Office security systems
Wavelynx Technologies, a trailblazer in advanced, secure, and versatile reader and credential solutions, showcases its Wallet solution at the Global Security Exchange (GSX) trade show in Orlando, FL, September 23-25, 2024. Wavelynx Wallet transforms mobile devices into secure credentials, bringing access control into the mainstream and paving the way for future credential management. The system enhances security across various facilities and introduces a new level of convenience, reflecting so...
RISCO, a globally recognised pioneer in cloud-based security solutions, announces the launch of its latest innovation, the LightSYS Air wireless solution. This state-of-the-art system represents a significant leap forward in wireless security technology for professionals within the industry. LightSYS Air Building upon the success of the widely-praised LightSYS+ hybrid solution, LightSYS Air heeds the call for an enhanced security installer experience akin to its predecessor. By address...
RecFaces, in collaboration with Startologic, successfully hosted its three-city ‘Project Day’ event, held in Delhi on September 12, Bengaluru on September 5, and Mumbai on August 29. The event provided an in-depth exploration of cutting-edge facial recognition technologies, highlighting how these solutions can revolutionise security systems across industries. Project Day events The Project Day events brought together system integrators, technology partners, and industry prof...
Nice, a global pioneer in Home and Building Management solutions, is excited to announce the appointment of Joe Mac McConnell as Vice President of Security Sales. With extensive leadership and expertise in the security industry, McConnell is well-positioned to drive acceleration for the Nice security business unit in North America. McConnell's new responsibilities In this role, McConnell will focus on the expansion of the Nice security solutions portfolio and the 2GIG brand, which...
A few decades ago, people lived with minimum security. Only a few facilities hired physical security, but most buildings relied on locks and vigilance. Currently, some companies are integrating modernised video security with other building systems. For example, the video integrated with access control allows security to visually verify individuals entering secured areas. Video security Video security has evolved over the last few years from single-application technology to solutions that...
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information,...
News
Regula, a global developer of forensic devices and identity verification solutions, has reached another milestone in enlarging its identity document templates database. The world’s largest commercially available database, it contains over 13,000 templates of ID from 247 countries and territories. Adaptable identity verification What sets it apart is knowledge of a full set of security attributes used to protect a document, since Regula leverages its 30-year experience in forensic hardware devices and analysis to scrutinise every inch of a document. As a result, it empowers organisations to establish a robust and adaptable identity verification workflow, providing unrivaled precision. Detailed security features Recent documents reveal a growing trend for more protection against counterfeits When adding new identity documents to the database, Regula’s experts meticulously describe all security features, providing detailed descriptions of how every element should look and how exactly one can verify its genuineness. Recent documents, including those integrated into Regula's 2023 database update, reveal a growing trend for more protection against counterfeits, which leads to including more security features or sophisticating the existing ones. Electronic documents This trend has been particularly evident in the global increase in electronic documents, which have proved to be more fraud-resilient. In 2023, this trend continued evolving, as new countries introduced their first electronic passports. Among them are Bahrain, Iraq, Jamaica, Mongolia, Pakistan, and Somaliland. All of these documents are already in Regula’s database with the most detailed description of their features and references to compare with during the verification process. Identity verification solutions We ensure a seamless, swift, and accurate verification process, regardless of the document provided" “We aim to record every security and unique document feature as precisely as possible by using our expertise in forensic analysis and forensic device development. With identity fraud on the rise, it’s vital to know what exactly to pay attention to when verifying a document,” says Ihar Kliashchou, Chief Technology Officer at Regula. "By backing up our identity verification solutions with such a comprehensive database of IDs, we ensure a seamless, swift, and accurate verification process, regardless of the document provided." Examining a Swiss passport design A Swiss passport design is examined closely using ultraviolet light, revealing concealed images printed with invisible fluorescent ink. These “secret” images serve as a highly effective security element, as their intricate and hard-to-replicate details act as a natural deterrent to counterfeiting. Since the beginning of the year, Regula has added more than a thousand new document templates to its database. E-passports, ID cards, and driver's licence In addition to the previously mentioned e-passports, it enlarged with: Passports: Barbados Canada China Finland Indonesia Pakistan Paraguay Uganda Vietnam ID cards: Djibouti Ethiopia Finland Greece Nepal Paraguay Switzerland Driver’s licences: Cyprus Greece Iraq Latvia Niue Norway Sao Tome and Principe Somaliland Sudan Switzerland Zimbabwe Template library Besides, Regula has updated its extensive set of US driver’s licences and ID cards that differ greatly from state to state. The vendor’s template library contains the documents issued in 2023, like those of Arizona, Idaho, North Dakota, Virginia, Washington D.C., West Virginia, and Wisconsin.
Hackuity, the risk-based vulnerability management provider, announced the launch of Version 2.0 of its next-generation platform, featuring major enhancements to bring further support to organisations in prioritising risks. Vulnerability Management Hackuity’s intelligent Risk-Based Vulnerability Management combines threat intelligence, vulnerability severity, and unique business context, providing organisations with a quantified, measurable ‘True Risk Score’(TRS), further enhanced for the most accurate insight into risks. This helps IT teams prioritise threat remediation specific to their attack surfaces and to allocate their resources where most needed. Feature-rich platform TRS algorithm to significantly reduce the number of critical vulnerabilities that need to be addressed Unifying and interpreting data sources through integrations with more than 70 market-pioneering tools, the feature-rich platform provides a single pane of glass view for mapping threat exposure. This is enhanced by its proprietary TRS algorithm to significantly reduce the number of critical vulnerabilities that need to be addressed urgently, and automate vulnerability-related tasks to streamline teams’ operations. Detected CVEs The latest release comes at a time when the number of detected CVEs (Common Vulnerabilities and Exposures) continues to increase year on year. In 2022 alone, more than 25,000 new common IT security vulnerabilities and exposures were reported, the highest reported annual figure to date. Hackuity 2.0 advancements The major advancements in Hackuity 2.0 help teams to meet these challenges with features including: TRS brings greater clarity and CVSS noise reduction Version 2.0 brings even greater clarity to users further distilling the number of findings At the core of Hackuity’s platform is its proprietary risk prioritisation technology, TRS. Version 2.0 brings even greater clarity to users further distilling down the number of findings teams need to manage, significantly reducing CVSS ‘noise’ by 96%. Users can switch seamlessly between Legacy CVSS and TRS scoring scales. Additional context on CVEs The platform provides the deepest encyclopedia of CVEs to date with Smart Exposure Explorer (SmartEx²), analysing open-source and non-public information to provide contextual KPIs (real exploitability, exploit maturity, threat intensity, EPSS). This is supported by deeper intelligence and Hackuity’s own Threat Bots leveraging CTI data for improved granularity and a context-rich risk assessment of vulnerabilities. Improved remediation features Users can apply the role-based access models to remediation campaigns To streamline and improve the management of teams, users can apply the role-based access models to remediation campaigns. Scaling vulnerability fixes becomes even easier. Revamped User Interface The latest release delivers a revamped user interface for ease of use and a new modern design to reflect Hackuity’s forward-thinking identity. New Connectors Like clockwork, new connectors are launching for Cloud security solutions such as Wiz, Prisma Cloud, and IoT/OT solution Claroty, among many others. SOC 2 Type 1 Compliance The organisation has also achieved SOC 2, Type 1 certification, demonstrating the organisation’s ability and commitment to secure client data. Assess vulnerabilities The sheer magnitude of CVEs makes it increasingly difficult for IT and security teams to make sense of their data" Commenting on the launch, Sylvain Cortes, VP of Strategy, at Hackuity said, “The pressure on security teams to quickly risk-assess vulnerabilities is intense." He adds, "The sheer magnitude of CVEs makes it increasingly difficult for IT and security teams to make sense of their data and this is only going to get more challenging.” Identifying cyber risks Sylvain Cortes continues, “This launch marks a major evolution in the platform and delivers new capabilities to help teams zero in with confidence on the risks that matter to their own business." He adds, "With the number of vulnerabilities continuing to soar, bringing order to chaos and having the clearest possible view of cyber risks, all in one place has never been more important.”
Xtract One Technologies, a technology-driven threat detection and security solution that prioritises the patron access experience by leveraging AI announced the Company will serve as the exclusive preferred supplier for the American Association of Professional Baseball (AAPB). Through this three-year partnership, Xtract One will have the unique ability to advise AAPB regarding security and weapon detection technology, deploy solutions, and ensure best practices to deliver first-class fan experiences. Streamlined and efficient security The AAPB currently has 12 teams, with significant expansion on the horizon. The league collectively welcomes over 1.9 million patrons to their baseball stadiums each year and aspires to transform their venues into dynamic entertainment hubs to deliver optimal fan experiences. This collaboration signifies a significant step forward in delivering streamlined and efficient security measures, enhancing venue safety, minimising wait times, and fostering enhanced patron experiences across the AAPB’s entertainment centres. Gateway system This solution unobtrusively scans patrons for guns, knives, and other prohibited items using AI-powered sensors Xtract One’s Gateway system replaces traditional metal detectors and hand wands and delivers fast, reliable, and seamless patron screening. This solution unobtrusively scans patrons for guns, knives, and other prohibited items as they enter the facility, using AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort. The system was designed for large, ticketed venues to enable high throughput and a brand-enhancing patron experience. With Xtract One, AAPB will eliminate long entry lines, allowing fans to quickly, and safely, enter the venue and enjoy the event. Safe and enjoyable experience “The AAPB is all about family experiences, family fun, good times, and great memories. Our top priority is to enhance these experiences and to continue expanding our offerings,” said Joshua Schaub, Commissioner of the American Association of Professional Baseball. “We are delighted to partner with Xtract One on this journey to deliver an even safer and more enjoyable experience for all.” Weapon detection technology solution Xtract One’s ability to bolster security measures while ensuring an optimised entry process for patrons In its exclusive role, Xtract One will work closely with AAPB to deploy cutting-edge security and weapon detection technology solutions tailored to the league’s needs and dynamic, family-centric venues. Xtract One’s ability to bolster security measures while ensuring an optimised entry process for patrons aligns with the league’s mission of prioritising safety without compromising the fan experience. Enhance patient safety “We are thrilled to be partnering with AAPB as their exclusive preferred supplier. We look forward to helping enhance the overall safety for guests at upcoming games while elevating their game-day experience to a whole new level,” said Peter Evans, CEO of Xtract One. “Together with AAPB, we are pleased to be contributing to the vibrant, enjoyable experiences AAPB provides to fans and families.”
An air of excitement circled the Gallagher Security booth at the recent TSE event in Birmingham, as the award-winning, global security manufacturer demonstrated the latest innovations in their security ecosystem. The annual event, held from 30 April – 2 May which attracted more than 14,000 visitors to Birmingham’s NEC, brought together manufacturers, distributors, installers, consultants, and end users, and displayed the latest products, technologies, and solutions from the world’s security brands. Controller 7000 Single Door Gallagher showcased their Controller 7000 (C7000) released on November 2023 and the Controller 7000 Single Door, as well as their high-security solutions, but the demonstration that got visitors talking was the recently released employee badge in Apple Wallet, available with Gallagher’s latest version of their award-winning site management software, Command Centre v9.10. Gallagher Security Regional General Manager UK and Europe, Richard Huison says, “TSE was an excellent opportunity to showcase our evolving Gallagher Security ecosystem including the recently released employee badge in Apple Wallet." Safeguarding people, places, and assets "We also observed a growing interest in our Automatic Access Control Systems (AACS), and Cyber Assurance of Physical Security Systems (CAPSS) approved high-security solutions." "There was a growing consciousness among businesses about the importance of safeguarding their people, places, and assets to the highest standard.” Access control in critical infrastructure TSE proved to be a networking opportunity with channel partners, end users, and other professionals Richard joined a panel hosted by security influencer Lee Odess, where they discussed access control within the critical infrastructure sector. Gallagher Security Sales Manager UK South, Gordon Swallow also joined the ASIS International UK panel, to discuss the true value of a security system in the procurement journey. Among the solution demonstrations and panel discussions, TSE proved to be another excellent networking opportunity with channel partners, end users, and other security industry professionals using the event as a platform to share insights and connect. End-to-end solutions “These events are always valuable in terms of understanding the changing needs of our customers and the wider industry." "There were many conversations about the shift to end-to-end solutions and the speed and security they provide, plus plenty of discussion around mobile/digital wallets and the enhanced convenience and flexibility they offer,” says Richard. Employee badge in Apple Wallet Employee badge in Apple Wallet is fully integrated with Gallagher Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. It is available for approved Gallagher customers in the United States with global availability to be announced soon.
The Electronic Security Association (ESA) proudly announces that Michael Barnes was elected as Treasurer and will serve as Chairman of the ESA Finance Committee following the ESA Board of Directors' meeting on November 30, 2023. Barnes succeeds Kevin Stone, who assumes the role of Chairman-Elect from 2023 to 2024. "I’m delighted that Michael Barnes will serve as Treasurer and Finance Committee Chairman for ESA,” says Kevin Stone, ESA Chairman-Elect and COO of Doyle Security Systems. “It’s an exciting time for the ESA membership and we’re fortunate to have Michael’s experience and Industry knowledge.” Implementation of policies The purpose of a Treasurer is to work collectively to provide good governance of ESA affairs The purpose of a Treasurer is to work collectively to provide good governance of ESA affairs and to set the organisation’s direction to optimise the growth and performance of the organisation. Each Board Member has a responsibility for ensuring strategies and policies that are developed, discussed, and implemented will enable the organisation to achieve its mission and vision — and to monitor the organisation’s implementation of those strategies and policies. Author's quote "Michael has been an integral part of the ESA Board of Directors and Finance Committee. I am thrilled he has agreed to lend his talent by serving in this important role,” says Merlin Guilbeau, Chief Executive Officer of ESA. “His dedication to ESA’s mission, and strong financial expertise will complement the progress made thus far and drive results that positively impact our members." Prior roles of Barnes As an asset banker and advisor to security alarm firms, he has helped shape the industry Barnes' security industry career has spanned more than 35 years. As an investment banker and advisor to security alarm companies, he has helped shape the industry. Barnes has been involved in more than 280 security alarm acquisitions, with an aggregate transaction value of more than $29 billion. Additionally, he has pioneered various analysis techniques that have helped the industry better define how it performs and creates value, which has allowed the industry to be more efficient in raising capital. Barnes-Buchanan Conference Currently, Barnes serves as the president of Barnes Associates Inc., a brokerage, advisory, and consulting firm he founded in 1986, which focuses on the security alarm industry. He also lectures at numerous events on matters relating to acquisitions, the availability of capital and the operating dynamics and performance of alarm companies. These events include the annual Barnes-Buchanan Conference which the firm co-sponsors. Barnes was the 13th person to be inducted into the SSI Security Alarm Industry Hall of Fame, an honour he received in 2004. Barnes is eager to put his talents and expertise to further benefit the industry as Treasurer. Author's quote “First off, I want to thank Kevin Stone for doing such a great job in this role. His efforts, along with those of all the other prior Treasurers, make my job much easier,” says Michael Barnes, ESA Treasurer and Founding Partner of Barnes Associates, Inc. ESA has always had a highly active and capable roster of Officers, and Kevin is a perfect example “ESA has always had a highly active and capable roster of Officers, and Kevin is a perfect example. It is no surprise that he is the newly elected Chairman. I am excited to expand my efforts with ESA to include serving as Treasurer and Finance Committee Chair. It is an honour. ESA is such a great organisation, and I enjoy addressing longer-term industry and association issues as a member of the Board of Directors, but this role will allow me to have greater contact with the staff and be closer to the operating details." Financial sectors for ESA By building the initiatives ESA already has in progress, Barnes will support ESA’s Board of Directors with his expansive knowledge and expertise, helping predict what the industry will be doing across a variety of financial sectors for ESA and its members to prepare and plan accordingly. Barnes wants to leave ESA and its members in an even better position for continued growth and success in the future.
Intelligent power management company Eaton announced its latest innovation in connected backup power and cybersecurity with the North American launch of its Gigabit Network Card (Network-M3). Network-M3 card The Network-M3 card features all the enhanced capabilities customers expect from Eaton Gigabit Network Card technology and adds new, innovative features to help organisations meet their unique cybersecurity needs. With capabilities for web-based monitoring and alerts, the Network-M3 card provides valuable insights into IT power usage, reshaping the way IT teams monitor and control their power systems as security needs evolve. Enhanced protection against cyberattacks Increase the number of smart devices on their network, they face more opportunities for cyber threats" “As IT managers continue to embrace enhanced connectivity and increase the number of smart devices on their network, they face more opportunities for cyber threats,” said James Martin, global connectivity product manager, at Eaton. “We’ve designed the Network-M3 card to offer enhanced protection against cyberattacks while also providing the comprehensive power management needed to boost performance.” Cybersecurity Cybersecurity continues to be a growing threat across the globe, with the risk of attack rising as the number of connected devices and IoT devices is expected to grow to more than 41.6 billion by 2025. According to IBM’s 2023 Cost of a Data Breach Report, the average global cost of a data breach in 2023 was $4.45 million, a 15% increase over three years, making it imperative that IT managers leverage connected infrastructure designed with the highest levels of cybersecurity protection. Security and reliability Network-M3 card simplifies the management and security of critical infrastructure With its secure boot process, user-configurable firewall, and zero-touch provisioning, the Network-M3 card can easily detect intrusions and ensure a high level of security and reliability for uninterruptible power supplies (UPSs) and power distribution units (PDUs). As the only network card on the market with UL 2900-1 and IEC 62443-4-2 cybersecurity certifications, the Network-M3 card simplifies the management and security of critical infrastructure by providing a flexible cybersecurity solution that can authenticate any attached firmware, preventing a cyberattack from spreading when a threat exists. Features of the Network-M3 card Chain-of-trust encryption and secure firmware boot capability, preventing the Gigabit Network Card from being a cyberattack vulnerability point on a network, with firmware updates available at no cost to the user. A user-configurable firewall that provides an additional layer of security to protect the Gigabit Network Card and the UPS or PDU from unauthorised access and cyberattacks. Remote storage of security keys, making the device tamper-resistant even in cases of physical breaches. Zero-touch provisioning and auto-configuration commissions devices faster to save time in large-scale deployments. Support of 10/100/1000 Mbps for diverse compatibility. Certificate manager for easy creation and distribution of digital certificates to multiple devices. Automation capabilities In addition to built-in web-based monitoring capabilities and alerts, the Network-M3 card can integrate with the software in Eaton’s Brightlayer Data Centres suite, empowering IT teams to streamline operations and prepare for future needs. The harmony between hardware and software delivers an array of automation capabilities and remote management functionality, reducing response times to power issues and ensuring timely updates that bolster cybersecurity defences. Additionally, the card seamlessly integrates with Eaton’s cloud-based remote monitoring service that aggregates data from Eaton UPSs and dispatches an Eaton field technician when critical events occur.
Regula, a global developer of forensic devices and identity verification solutions, has reached another milestone in enlarging its identity document templates database. The world’s largest commercially available database, it contains over 13,000 templates of ID from 247 countries and territories. Adaptable identity verification What sets it apart is knowledge of a full set of security attributes used to protect a document, since Regula leverages its 30-year experience in forensic hardware devices and analysis to scrutinise every inch of a document. As a result, it empowers organisations to establish a robust and adaptable identity verification workflow, providing unrivaled precision. Detailed security features Recent documents reveal a growing trend for more protection against counterfeits When adding new identity documents to the database, Regula’s experts meticulously describe all security features, providing detailed descriptions of how every element should look and how exactly one can verify its genuineness. Recent documents, including those integrated into Regula's 2023 database update, reveal a growing trend for more protection against counterfeits, which leads to including more security features or sophisticating the existing ones. Electronic documents This trend has been particularly evident in the global increase in electronic documents, which have proved to be more fraud-resilient. In 2023, this trend continued evolving, as new countries introduced their first electronic passports. Among them are Bahrain, Iraq, Jamaica, Mongolia, Pakistan, and Somaliland. All of these documents are already in Regula’s database with the most detailed description of their features and references to compare with during the verification process. Identity verification solutions We ensure a seamless, swift, and accurate verification process, regardless of the document provided" “We aim to record every security and unique document feature as precisely as possible by using our expertise in forensic analysis and forensic device development. With identity fraud on the rise, it’s vital to know what exactly to pay attention to when verifying a document,” says Ihar Kliashchou, Chief Technology Officer at Regula. "By backing up our identity verification solutions with such a comprehensive database of IDs, we ensure a seamless, swift, and accurate verification process, regardless of the document provided." Examining a Swiss passport design A Swiss passport design is examined closely using ultraviolet light, revealing concealed images printed with invisible fluorescent ink. These “secret” images serve as a highly effective security element, as their intricate and hard-to-replicate details act as a natural deterrent to counterfeiting. Since the beginning of the year, Regula has added more than a thousand new document templates to its database. E-passports, ID cards, and driver's licence In addition to the previously mentioned e-passports, it enlarged with: Passports: Barbados Canada China Finland Indonesia Pakistan Paraguay Uganda Vietnam ID cards: Djibouti Ethiopia Finland Greece Nepal Paraguay Switzerland Driver’s licences: Cyprus Greece Iraq Latvia Niue Norway Sao Tome and Principe Somaliland Sudan Switzerland Zimbabwe Template library Besides, Regula has updated its extensive set of US driver’s licences and ID cards that differ greatly from state to state. The vendor’s template library contains the documents issued in 2023, like those of Arizona, Idaho, North Dakota, Virginia, Washington D.C., West Virginia, and Wisconsin.
Hackuity, the risk-based vulnerability management provider, announced the launch of Version 2.0 of its next-generation platform, featuring major enhancements to bring further support to organisations in prioritising risks. Vulnerability Management Hackuity’s intelligent Risk-Based Vulnerability Management combines threat intelligence, vulnerability severity, and unique business context, providing organisations with a quantified, measurable ‘True Risk Score’(TRS), further enhanced for the most accurate insight into risks. This helps IT teams prioritise threat remediation specific to their attack surfaces and to allocate their resources where most needed. Feature-rich platform TRS algorithm to significantly reduce the number of critical vulnerabilities that need to be addressed Unifying and interpreting data sources through integrations with more than 70 market-pioneering tools, the feature-rich platform provides a single pane of glass view for mapping threat exposure. This is enhanced by its proprietary TRS algorithm to significantly reduce the number of critical vulnerabilities that need to be addressed urgently, and automate vulnerability-related tasks to streamline teams’ operations. Detected CVEs The latest release comes at a time when the number of detected CVEs (Common Vulnerabilities and Exposures) continues to increase year on year. In 2022 alone, more than 25,000 new common IT security vulnerabilities and exposures were reported, the highest reported annual figure to date. Hackuity 2.0 advancements The major advancements in Hackuity 2.0 help teams to meet these challenges with features including: TRS brings greater clarity and CVSS noise reduction Version 2.0 brings even greater clarity to users further distilling the number of findings At the core of Hackuity’s platform is its proprietary risk prioritisation technology, TRS. Version 2.0 brings even greater clarity to users further distilling down the number of findings teams need to manage, significantly reducing CVSS ‘noise’ by 96%. Users can switch seamlessly between Legacy CVSS and TRS scoring scales. Additional context on CVEs The platform provides the deepest encyclopedia of CVEs to date with Smart Exposure Explorer (SmartEx²), analysing open-source and non-public information to provide contextual KPIs (real exploitability, exploit maturity, threat intensity, EPSS). This is supported by deeper intelligence and Hackuity’s own Threat Bots leveraging CTI data for improved granularity and a context-rich risk assessment of vulnerabilities. Improved remediation features Users can apply the role-based access models to remediation campaigns To streamline and improve the management of teams, users can apply the role-based access models to remediation campaigns. Scaling vulnerability fixes becomes even easier. Revamped User Interface The latest release delivers a revamped user interface for ease of use and a new modern design to reflect Hackuity’s forward-thinking identity. New Connectors Like clockwork, new connectors are launching for Cloud security solutions such as Wiz, Prisma Cloud, and IoT/OT solution Claroty, among many others. SOC 2 Type 1 Compliance The organisation has also achieved SOC 2, Type 1 certification, demonstrating the organisation’s ability and commitment to secure client data. Assess vulnerabilities The sheer magnitude of CVEs makes it increasingly difficult for IT and security teams to make sense of their data" Commenting on the launch, Sylvain Cortes, VP of Strategy, at Hackuity said, “The pressure on security teams to quickly risk-assess vulnerabilities is intense." He adds, "The sheer magnitude of CVEs makes it increasingly difficult for IT and security teams to make sense of their data and this is only going to get more challenging.” Identifying cyber risks Sylvain Cortes continues, “This launch marks a major evolution in the platform and delivers new capabilities to help teams zero in with confidence on the risks that matter to their own business." He adds, "With the number of vulnerabilities continuing to soar, bringing order to chaos and having the clearest possible view of cyber risks, all in one place has never been more important.”
Xtract One Technologies, a technology-driven threat detection and security solution that prioritises the patron access experience by leveraging AI announced the Company will serve as the exclusive preferred supplier for the American Association of Professional Baseball (AAPB). Through this three-year partnership, Xtract One will have the unique ability to advise AAPB regarding security and weapon detection technology, deploy solutions, and ensure best practices to deliver first-class fan experiences. Streamlined and efficient security The AAPB currently has 12 teams, with significant expansion on the horizon. The league collectively welcomes over 1.9 million patrons to their baseball stadiums each year and aspires to transform their venues into dynamic entertainment hubs to deliver optimal fan experiences. This collaboration signifies a significant step forward in delivering streamlined and efficient security measures, enhancing venue safety, minimising wait times, and fostering enhanced patron experiences across the AAPB’s entertainment centres. Gateway system This solution unobtrusively scans patrons for guns, knives, and other prohibited items using AI-powered sensors Xtract One’s Gateway system replaces traditional metal detectors and hand wands and delivers fast, reliable, and seamless patron screening. This solution unobtrusively scans patrons for guns, knives, and other prohibited items as they enter the facility, using AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort. The system was designed for large, ticketed venues to enable high throughput and a brand-enhancing patron experience. With Xtract One, AAPB will eliminate long entry lines, allowing fans to quickly, and safely, enter the venue and enjoy the event. Safe and enjoyable experience “The AAPB is all about family experiences, family fun, good times, and great memories. Our top priority is to enhance these experiences and to continue expanding our offerings,” said Joshua Schaub, Commissioner of the American Association of Professional Baseball. “We are delighted to partner with Xtract One on this journey to deliver an even safer and more enjoyable experience for all.” Weapon detection technology solution Xtract One’s ability to bolster security measures while ensuring an optimised entry process for patrons In its exclusive role, Xtract One will work closely with AAPB to deploy cutting-edge security and weapon detection technology solutions tailored to the league’s needs and dynamic, family-centric venues. Xtract One’s ability to bolster security measures while ensuring an optimised entry process for patrons aligns with the league’s mission of prioritising safety without compromising the fan experience. Enhance patient safety “We are thrilled to be partnering with AAPB as their exclusive preferred supplier. We look forward to helping enhance the overall safety for guests at upcoming games while elevating their game-day experience to a whole new level,” said Peter Evans, CEO of Xtract One. “Together with AAPB, we are pleased to be contributing to the vibrant, enjoyable experiences AAPB provides to fans and families.”
An air of excitement circled the Gallagher Security booth at the recent TSE event in Birmingham, as the award-winning, global security manufacturer demonstrated the latest innovations in their security ecosystem. The annual event, held from 30 April – 2 May which attracted more than 14,000 visitors to Birmingham’s NEC, brought together manufacturers, distributors, installers, consultants, and end users, and displayed the latest products, technologies, and solutions from the world’s security brands. Controller 7000 Single Door Gallagher showcased their Controller 7000 (C7000) released on November 2023 and the Controller 7000 Single Door, as well as their high-security solutions, but the demonstration that got visitors talking was the recently released employee badge in Apple Wallet, available with Gallagher’s latest version of their award-winning site management software, Command Centre v9.10. Gallagher Security Regional General Manager UK and Europe, Richard Huison says, “TSE was an excellent opportunity to showcase our evolving Gallagher Security ecosystem including the recently released employee badge in Apple Wallet." Safeguarding people, places, and assets "We also observed a growing interest in our Automatic Access Control Systems (AACS), and Cyber Assurance of Physical Security Systems (CAPSS) approved high-security solutions." "There was a growing consciousness among businesses about the importance of safeguarding their people, places, and assets to the highest standard.” Access control in critical infrastructure TSE proved to be a networking opportunity with channel partners, end users, and other professionals Richard joined a panel hosted by security influencer Lee Odess, where they discussed access control within the critical infrastructure sector. Gallagher Security Sales Manager UK South, Gordon Swallow also joined the ASIS International UK panel, to discuss the true value of a security system in the procurement journey. Among the solution demonstrations and panel discussions, TSE proved to be another excellent networking opportunity with channel partners, end users, and other security industry professionals using the event as a platform to share insights and connect. End-to-end solutions “These events are always valuable in terms of understanding the changing needs of our customers and the wider industry." "There were many conversations about the shift to end-to-end solutions and the speed and security they provide, plus plenty of discussion around mobile/digital wallets and the enhanced convenience and flexibility they offer,” says Richard. Employee badge in Apple Wallet Employee badge in Apple Wallet is fully integrated with Gallagher Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. It is available for approved Gallagher customers in the United States with global availability to be announced soon.
The Electronic Security Association (ESA) proudly announces that Michael Barnes was elected as Treasurer and will serve as Chairman of the ESA Finance Committee following the ESA Board of Directors' meeting on November 30, 2023. Barnes succeeds Kevin Stone, who assumes the role of Chairman-Elect from 2023 to 2024. "I’m delighted that Michael Barnes will serve as Treasurer and Finance Committee Chairman for ESA,” says Kevin Stone, ESA Chairman-Elect and COO of Doyle Security Systems. “It’s an exciting time for the ESA membership and we’re fortunate to have Michael’s experience and Industry knowledge.” Implementation of policies The purpose of a Treasurer is to work collectively to provide good governance of ESA affairs The purpose of a Treasurer is to work collectively to provide good governance of ESA affairs and to set the organisation’s direction to optimise the growth and performance of the organisation. Each Board Member has a responsibility for ensuring strategies and policies that are developed, discussed, and implemented will enable the organisation to achieve its mission and vision — and to monitor the organisation’s implementation of those strategies and policies. Author's quote "Michael has been an integral part of the ESA Board of Directors and Finance Committee. I am thrilled he has agreed to lend his talent by serving in this important role,” says Merlin Guilbeau, Chief Executive Officer of ESA. “His dedication to ESA’s mission, and strong financial expertise will complement the progress made thus far and drive results that positively impact our members." Prior roles of Barnes As an asset banker and advisor to security alarm firms, he has helped shape the industry Barnes' security industry career has spanned more than 35 years. As an investment banker and advisor to security alarm companies, he has helped shape the industry. Barnes has been involved in more than 280 security alarm acquisitions, with an aggregate transaction value of more than $29 billion. Additionally, he has pioneered various analysis techniques that have helped the industry better define how it performs and creates value, which has allowed the industry to be more efficient in raising capital. Barnes-Buchanan Conference Currently, Barnes serves as the president of Barnes Associates Inc., a brokerage, advisory, and consulting firm he founded in 1986, which focuses on the security alarm industry. He also lectures at numerous events on matters relating to acquisitions, the availability of capital and the operating dynamics and performance of alarm companies. These events include the annual Barnes-Buchanan Conference which the firm co-sponsors. Barnes was the 13th person to be inducted into the SSI Security Alarm Industry Hall of Fame, an honour he received in 2004. Barnes is eager to put his talents and expertise to further benefit the industry as Treasurer. Author's quote “First off, I want to thank Kevin Stone for doing such a great job in this role. His efforts, along with those of all the other prior Treasurers, make my job much easier,” says Michael Barnes, ESA Treasurer and Founding Partner of Barnes Associates, Inc. ESA has always had a highly active and capable roster of Officers, and Kevin is a perfect example “ESA has always had a highly active and capable roster of Officers, and Kevin is a perfect example. It is no surprise that he is the newly elected Chairman. I am excited to expand my efforts with ESA to include serving as Treasurer and Finance Committee Chair. It is an honour. ESA is such a great organisation, and I enjoy addressing longer-term industry and association issues as a member of the Board of Directors, but this role will allow me to have greater contact with the staff and be closer to the operating details." Financial sectors for ESA By building the initiatives ESA already has in progress, Barnes will support ESA’s Board of Directors with his expansive knowledge and expertise, helping predict what the industry will be doing across a variety of financial sectors for ESA and its members to prepare and plan accordingly. Barnes wants to leave ESA and its members in an even better position for continued growth and success in the future.
Intelligent power management company Eaton announced its latest innovation in connected backup power and cybersecurity with the North American launch of its Gigabit Network Card (Network-M3). Network-M3 card The Network-M3 card features all the enhanced capabilities customers expect from Eaton Gigabit Network Card technology and adds new, innovative features to help organisations meet their unique cybersecurity needs. With capabilities for web-based monitoring and alerts, the Network-M3 card provides valuable insights into IT power usage, reshaping the way IT teams monitor and control their power systems as security needs evolve. Enhanced protection against cyberattacks Increase the number of smart devices on their network, they face more opportunities for cyber threats" “As IT managers continue to embrace enhanced connectivity and increase the number of smart devices on their network, they face more opportunities for cyber threats,” said James Martin, global connectivity product manager, at Eaton. “We’ve designed the Network-M3 card to offer enhanced protection against cyberattacks while also providing the comprehensive power management needed to boost performance.” Cybersecurity Cybersecurity continues to be a growing threat across the globe, with the risk of attack rising as the number of connected devices and IoT devices is expected to grow to more than 41.6 billion by 2025. According to IBM’s 2023 Cost of a Data Breach Report, the average global cost of a data breach in 2023 was $4.45 million, a 15% increase over three years, making it imperative that IT managers leverage connected infrastructure designed with the highest levels of cybersecurity protection. Security and reliability Network-M3 card simplifies the management and security of critical infrastructure With its secure boot process, user-configurable firewall, and zero-touch provisioning, the Network-M3 card can easily detect intrusions and ensure a high level of security and reliability for uninterruptible power supplies (UPSs) and power distribution units (PDUs). As the only network card on the market with UL 2900-1 and IEC 62443-4-2 cybersecurity certifications, the Network-M3 card simplifies the management and security of critical infrastructure by providing a flexible cybersecurity solution that can authenticate any attached firmware, preventing a cyberattack from spreading when a threat exists. Features of the Network-M3 card Chain-of-trust encryption and secure firmware boot capability, preventing the Gigabit Network Card from being a cyberattack vulnerability point on a network, with firmware updates available at no cost to the user. A user-configurable firewall that provides an additional layer of security to protect the Gigabit Network Card and the UPS or PDU from unauthorised access and cyberattacks. Remote storage of security keys, making the device tamper-resistant even in cases of physical breaches. Zero-touch provisioning and auto-configuration commissions devices faster to save time in large-scale deployments. Support of 10/100/1000 Mbps for diverse compatibility. Certificate manager for easy creation and distribution of digital certificates to multiple devices. Automation capabilities In addition to built-in web-based monitoring capabilities and alerts, the Network-M3 card can integrate with the software in Eaton’s Brightlayer Data Centres suite, empowering IT teams to streamline operations and prepare for future needs. The harmony between hardware and software delivers an array of automation capabilities and remote management functionality, reducing response times to power issues and ensuring timely updates that bolster cybersecurity defences. Additionally, the card seamlessly integrates with Eaton’s cloud-based remote monitoring service that aggregates data from Eaton UPSs and dispatches an Eaton field technician when critical events occur.


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Gunnebo Entrance Control solutions have been installed at travel software and technology specialist Sabre’s remodelled office in Uruguay, to ensure the safety and well-being of its employees, clients and visitors. As a global technology company serving the travel industry, Sabre’s innovative software has revolutionised the way personalised travel experiences can be delivered, pioneering to an increasingly digital and interconnected world. Entrance control requirements With its visionary approach and dedication to customer success, its base in Uruguay is currently home to over 800 staff. To help Sabre meet its entrance control requirements, Gunnebo was invited to work with Abelenda Hermanos as a security system supplier to design and install a comprehensive solution, created to optimise access control whilst maintaining a seamless flow of people. Author's quote By proactively working with Gunnebo Entrance Control we were able to design a system" Says Natalie Sarmiento, Sabre Security & Safety Manager: “Our vision is always to connect people with travel experiences that matter most. And in doing so, our team is the most important part of our business to think differently and make this happen for our customers. We needed to ensure their security on-site in our remodelled office in Uruguay, with the highest standards." She adds, “By proactively working with Gunnebo Entrance Control we were able to design a system that easily blended with its surroundings, while coexisting with the welcoming environment we wanted to create for our employees and our guests. This is something that flows throughout our offices and has been received well by all on site.” Gunnebo's entrance control solutions Gunnebo Entrance Control worked closely with Sabre to create a bespoke entrance control solution, incorporating its latest sleek design SpeedStile FP 1200 EV speed gates, finished in full stainless steel grade 304, to operate six lanes in place. By implementing Gunnebo's entrance control solutions, Sabre has significantly enhanced security measures, reducing the risk of unauthorised access without compromising on speed or aesthetic design. Gunnebo SpeedStile system Real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation" Says Omar Ferrero, Director at Abelenda Hermanos: “It was an absolute pleasure to work with Sabre and install entrance control for the benefit of its staff and guests. The real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation, together with its use of advanced technology to balance speed, security and design. The finish is stylish and maintains the highest level of safety for all who work and visit the new facilities.” Gunnebo's SpeedStile FP 1200 EV system enhances security and optimises the flow of people in office environments. The system's high throughput capability ensures efficient traffic management, allowing for swift and smooth access for authorised individuals. Customised security solutions Equipped with intelligent sensors, it provides accurate and reliable entrance control, effectively preventing tailgating. Additionally, the system's customisable design options enable integration with the surrounding architecture, enhancing the aesthetic appeal of the new headquarters. Thomas Axelson, Gunnebo Partner Network Manager – LATAM concluded: “The successful installation of Gunnebo’s entrance control solutions at Sabre’s offices in Uruguay highlights our capability to deliver customised security solutions. We will work with our clients and installers right from the initial design stage to project completion to deliver a solution that presents the highest level of security whilst maintaining a welcoming feel. We are thrilled with the results and proud to support Sabre as they continue their mission to make travel happen across the globe.”
Amthal has come to the rescue of Katherine Warington School, taking over the support and remote monitoring of fire safety and security services for the benefit of staff, pupils and visitors. Based in Harpenden, Katherine Warington School is a brand-new secondary school that opened in 2019 and welcomed its first cohort of 180 year-seven students in September of that year, before moving into a completed main building in the summer of 2020. Honeywell Gent solution Following a storm that damaged the school’s fire alarm system, the school consulted with Amthal to rectify the situation. Amthal recommended a specialist Honeywell Gent solution to restore the system to full functionality. Amthal continued to monitor the site remotely, working with the management team to service and support security, which included updating the intruder alarm system and access control. Each is now supported to the highest possible standards to create a safe learning environment enabling "every student to make outstanding progress, whatever their starting point.” Safe and secure learning environment It is also developing as a hub for the local area to enjoy and share in our exceptional facilities" Dean Inns, Katherine Warington School’s Business Manager, said: “Our school fosters a learning culture that rewards effort, inspires learning and engenders a shared belief amongst all members of our school that they are equipped to thrive in a changing world. It is also developing as a hub for the local area to enjoy and share in our exceptional facilities." Dean Inns adds, “To achieve this, we must offer a safe and secure learning environment for our staff, pupils and the wider community. This is where Amthal really came into its own, quickly responding when the storm damaged our life safety systems and continuing to work with us to enhance our security. Our continued collaboration reflects our dedication to maintaining a secure and conducive learning environment." Security and fire safety Amthal’s team works closely with Katherine Warington School and continues to monitor security and fire safety on site. Conducting continuous risk assessments, providing bespoke recommendations and delivering training to staff to ensure the seamless integration and maximum utilisation of all safety and security systems in place. Paul Rosenthal, Amthal Sales Director, stated: “Amthal’s expertise in delivering integrated solutions in education settings played a crucial role in securing the project. We were able to identify requirements quickly and efficiently, working around learning environments. The fire safety system, working with our partners at Honeywell Gent ensures early detection capability and enables a prompt response in case of emergencies." Safe educational setting The need for an enhanced intruder alarm was clear, to ensure the protection of the premises" Paul Rosenthal adds, “When we took over the service, support and remote monitoring, the need for an enhanced intruder alarm was clear, to ensure protection to the premises, in and outside of school hours." He continues, "Our continued partnership has also led to us updating the access control on site as the school continues to support young people to thrive, and welcomes its neighbours from the local area to take advantage of the facilities in a safe educational setting.” Advanced security solutions Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB), United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Gunnebo Entrance Control solutions have been installed at travel software and technology specialist Sabre’s remodelled office in Uruguay, to ensure the safety and well-being of its employees, clients and visitors. As a global technology company serving the travel industry, Sabre’s innovative software has revolutionised the way personalised travel experiences can be delivered, pioneering to an increasingly digital and interconnected world. Entrance control requirements With its visionary approach and dedication to customer success, its base in Uruguay is currently home to over 800 staff. To help Sabre meet its entrance control requirements, Gunnebo was invited to work with Abelenda Hermanos as a security system supplier to design and install a comprehensive solution, created to optimise access control whilst maintaining a seamless flow of people. Author's quote By proactively working with Gunnebo Entrance Control we were able to design a system" Says Natalie Sarmiento, Sabre Security & Safety Manager: “Our vision is always to connect people with travel experiences that matter most. And in doing so, our team is the most important part of our business to think differently and make this happen for our customers. We needed to ensure their security on-site in our remodelled office in Uruguay, with the highest standards." She adds, “By proactively working with Gunnebo Entrance Control we were able to design a system that easily blended with its surroundings, while coexisting with the welcoming environment we wanted to create for our employees and our guests. This is something that flows throughout our offices and has been received well by all on site.” Gunnebo's entrance control solutions Gunnebo Entrance Control worked closely with Sabre to create a bespoke entrance control solution, incorporating its latest sleek design SpeedStile FP 1200 EV speed gates, finished in full stainless steel grade 304, to operate six lanes in place. By implementing Gunnebo's entrance control solutions, Sabre has significantly enhanced security measures, reducing the risk of unauthorised access without compromising on speed or aesthetic design. Gunnebo SpeedStile system Real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation" Says Omar Ferrero, Director at Abelenda Hermanos: “It was an absolute pleasure to work with Sabre and install entrance control for the benefit of its staff and guests. The real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation, together with its use of advanced technology to balance speed, security and design. The finish is stylish and maintains the highest level of safety for all who work and visit the new facilities.” Gunnebo's SpeedStile FP 1200 EV system enhances security and optimises the flow of people in office environments. The system's high throughput capability ensures efficient traffic management, allowing for swift and smooth access for authorised individuals. Customised security solutions Equipped with intelligent sensors, it provides accurate and reliable entrance control, effectively preventing tailgating. Additionally, the system's customisable design options enable integration with the surrounding architecture, enhancing the aesthetic appeal of the new headquarters. Thomas Axelson, Gunnebo Partner Network Manager – LATAM concluded: “The successful installation of Gunnebo’s entrance control solutions at Sabre’s offices in Uruguay highlights our capability to deliver customised security solutions. We will work with our clients and installers right from the initial design stage to project completion to deliver a solution that presents the highest level of security whilst maintaining a welcoming feel. We are thrilled with the results and proud to support Sabre as they continue their mission to make travel happen across the globe.”
Amthal has come to the rescue of Katherine Warington School, taking over the support and remote monitoring of fire safety and security services for the benefit of staff, pupils and visitors. Based in Harpenden, Katherine Warington School is a brand-new secondary school that opened in 2019 and welcomed its first cohort of 180 year-seven students in September of that year, before moving into a completed main building in the summer of 2020. Honeywell Gent solution Following a storm that damaged the school’s fire alarm system, the school consulted with Amthal to rectify the situation. Amthal recommended a specialist Honeywell Gent solution to restore the system to full functionality. Amthal continued to monitor the site remotely, working with the management team to service and support security, which included updating the intruder alarm system and access control. Each is now supported to the highest possible standards to create a safe learning environment enabling "every student to make outstanding progress, whatever their starting point.” Safe and secure learning environment It is also developing as a hub for the local area to enjoy and share in our exceptional facilities" Dean Inns, Katherine Warington School’s Business Manager, said: “Our school fosters a learning culture that rewards effort, inspires learning and engenders a shared belief amongst all members of our school that they are equipped to thrive in a changing world. It is also developing as a hub for the local area to enjoy and share in our exceptional facilities." Dean Inns adds, “To achieve this, we must offer a safe and secure learning environment for our staff, pupils and the wider community. This is where Amthal really came into its own, quickly responding when the storm damaged our life safety systems and continuing to work with us to enhance our security. Our continued collaboration reflects our dedication to maintaining a secure and conducive learning environment." Security and fire safety Amthal’s team works closely with Katherine Warington School and continues to monitor security and fire safety on site. Conducting continuous risk assessments, providing bespoke recommendations and delivering training to staff to ensure the seamless integration and maximum utilisation of all safety and security systems in place. Paul Rosenthal, Amthal Sales Director, stated: “Amthal’s expertise in delivering integrated solutions in education settings played a crucial role in securing the project. We were able to identify requirements quickly and efficiently, working around learning environments. The fire safety system, working with our partners at Honeywell Gent ensures early detection capability and enables a prompt response in case of emergencies." Safe educational setting The need for an enhanced intruder alarm was clear, to ensure the protection of the premises" Paul Rosenthal adds, “When we took over the service, support and remote monitoring, the need for an enhanced intruder alarm was clear, to ensure protection to the premises, in and outside of school hours." He continues, "Our continued partnership has also led to us updating the access control on site as the school continues to support young people to thrive, and welcomes its neighbours from the local area to take advantage of the facilities in a safe educational setting.” Advanced security solutions Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB), United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”


Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products


White papers

Integrated access control: reap the benefits of connected security
Download
Choosing the right storage technology for video surveillance
Download
The role of access control in a safe return to the workplace
Download
Boosting on-site safety and security
Download
RFID and smartphone readers in physical access control
Download
Preparing your organisation with quality situational awareness
Download
Managing security in the age of boundaryless working
Download
The welcoming workplace
Download
Access and security in the age of hybrid working
Download
The benefits of Edge AI + Cloud for security systems
Download
11 advantages of a combined system for access control and intrusion
Download
Integrated access control: reap the benefits of connected security
Download
Choosing the right storage technology for video surveillance
Download
The role of access control in a safe return to the workplace
Download
Boosting on-site safety and security
Download
RFID and smartphone readers in physical access control
Download
Preparing your organisation with quality situational awareness
Download
Managing security in the age of boundaryless working
Download
The welcoming workplace
Download
Access and security in the age of hybrid working
Download
The benefits of Edge AI + Cloud for security systems
Download
11 advantages of a combined system for access control and intrusion
Download
Integrated access control: reap the benefits of connected security
Download

Videos
Office security systems: Manufacturers & Suppliers

7 proven solutions for law enforcement key control and asset management
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download
Guide for HAAS: New choice of SMB security system
Download
The truth behind 9 mobile access myths
Download