baseline for cybersecurity are overlooked or forgotten by many, leaving systems vulnerable to more easily preventable attacks. Cyber-resilient cultures needed Fostering a resilient culture alongside implementing fundamental steps such as securing physical access to network devices, implementing 802.1x certificate-based access, and creating least-privilege user accounts, are paramount to ensuring cyber-secure video surveillance. Research indicates that many companies aren’t widely promoting best practices across their workforce Security and operations teams must understand their roles in protecting video systems against attack. However, the research indicates that many companies aren’t widely promoting best practices across their workforces pioneering to vulnerabilities. Small businesses are particularly vulnerable, with only 17% implementing these security measures, compared to four in 10 (41%) larger enterprises. This is particularly concerning given that many businesses do not survive the financial impact of a cyber-attack. Keep secure - act now The good news is that the weaknesses uncovered by Hanwha Vision’s research can be quickly rectified with some immediate actions. Audit the system to identify the weak spots. Implement current cybersecurity best practices such as creating user-level accounts with the least privileges required and securing physical access to network devices. It can be worth consulting with a video cybersecurity expert to assess the specific video surveillance ecosystem and practices to implement. Schedule regular security assessments and remain updated with the evolving threat and regulatory landscape. Disseminate information across the workforce with regular knowledge refreshers. Work with reputable manufacturers and installers who prioritise cybersecurity in their video systems. By prioritising a few critical actions, organisations can strengthen their video security systems, better protect sensitive data, and improve overall cyber resilience. Finally, bridging the gap between the confidence that security and IT pioneers feel today and the reality of their current practices.
Alfred International, a pioneer in smart lock technology and a subsidiary of GHT Door Hardware announces a new integration with Universal Remote Control (URC), a global pioneer in smart automation and control solutions. This partnership leverages the Z-Wave® protocol to deliver seamless connectivity between Alfred smart locks and URC’s Total Control® system, providing integrators and end users with advanced, unified access and security management. URC TRF-ZW10 The integration allows URC dealers to incorporate all Z-Wave-enabled Alfred smart locks into URC Total Control installations with ease by using URC software, offering homeowners streamlined control over access points as part of a holistic smart home or building automation system. The URC TRF-ZW10 acts as the central Z-Wave hub, allowing devices like Alfred’s smart locks to communicate with Total Control for automated locking, remote monitoring, and seamless scene integration. The result is an elevated experience that prioritises security, convenience, and peace of mind. Smart access and security “Connected, smart access and security are strategic priorities for URC, so our integration with Alfred smart locks, via Z-Wave protocol, is very important to our dealer community,” stated Lars Granoe, URC’s VP of Product. “We look to expand our relationship with Alfred to deliver simple, fast integration for our dealers and peace of mind for home and commercial building owners.” Simplicity and reliability This integration delivers a scalable solution for modern environments, offering enhanced security The collaboration emphasises simplicity and reliability, enabling seamless operation across residential and commercial spaces. By combining Alfred’s sleek, technologically advanced smart locks with URC’s robust automation platform, this integration delivers a scalable solution for modern environments, offering enhanced security and automation possibilities. ZWLR connectivity and wireless charging Alfred’s Z-Wave compatible smart locks, including the DB2S and ML2 models, provide a range of advanced features such as Z-Wave Long Range (ZWLR) connectivity and wireless charging capabilities. These locks integrate with the TRF-ZW10 gateway by using URC software, ensuring reliable communication and responsive control within the Total Control ecosystem. Innovative and connected living solutions “We’re excited to partner with URC to provide a best-in-class integration experience,” said Brad Cook, Head of Product Integration at Alfred International. “This collaboration reflects Alfred’s commitment to enabling secure, innovative, and connected living solutions through partnerships with industry leaders like URC, and we look forward to enabling deeper integrations with URC in the future.”
System Surveyor introduced Boundaries, a new feature of its system design software for physical security and IoT devices. System Surveyor Boundaries allow users to visually show the precise area of coverage of a device, such as a video surveillance camera or motion detector on a floor plan or map considering obstructions such as walls, poles, or other limitations to the device’s reach. Accurate and easily legible system designs Whether visualising the true view of a device and blind spots for stakeholders during an initial site survey or noting problematic coverage areas on system designs for proposals, System Surveyor Boundaries gives integrators the tools they need to deliver accurate, professional, and easily legible system designs. “System Surveyor Boundaries is a game-changer for our integrator, corporate, and campus customers,” said CEO Chris Hugman. Easy-to-use tool “With this powerful, easy-to-use tool, we’re giving users the ability to visualise the effect of walls, obstacles, and other coverage limitations on a host of critical devices including video surveillance cameras, motion detectors, wifi access points, gunshot detection, sensors and more." "They can easily identify and show potential blind spots and problem coverage areas, enabling businesses to see the true view and coverage which makes for more informed, confident decisions.” Visibility for risk mitigation For system integrators, the new capabilities help to deliver accurate and professional system designs For system integrators, the new capabilities help to deliver accurate and professional system designs. For campus and corporate security pioneers, it enables improved stakeholder visibility for enhanced risk mitigation and more effective communication. Key features Visual Accuracy – Define and visualise the area of coverage (AOC) and field of view (FOV) directly on surveys, ensuring better alignment with real-world installations. Reduce Costly Mistakes and Risk – Visualise accurate areas of coverage to minimise the risk of improperly placed cameras and devices, helping users avoid costly rework or blind spot issues post-installation. Professional-quality Deliverables – Provide more polished, professional-looking system designs with precision, boosting credibility with clients. Time Savings – Show designs in one place without the need to modify them in other software programs or manually. Enhanced Coverage and Reduced Blind Spots – Ensure all areas requiring surveillance are effectively covered, improving overall security and providing peace of mind for clients. Streamlined Collaboration – Make it easier to communicate camera and device placements and coverage reducing misunderstandings and errors. Boundaries is available on System Surveyor 2.0, both tablet and web.
March Networks®, a global pioneer in cloud-based intelligent video surveillance, is proud to celebrate its 25th anniversary. For a quarter of a century, March Networks has been at the forefront of the security and business intelligence industries, driving innovation in video surveillance and delivering solutions that help businesses around the world secure and improve their operations. Advanced video analytics Since its founding in 2000, March Networks has become a trusted partner for thousands of organisations in retail, banking, transportation, and more. The company has consistently pushed boundaries by introducing advanced, yet practical technology that empowers businesses with actionable insights and advanced video analytics. Over the years, March Networks has pioneered solutions that have helped our customers migrate from analog to IP video surveillance, and from on-premise systems to hybrid and cloud-based platforms that turn video into a proactive business tool. 4000 Series hybrid NVRs The company was the first to centralise all ATM transaction data across thousands of ATMs and seamlessly correlate it Starting with the groundbreaking reliability of the 4000 Series hybrid NVRs and the scalability of Enterprise Services Manager (ESM) central management software, March Networks earned the trust of many of the world’s largest companies, securing deployments across thousands of locations. The company was the first to centralise all ATM transaction data across thousands of ATMs and seamlessly correlate it with surveillance video in a single, unified enterprise system. 8000 Series NVRs Building on this foundation, March Networks introduced the next-generation 8000 Series NVRs and evolved ESM into Command Enterprise Software (CES), the most advanced enterprise video management system of its time. In 2005, the company reached another milestone with a successful IPO, becoming the first company to achieve a dual listing on the TSX and AIM. March Networks is proudly owned by Delta, a global leader in power and thermal management solutions. Generative AI March Networks is leading the movement of enterprise video to the cloud and the integration of Generative AI. The latest generation of NVRs, the revolutionary X-Series hybrid, and all-IP recorders, utilise NVIDIA chipsets and provide embedded AI capabilities that continue to advance. As March Networks enters its next 25 years, it remains committed to transforming video surveillance beyond security, making it a powerful business intelligence tool. The Searchlight Cloud platform integrates video with all types of video analytics metadata, IoT sensors, and transactional data from POS and ATM systems, delivering real-time security and loss prevention alerts, along with comprehensive dashboards to help organisations enhance efficiency and the customer experience. Generative AI-based Smart Search capabilities Customers benefit from end-to-end video and business intelligence solutions that provide valuable insights The recent launch of Generative AI-based Smart Search capabilities highlights March Networks’ commitment to innovation and the ongoing evolution of video technology. Customers benefit from end-to-end video and business intelligence solutions that provide valuable insights across multiple departments – from security and operations to marketing and HR. “Reaching this milestone is a testament to the dedication of our employees, the loyalty of our customers, and the strength of our partnerships,” said Peter Strom, President and CEO of March Networks. 25th-anniversary video “As we celebrate our 25th anniversary, we remain committed to delivering solutions that shape the future of intelligent video and help our customers succeed. We look forward to 25 more years of innovation, security, and growth in intelligent video solutions.” To mark this special occasion, March Networks has released a commemorative 25th anniversary video, showcasing key milestones, longtime employees, and the company’s vision for the future. Visitors are encouraged to visit and explore the company’s refreshed website to watch the video.
Matrix, an OEM in Security and Telecom solutions, is excited to announce its participation in the 27th CMDA IT Expo 2025, scheduled for February 10-11 at The Westin, Koregaon Park, Pune. As a premier platform for engaging with vendors, channel partners, and industry stakeholders, the event will showcase Matrix's innovative solutions aimed at enhancing safety, streamlining operations, and enabling seamless communication across critical sectors. Cyber-secured IP video surveillance Matrix is thrilled to unveil its IP Video Surveillance Solutions, meticulously designed to address the security needs of the IT industry, at the CMDA IT Expo 2025. These enterprise-grade solutions empower vendors and channel partners to deliver advanced, cyber-secured surveillance tailored for modern IT infrastructures. Cyber-Secured Surveillance for IT Ecosystems: Matrix network cameras and video management software ensure robust data protection while adhering to global standards like OWASP. This safeguards sensitive IT assets and builds trust through compliance and operational reliability. Advanced Analytics for IT Security: Cutting-edge Video Analytics, including intrusion detection, motion detection, and licence plate recognition, enable enhanced monitoring and threat mitigation across IT facilities. Centralised Monitoring for IT Operations: Matrix’s solutions enable centralised, remote monitoring with real-time alerts via SMS, email, or WhatsApp, ensuring continuous vigilance and swift response to incidents. Visit Matrix at CMDA IT Expo 2025 to discover how its scalable, IT-focused Video Surveillance solutions can help vendors and channel partners enhance safety, optimise operations, and drive growth in the IT sector. Advanced access control solutions Matrix invites vendors and channel partners to explore its Access Control Solutions at CMDA IT Expo 2025, designed to address the dynamic access management needs of the IT sector. Built with scalability and efficiency in mind, these solutions empower businesses to achieve seamless security and streamlined operations. Centralised Multi-Location Access Management: Matrix simplifies access control for IT enterprises with multiple facilities, offering centralised and efficient management tailored to diverse projects handled by system integrators and consultants. Elevator Control for Enhanced Security: Ensure floor-wise access regulation in IT parks and high-rise offices to improve safety and convenience for occupants. Smart Visitor Management: Streamline visitor entry processes with pre-registration, approval workflows, and live tracking, elevating the security protocols in IT environments. Join Matrix at CMDA IT Expo 2025 to discover how its robust and IT-centric access control solutions can help vendors and channel partners deliver unparalleled security and convenience to their clients. Matrix time-attendance solutions Matrix is set to unveil its Time-Attendance Solutions, designed to optimise workforce management in the IT industry, at the CMDA IT Expo 2025. Tailored to meet the needs of system integrators and consultants, these solutions offer robust tools for managing IT enterprise operations with precision and efficiency. Job Processing and Costing for IT Projects: Automate workforce allocation and job tracking to boost productivity and operational efficiency, ensuring seamless project execution. Field Visit Management for IT Teams: Enable real-time reporting and monitoring of field employees, enhancing accountability and optimising workflows across IT operations. Flexible Attendance Management: Provide employees with self-service tools for managing attendance and leave, ensuring a seamless and user-friendly experience. Join Matrix at CMDA IT Expo 2025 to explore how its future-ready Time-Attendance Solutions can empower vendors and channel partners to deliver efficient workforce management tailored for IT enterprises.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
Security beat
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Case studies
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
Genetec Inc., the global pioneer in enterprise physical security software, announced The City of Edinburgh Council is using Genetec™ Security Centre as the backbone of its Smart City Strategy. The software is transforming public safety, city services and urban planning by allowing the council to manage all smart city technologies from a single interface. New applications and technologies The council’s Smart City Strategy focuses on introducing innovative technologies to manage aids The council’s Smart City Strategy focuses on introducing innovative technologies to manage resources more efficiently and improve public services. A key barrier to this vision was the city's outdated public space security system, which lacked the ability to integrate new applications and technologies. With funding from the European Regional Development Fund (ERDF) and in partnership with North, Edinburgh has launched a state-of-the-art Smart City Operations Centre built on Genetec Security Centre, a unified platform that combines video surveillance, analytics and IoT sensors, through one platform. Open hybrid-cloud architecture “All truly connected Smart Cities start with unified security as success depends on centralising your operations under one platform. Otherwise, every new IoT device deployed will make you data-rich but information poor,” comments Ben Durrant, Account Executive, Genetec Inc. "Our platform differs from conventional alternatives because of its open hybrid-cloud architecture that offers the flexibility and functionality needed to evolve and keep pace with new requirements.” Capabilities beyond physical security The system not only supports day-to-day functions and the control of large-scale events With a unified platform in place, Edinburgh has been able to expand CCTV coverage in public spaces and enable secure data sharing with partners like Police Scotland, the Fire Service, and Transport for Edinburgh. The system not only supports day-to-day operations and the management of large-scale events such as the Edinburgh Fringe, the Royal Military Tattoo, and the Hogmanay celebrations, but it also extends its capabilities beyond physical security. Security Centre ecosystem Andrew Foster, MD, Public Services at North comments: "The Security Centre ecosystem allows us to gather and visualise useful data sets from advanced analytics IoT sensors on how the city is actually being used by residents and visitors." "This enables the council to make more informed decision making on how Edinburgh can become even safer, greener and better maintained." Improved quality of footage The council credits the software with saving hundreds of man hours that were yet spent manually The council credits the software with saving hundreds of man hours that were previously spent manually trawling through surveillance footage. As well as with helping it to more than double the number of viewing requests from Police Scotland that it can positively respond to. The improved quality of footage submitted as evidence is also expected to increase the number of early guilty pleas, reducing the time police officers must spend attending court to give evidence. Smart City strategy “The benefits for Edinburgh residents are massive. Enhanced public safety, improved services, optimised traffic flow, better infrastructure and city planning,” concludes Gavin Brown, Head of Network Management & Enforcement, Edinburgh City Council. “Genetec and North have proved instrumental in helping deliver our Smart City strategy.”
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honour all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. Buffalo Park The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Challenge Provide a welcoming and secure environment for visitors and deter criminal activity within the park. Achieve 360° coverage across all interior and exterior areas without using cables, which would have made the project cost-prohibitive. Design a wireless surveillance system to cover the park’s large areas of open ground. Surveillance system installation “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Factors to consider From a risk and public safety perspective, the goal from the start was to maintain an open and welcoming environment “We conducted a site survey, considering the line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Solution Install a Hanwha Vision surveillance system comprising multidirectional and AI cameras. 4K multi-sensor cameras Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Ease of playback Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” Cable cost and distance One challenge the team encountered during the design phase was running a cable for a project of this scale. “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” NDAA compliant solutions The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence. In the past, we could not effectively supply law enforcement with usable information to identify a suspect." Use of AI in cameras The Hanwha cameras’ use of AI plays a key role in delivering those capabilities "We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the colour of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. Sense of security “We absolutely would see an increase in the value and number of cameras that we use,” said Abbott. Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.” Results Ability to effectively monitor all park areas and more effective forensic searches. Reduction in on-premise incidents. Streamlined collaboration with law enforcement agencies.
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honour all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artefacts entrusted to the Park’s care. The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artefacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Hanwha Vision’s AI-equipped cameras Design and install a surveillance system based on Hanwha Vision’s multi-directional cameras “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artefacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Risk and public safety perspective “We conducted a site survey, considering line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Extensive experience with Hanwha cameras Schiefer has extensive experience with Hanwha cameras from previous projects Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Benefit of using the Hanwha 360° cameras Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” One challenge the team encountered during the design phase was running a cable for a project of this scale. Incorporated wireless network cards The Park’s priorities included the use of NDAA-compliant solutions and more streamlined communication “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” The Park’s priorities included the use of National Defense Authorisation Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. Supply law enforcement “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence." "In the past, we had no capacity to effectively supply law enforcement with usable information to identify a suspect. We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." Greater sense of security The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the colour of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. “We absolutely would see an increase in the value and number of cameras that we use.” Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.”
To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Deter, detect, and apprehend criminals Fenton is a small city with 12,000 permanent residents, but Chief of Police Jeffery Cross estimates that 60,000 people pass through the town daily. Located off Highway US-23, it is a popular shopping and restaurant district for commuters and people from neighbouring cities. Unfortunately, retail criminals also frequent the area. The new video surveillance system is designed to deter, detect, and apprehend retail criminals. Live security camera footage Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access The new system, housed in a rugged, weatherproof cabinet and mounted on a telephone pole with two cameras, includes Eagle Eye 911 Camera Sharing technology. Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access to view live security camera footage during an emergency. “With 911 Camera Sharing, the 911 operator can see the situation unfold and give law enforcement direct, quality information and immediate feedback about what happened and the direction the suspect is headed in,” Cross explained. “That enhances safety for first responders and our community.” Smart Video Search In addition, the security cameras have built-in AI-powered Eagle Eye Smart Video Search, which enables Fenton’s authorised law enforcement officials to quickly search security camera footage for vehicles, people, or objects of interest. “With Smart Video Search you can search for a ‘person wearing a red shirt and black pants’ a ‘blue Honda truck’ or ‘person with a backpack’ and quickly find a shoplifting suspect or determine when a certain vehicle, person, or group of people entered a shopping centre parking lot, which can be critical information for law enforcement,” said Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions. This Novi, Mich.-based security integrator is working on the project with the City of Fenton. AI-powered video surveillance “Fenton’s new system with 911 Camera Sharing and AI features such as Smart Video Search is like having a virtual patrol in the Fenton business district,” he added. “Last month the National Retail Federation reported a 93% increase in the average number of shoplifting incidents per year in 2023 versus 2019 and a 90% increase in dollar loss,” said Dean Drako, CEO of Eagle Eye Networks. “AI-powered video surveillance can now be deployed in more areas than ever, offering communities new ways to contend with rising retail crime.”
Axis Communications, the industry pioneer in video surveillance and network devices, announced the implementation of a custom surveillance solution developed in collaboration with the MetLife Stadium security team. This new, tailored solution will help the venue augment its security capabilities, providing high-quality video at unprecedented distances and allowing the security team to identify details from anywhere in the venue. Advanced video analytics solutions “As one of the world's largest stadiums, the safety of fans is our number one priority,” said Danny DeLorenzi, VP of Security and Safety Services, MetLife Stadium. “Unfortunately, none of the out-of-the-box solutions we tried could provide the desired coverage at the video quality we were looking for." "Axis worked with us to build a custom solution where our needs were taken into consideration from the concept phase all the way through implementation. The result was an innovative new camera capable of providing full visibility throughout the entire bowl of the stadium while also allowing us to take advantage of advanced video analytics solutions.” Forefront of stadium security MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games Located in East Rutherford, NJ and serving the New York City metropolitan area, MetLife Stadium regularly hosts events ranging from stadium concerts to NFL games—and the venue has been at the forefront of stadium security since it was built. The stadium is consistently rated one of the safest in the NFL, and in 2013 it was the first NFL stadium to achieve SAFETY Act certification from the US Department of Homeland Security. Implementing modern security solutions MetLife Stadium has twice been named a Facility of Merit by the prestigious National Centre for Spectator Sports Safety and Security (NCS4) and has established a reputation for implementing modern security solutions. In keeping with this reputation, MetLife Stadium refused to compromise on a surveillance solution, choosing instead to work directly with Axis on a device tailored to the venue’s unique needs. Innovate and design a tailored solution “MetLife Stadium has always been committed to strong security, and it holds its partners to a very high standard,” Fredrik Nilsson, VP, Axis Communications. “When the security team explained to us that they were having a hard time finding an off-the-shelf device that met their needs, we viewed it as an opportunity to innovate and design a more tailored solution." "As a result, the MetLife Stadium security team will be well positioned to detect, investigate, and respond to any security challenges that come its way.” Advanced and complex video analytics The new device has a number of parts specifically tailored to improve version in a stadium setting The new device includes a number of features specifically tailored to improve performance in a stadium setting. It provides optimal performance in a variety of lighting conditions, and electronic image stabilisation (EIS) capabilities that help keep the image steady even amid the raucous crowds and turbulent weather of an open-air stadium. It also features a custom-made lens that enables 8K resolution, and is capable of recording images in a wide dynamic range, capturing a broad spectrum of colour hues in sharp, high-contrast video. Because the camera can more accurately identify and catalogue identifying features it is able to run more advanced and complex video analytics. Existing surveillance devices The device adheres to a form factor consistent with existing surveillance devices, enabling compatibility with the pressed concrete structure’s existing camera mounts. Additionally, MetLife Stadium ensured the device could be easily integrated with the venue’s current security stack, including its Video Management System (VMS), current technology partners, and local public safety agencies. MetLife Stadium’s security capabilities Venue officials are working to identify ways to leverage the devices to enhance security With the new surveillance solution in place, MetLife Stadium’s security capabilities are more advanced than ever—but the security team is already planning for new enhancements. Venue officials are working to identify ways to leverage the devices to enhance security while also exploring different video analytics solutions. The ultimate goal is to not just improve security but streamline entry to the stadium, create easier access to amenities, and improve staffing efficiency. Highest Grossing Stadium of the Year MetLife Stadium, located in East Rutherford, NJ, is the home of the New York Jets and New York Giants and is one of the largest stadiums in the NFL (82,500). The stadium hosts the world’s biggest events on the world’s biggest stage and will host the FIFA World Cup 26™ Final and 7 other matches throughout the tournament. The venue annually ranks as one of the busiest stadiums in the world and has been named “Highest Grossing Stadium of the Year” 9 times by Billboard. Event highlights include Super Bowl XLVIII, NHL Stadium Series, WrestleMania, Copa America Centenario Final, 2021 Army-Navy Game, and many concerts, college football games, and international soccer matches.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Selecting the right network video recorder (NVR) for any vertical market](https://www.sourcesecurity.com/img/white-papers/612/920x533_1729064854.jpg)
Selecting the right network video recorder (NVR) for any vertical market
Download![Improving city mobility using connected video technology](https://www.sourcesecurity.com/img/white-papers/612/safe-city-3-920x533.jpg)
Improving city mobility using connected video technology
Download![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![Choosing the right storage technology for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/security-storage-data-920.jpg)
Choosing the right storage technology for video surveillance
Download![Video surveillance as a service: Why are video management systems migrating to the Cloud?](https://www.sourcesecurity.com/img/white-papers/612/vsaas-920.jpg)
Video surveillance as a service: Why are video management systems migrating to the Cloud?
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![The borderless control room](https://www.sourcesecurity.com/img/white-papers/612/borderless-control-room-920.jpg)
The borderless control room
Download![Wireless Access Control eBook](https://www.sourcesecurity.com/img/white-papers/612/wireless-access-control-ebook-920.jpg)
Wireless Access Control eBook
Download![Six things to look for when adding AI cameras to your operation](https://www.sourcesecurity.com/img/white-papers/612/hanwha-pic.jpg)
Six things to look for when adding AI cameras to your operation
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Security investments retailers should consider for their 2021 budget](https://www.sourcesecurity.com/img/white-papers/612/retail-security-investments-for-2021-budget-920_1603476210.jpg)
Security investments retailers should consider for their 2021 budget
Download![Enhanced Ethernet Technology (ePoE)](https://www.sourcesecurity.com/img/white-papers/612/Dahua-ePoE-620x360.jpg)
Enhanced Ethernet Technology (ePoE)
Download![IP in a box: The advantages of embedded network video recorders](https://www.sourcesecurity.com/img/white-papers/612/network-video-620x360.jpg)
IP in a box: The advantages of embedded network video recorders
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Network Video Recorders: Manufacturers & Suppliers
- Hikvision Network Video Recorders
- exacqVision Network Video Recorders
- Dahua Technology Network Video Recorders
- ADPRO Network Video Recorders
- Vicon Network Video Recorders
- Hanwha Vision Network Video Recorders
- Axis Communications Network Video Recorders
- Avigilon Network Video Recorders
- Milesight Network Video Recorders
- LILIN Network Video Recorders
- MOBOTIX Network Video Recorders
- Illustra Network Video Recorders
- Verkada Network Video Recorders
- Bosch Network Video Recorders
- AV Costar Network Video Recorders
- Milestone Network Video Recorders
- IDIS Network Video Recorders
- BCDVideo Network Video Recorders
- March Networks Network Video Recorders
- Speco Technologies Network Video Recorders
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download