Office security
Trane Technologies, a global climate innovator, has been recognised in Corporate Knights’ 2025 Global 100 ranking. This is the third time Trane Technologies has been featured on this annual list, which recognises companies for their investments in green solutions such as renewable energy, energy efficiency, and the circular economy. sustainable future "It’s an incredible honor to be recognised in Corporate Knights’ 2025 Global 100 ranking," said Mauro Atalla, Senior Vice Pre...
Euralarm will organise a live webinar on the overhaul of EN 50131-1 on November 7th at 16:00 - 17:30 CET. To protect people, businesses, and resources against burglary and robbery, the use of intrusion and hold-up alarm systems is widely spread. Many homes and buildings are equipped with such a system. The requirements for the design of these are laid down in the European standard EN 50131-1. Technologies requirements With technology evolving and remote access, cloud processing, smart h...
Mayflex, the distributor of Converged IP Solutions, has opened a new London office and demonstration room based at Portsoken House, 155 – 157 Minories, London, EC3N 1LJ. Located in the heart of the City of London this prestigious office and demonstration area provides the perfect location to host meetings and showcase an extensive range of products including Excel, Nubis, Axis, Avigilon Alta and Unity, Hikvision, Milestone, Paxton, Pelco, Ruijie and Reyee, STP, and Suprema. N...
At the Global Security Exchange (GSX) show in Orlando, Florida, Sept. 23-25, Snap One, will exhibit a range of networking, power distribution and remote management solutions designed to enhance both the performance of professionally installed security systems, as well as the integrator experience. The highlights of the exhibit are the new WattBox 820 Series IP controllable power distribution units (PDUs) on display, a “Tower of Power” equipped with a variety of WattBox products, al...
Wavelynx Technologies, a trailblazer in advanced, secure, and versatile reader and credential solutions, showcases its Wallet solution at the Global Security Exchange (GSX) trade show in Orlando, FL, September 23-25, 2024. Wavelynx Wallet transforms mobile devices into secure credentials, bringing access control into the mainstream and paving the way for future credential management. The system enhances security across various facilities and introduces a new level of convenience, reflecting so...
Advantech, a global pioneer in industrial IoT and embedded computing solutions, has officially inaugurated its expanded regional office in Singapore. This strategic investment is set to enhance Advantech's core competencies within the ASEAN region. Singapore office Located at 7002 Ang Mo Kio Avenue 5, the new office will double the company’s current facility space, enhancing its infrastructure to meet the rising demand for high-technology solutions, particularly in the semicon...
News
ThinCats, the alternative finance provider to mid-sized SMEs has supported Ranger Fire and Security with their latest acquisition of fire door business, Fire Door Specialists Ltd (FDS). First acquisition Ranger, which launched in February 2024, has already acquired four other businesses following Transitional Capital from ThinCats and private equity backing from Hyperion Capital – all in the active fire space – AFIL Ltd, Ignis Fire Protection Ltd, Syncro Group Ltd and IPH Fire Solutions Ltd. This is Ranger’s first acquisition in the passive fire safety space, broadening out the Group’s offering beyond active fire safety. Fire door compliance Ian will join the senior leadership team at Ranger Fire and Security, supporting the Group’s growth Based in Nottinghamshire, but offering national coverage, FDS provides comprehensive fire door compliance, including building inspections, fire door maintenance, and installation. FDS boasts a wealth of experience equating to more than 150 years in the fire and safety industry. Led by Operations Director Ian Maciejewski, FDS has expanded rapidly over the past few years, with the company broadening its services to cater to all types of buildings, student accommodation, schools, factories, and offices. Ian will join the Ranger Fire and Security senior leadership team, supporting the Group’s growth over the coming years. Inspections and maintenance Ranger evaluated numerous fire door companies before identifying FDS as the passive fire business that best met its stringent criteria and guardrails, including employing skilled engineers, delivering high-quality service, and consistently showing strong growth in its inspections and maintenance services. It also has an existing long-standing, reputable client base, including the NHS and Ministry of Defence. One-stop solution FDS will benefit from the Group’s scale, technology, and broader services, which will enhance its customer offering The acquisition of FDS is a key part of Ranger’s aim to provide quality service for its clients and a comprehensive one-stop solution by offering all fire and security services under one umbrella. FDS will benefit from the Group’s scale, technology, and broader services, enhancing its customer offering. While Ranger’s longer-term strategy continues to be actively fire-focused, the acquisition of FDS complements the Group’s existing service propositions and enhances its customer experience. Funding for the acquisition was provided by ThinCats. New and key service Stuart Thompson, Head of Transitional Capital, ThinCats, “We're delighted to be supporting Ranger with another acquisition. Mark and his team continue to expand their services and are fast becoming a national player in the industry.” Mark Bridges, CEO of Ranger Fire and Security, said, “Fire Door Specialists is a well-known, respected business in the passive fire space that will add a new and key service to the Ranger Group. This acquisition marks another milestone for Ranger in our journey to provide the highest quality, complete service offering and opens up significant cross-selling opportunities." Maintenance-focused business offering “We are excited to welcome Ian and his team to the Group. As we continue to grow, Ranger remains a dynamic, maintenance-focused business offering a turnkey solution for all fire and security services across the UK and Ireland.” Ian Maciejewski, Operations Director at Fire Door Specialists, said, "Our decision to partner with Ranger was an easy one – it’s a company I have admired since its launch and presents huge opportunities for our business." High-quality service Ranger to enhance its offering in all key areas of fire and security services, such as fire detection and alarms “Ranger is the best partner for us going forward given our shared focus on providing a high-quality service for customers, and I look forward to working closely with Mark and the team to grow Fire Door Specialists while enhancing our systems and insights, fostering collaboration and exploring new avenues of growth." The announcement builds on Ranger Fire and Security’s previous acquisitions of AFIL, Ignis Fire Protection Ltd, Syncro Group Ltd, and IPH Fire Solutions Ltd, which together have helped Ranger to enhance its offering in all key areas of fire and security services, such as fire detection and alarms, extinguisher maintenance, suppression, and security services. Fire and safety solution provider Since launching in 2024, with backing from the private investment firm Hyperion Equity Partners, and Transitional Capital from ThinCats, Ranger has embarked on a mission to establish itself as the pioneering one-stop solution provider in the fire and safety sector, offering a comprehensive range of services through both regional and national operations, and providing a seamless customer experience.
The revolutionary approach to mobile access taken by ABLOY CUMULUS has been recognised by ISJ’s 2024 Leaders in Security Awards. ABLOY CUMULUS was named the 2024 winner in the Innovation Initiative category, which recognises a solution that may be “put together with ethical and sustainable considerations in mind, has a direct impact on operational outcomes, is flexible for users, or facilitates collaboration”. ABLOY CUMULUS ABLOY CUMULUS is a new keyless access solution, part of the Digital Access Solutions portfolio at ASSA ABLOY Opening Solutions EMEIA. With CUMULUS, user mobile phones eliminate key management hassles, enabling authorisations to be issued and amended quickly and conveniently on a user’s smartphone. Their personalised, encrypted mobile credential unlocks any authorised ABLOY CUMULUS device, wherever it is located. Keyless access solutions CUMULUS Controller brings mobile unlocking via Bluetooth to any electric or electronic lock from any brand The ABLOY CUMULUS product range covers keyless access solutions. Native ABLOY CUMULUS devices are certified for outdoor use in even the harshest climates. The range includes a battery-powered padlock; a key deposit for accessing mechanical keys e.g. maintenance purposes; and a robust new swing handle that brings mobile access to outdoor cabinets. In addition, the revolutionary CUMULUS Controller brings mobile unlocking via Bluetooth to any electric or electronic lock from any brand, with compatible wiring. Situational awareness This new solution helps businesses minimise costs and the security threats associated with lost keys or with the distribution and misuse of unauthorised credentials. Every locking device provides extensive audit trails to improve a business’ situational awareness. The system is used with a convenient mobile application and can administered using any integrated software tool, such as ASSA ABLOY Access. Access management anywhere Because the solution requires no continuous network coverage, it operates in even the remote locations Because the solution requires no continuous network coverage – for either the locking device or the mobile phone – it operates in even the most demanding or remote locations. This gives new organisations the wide-ranging security and convenience benefits of a mobile access solution. For many such customers, until now, only key-based digital access or mechanical solutions have been suitable. Customisable solution Like ASSA ABLOY’s other convenient mobile solutions, ABLOY CUMULUS makes access more fluid. Relying on the user’s smartphone for unlocking removes any need for physical key management. ABLOY CUMULUS is completely customisable: with modern APIs and SDKs for smartphone app development, the solution can become part of each customer’s needs in a way specific to their organisation. CUMULUS may also be managed with ASSA ABLOY Access. Innovation through easier integration “ABLOY CUMULUS was built API-first which means it is easy to integrate with various access management systems, booking or workflow management software, and much more,” explains Hanna Sillanpää, Head of ABLOY Digital Solutions Product Unit at ASSA ABLOY Opening Solutions EMEIA. “This innovative approach is completely different from the typical method of developing access and security solutions. Our API-first approach, combined with SDKs and the portfolio of locking devices, enables CUMULUS to become part of our customers’ important business processes.” ISJ Leaders in Security Awards The annual ISJ Leaders in Security Awards celebrate select pioneers and solution excellence across the industry The annual ISJ Leaders in Security Awards celebrate select pioneers and solution excellence across the industry. They are judged by a panel of senior experts from around the world. “We are thrilled to learn that a prestigious jury considered ABLOY CUMULUS, in their words, ‘a unique solution with a refined methodology that has been provided to proactively address not just immediate vulnerabilities and issues, but future challenges’." Digitising access "With ABLOY CUMULUS, access changes from a security function to a powerful, reliable business enabler,” she adds. “If you can imagine it, ABLOY CUMULUS can help you do it, digitalising your access to make it ready for what’s ahead.”
The opening of Reliance High-Tech’s new £2m corporate headquarters in Bracknell, Berkshire was marked at a recent event attended by customers, employees, and partners. Customer Innovation Centre Reliance High-Tech’s Group Chairman and Founder, Brian Kingham, alongside CEO Alistair Enser, greeted guests from around the UK in the company’s dedicated customer Innovation Centre, which draws on the latest technology to show how organisations can take advantage of developments to not only protect their people, assets, and reputations but also gain operational efficiencies. It’s also a space for Reliance’s partners and customers to hold their meetings and events, taking advantage of a convenient location and excellent travel links. Business transformation Alistair highlighted the transformation of the business over the years as it has extended its reach Alistair highlighted the transformation of the business over the years as it has extended its reach beyond security systems alone to solutions that drive more value to the customer. He commented, “Over the past 40 years Reliance High-Tech has been at the forefront of the security industry, keeping pace with its evolution by placing importance on innovation and adapting to new opportunities." Technology advancements "The industry is once again experiencing change with rapid advancements in technology and in response to that we have invested in our business to ensure we are future-ready." "This building is part of that investment, allowing us to help our clients stay ahead of the game and see ‘the art of the possible’ for their own business." New office offerings The new offices on Bracknell’s Easthampstead Road offer more space to meet with customers who visit from across the UK and beyond and provide a base for Reliance High-Tech’s support staff, sales, marketing, administrative and financial functions. The comfortable and flexible space will meet the needs of everyone from the firm’s latest intake of apprentices to the entire executive team. As the firm operates nationwide, it also has offices in Manchester, Pontefract, and Glasgow.
Exein, the embedded IoT cybersecurity company, has raised €15m in a Series B round. The round was led by 33N, a specialised investor in cybersecurity and infrastructure software, and joined by Partech. Global expansion The round also saw continued support from existing investors United Ventures, eCAPITAL, and Future Industry Ventures (a Redstone/SBI fund). The fresh capital will drive Exein’s ambitious global expansion plans across Europe, the US as well as Asia where a new office in Taipei will spearhead growth in the region. Exein's headcount is also expected to double within the next year. IoT security Embedding advanced security creates a digital immune system for each device, securing it independently Exein revolutionises IoT security by focusing on the device level rather than the network level, embedding advanced security measures directly into the device software. This approach creates a digital immune system for each device, securing it independently. Endpoint approach Unlike traditional network-based security methods, Exein's endpoint approach emphasises securing individual devices rather than relying solely on network defences. This decentralised approach ensures that manufacturers can seamlessly integrate cutting-edge security into their products, safeguarding devices from cyber threats and ensuring compliance with stringent global cybersecurity regulations being implemented. Advanced AI Exein also leverages advanced AI at the edge to enhance protection, enabling real-time threat detection and response directly on the device. This innovative use of AI ensures that security measures are not only advanced but also adaptive and proactive, providing a robust defence mechanism tailored to the specific needs of each manufacturer. Embedded security Exein has forged strong partnerships with industry players such as SECO, ARM, NVIDIA, AWS, and Lattice Semiconductor Exein's technology is integral to all Yocto Project initiatives. Yocto is a major force in the embedded Linux sector, operating on six billion devices annually. This endorsement positions Exein as an essential security component in the market, solidifying its position as the industry standard for embedded security. Since its founding in 2018, Exein has forged strong partnerships with important industry players such as SECO, ARM, NVIDIA, AWS, and Lattice Semiconductor, continually expanding its presence and impact in the market with millions of devices already running with Exein security on board. Seamless security solution Gianni Cuozzo, Founder & CEO, Exein states, "Embedded security is now recognized as essential." "We are already living in a digital world and connected devices permeate every aspect of our lives, from homes and cars to cities and critical infrastructure. Manufacturers need advanced, seamless embedded security, and Exein delivers just that." Security-by-design "We have always advocated for security-by-design as the only viable approach to connected device security and I am proud that we have pioneered a decentralised approach to security." "In our increasingly connected world, every device must be equipped with cutting-edge cybersecurity capabilities and I am excited to expand our presence across Europe, the US, and Asia, driven by our mission to create a safer digital world.” State-of-the-art cybersecurity Commenting on their investment, Carlos Alberto Silva, Managing Partner, 33N, adds, “Our investment in Exein reflects our commitment to back the most innovative cybersecurity companies in Europe and beyond. There is exponential growth in the number of connected devices, especially in high-risk industries like robotics, space infrastructure, and biotechnology, all of which require state-of-the-art security." "Exein saw this opportunity well before anyone else in the market. They have developed technologies that set the global standard for embedded cybersecurity. With the rise of regulatory frameworks worldwide, the demand for embedded security will only increase, and Exein is poised to lead this critical market.”
HID®, a pioneer in trusted identity solutions announced an extended partnership with its trusted partner Inner Range, a global provider of integrated access control systems and solutions, to offer Inner Range customers a new range of SIFER credentials compatible with wallet-enabled readers, based on HID’s signature line of access control readers, HID Signo®. Mobile access “The sheer opportunity to further deepen collaboration with our partners excites us,” says Steve Katanas, Regional Head for HID Physical Access Control Solutions, ANZ. "Mobile access is rapidly becoming a dominant force in reshaping the physical access security industry and we are glad to be able to extend the mobile access in wallet solution to Inner Range to solidify its position as an integrated access control solutions provider globally." Sustainable, and future-proof identity solutions Katanas adds, “Inner Range customers will get all the benefits of adding mobile credentials in Apple or Google Wallet (and other OEM wallets shortly), designed for the future of the workplace." "I’m excited by the potential of this technology partnership, as we continue to collaborate on future projects, enabled by HID’s secured, sustainable, and future-proof identity solutions.” Encryption and security protocols The in-wallet solution powered by HID Mobile Access provides a pioneering user experience Leveraging HID’s wallet-enabled readers, Inner Range enriches its reader product portfolio, providing its customers an additional choice of adding HID mobile credentials to their wallet, giving employees, tenants, and visitors secure and easy access to office spaces, meeting rooms, printers, lockers and other facilities with a tap of their smartphone or smartwatch near the Inner Range SIFER- enabled readers, powered by HID Signo. The in-wallet solution powered by HID Mobile Access provides a pioneering user experience while employing advanced encryption and security protocols to ensure that access to facilities is both safe and secure. Seamless user experience “We are delighted with the success of our recent collaboration with HID. At Inner Range, providing our customers with a seamless user experience is a core objective for our security solutions,” says Gabriel Daher, VP and GM of Inner Range. "Adding SIFER credential support to the HID Signo reader achieves this perfectly and provides a significant opportunity for Inner Range and our channel by offering future-proof solutions that incorporate both our technologies." Cutting-edge technology Daher adds, “This strategic partnership is a significant milestone that underscores our commitment to leveraging cutting-edge technology to deliver exceptional value to our customers." "We are excited to share this groundbreaking news with our current and prospective clients, confident that it will exceed their expectations. As we continue to strengthen our alliance with HID, we are eager to embark on future projects that promise to harness the full potential of HID technology, with details to be revealed in due course.”
Bank security is one of the key topics of Security Essen 2024. On September 19, the “Day of Banks and Savings Banks” showcases practical solutions for financial institutions. Recent events have underlined the urgent need for action in this area. Julia Jacob, Project Manager at Security Essen, states, "With the right measures, the number of explosive attacks in some regions of Germany has been reduced by up to 80 percent. Our experts will showcase the most promising options, products, and strategies during this event." Expert comments Among others, these insiders share their knowledge at the debut of Bank and Savings Bank Day: Thomas Stieff from the Federal Criminal Police Office will kick off the event. He'll introduce the "German Initiative to Reduce Attacks on ATMs," a project where the Federal Police, Federal Ministry of the Interior, insurers, and other stakeholders collaborate to significantly reduce explosive attacks on ATMs through innovative protective measures. Sven Bertelmann from the Bundesbank follows with insights on "Experiences with Ink-Dye Banknotes". These systems color cash in the event of an attack to make it unusable and thus reduce the incentive to commit a crime. At 11 a.m., several experts will discuss how banks can stay ahead of criminals. They will focus in particular on the importance of European standards that assess the resistance of products to mechanical, electronic, and cyber attacks. Among others, panelists include Detlef Lücke, member of CEN/TC 263/WG 3 "HighSecurity Locks" and Falko Adomat, liaison member of CEN/TC 33/WG 7"Intrusion Protection". Presentations to protect financial institutions Trade visitors can look forward to five elevator pitches from 11:30 am. Here, companies will briefly present their innovative products for even more protection in financial institutions. These include new energy-absorbing modules against explosives, the first high-speed door in resistance class RC4, high-security safe locks, and innovations that can be controlled remotely and rely on AI. The Bank and Savings Bank Day will take place in Hall 6. Admission is free for fair visitors. All presentations will be interpreted live on-site into English.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Gunnebo Entrance Control solutions have been installed at travel software and technology specialist Sabre’s remodelled office in Uruguay, to ensure the safety and well-being of its employees, clients and visitors. As a global technology company serving the travel industry, Sabre’s innovative software has revolutionised the way personalised travel experiences can be delivered, pioneering to an increasingly digital and interconnected world. Entrance control requirements With its visionary approach and dedication to customer success, its base in Uruguay is currently home to over 800 staff. To help Sabre meet its entrance control requirements, Gunnebo was invited to work with Abelenda Hermanos as a security system supplier to design and install a comprehensive solution, created to optimise access control whilst maintaining a seamless flow of people. Author's quote By proactively working with Gunnebo Entrance Control we were able to design a system" Says Natalie Sarmiento, Sabre Security & Safety Manager: “Our vision is always to connect people with travel experiences that matter most. And in doing so, our team is the most important part of our business to think differently and make this happen for our customers. We needed to ensure their security on-site in our remodelled office in Uruguay, with the highest standards." She adds, “By proactively working with Gunnebo Entrance Control we were able to design a system that easily blended with its surroundings, while coexisting with the welcoming environment we wanted to create for our employees and our guests. This is something that flows throughout our offices and has been received well by all on site.” Gunnebo's entrance control solutions Gunnebo Entrance Control worked closely with Sabre to create a bespoke entrance control solution, incorporating its latest sleek design SpeedStile FP 1200 EV speed gates, finished in full stainless steel grade 304, to operate six lanes in place. By implementing Gunnebo's entrance control solutions, Sabre has significantly enhanced security measures, reducing the risk of unauthorised access without compromising on speed or aesthetic design. Gunnebo SpeedStile system Real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation" Says Omar Ferrero, Director at Abelenda Hermanos: “It was an absolute pleasure to work with Sabre and install entrance control for the benefit of its staff and guests. The real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation, together with its use of advanced technology to balance speed, security and design. The finish is stylish and maintains the highest level of safety for all who work and visit the new facilities.” Gunnebo's SpeedStile FP 1200 EV system enhances security and optimises the flow of people in office environments. The system's high throughput capability ensures efficient traffic management, allowing for swift and smooth access for authorised individuals. Customised security solutions Equipped with intelligent sensors, it provides accurate and reliable entrance control, effectively preventing tailgating. Additionally, the system's customisable design options enable integration with the surrounding architecture, enhancing the aesthetic appeal of the new headquarters. Thomas Axelson, Gunnebo Partner Network Manager – LATAM concluded: “The successful installation of Gunnebo’s entrance control solutions at Sabre’s offices in Uruguay highlights our capability to deliver customised security solutions. We will work with our clients and installers right from the initial design stage to project completion to deliver a solution that presents the highest level of security whilst maintaining a welcoming feel. We are thrilled with the results and proud to support Sabre as they continue their mission to make travel happen across the globe.”
Amthal has come to the rescue of Katherine Warington School, taking over the support and remote monitoring of fire safety and security services for the benefit of staff, pupils and visitors. Based in Harpenden, Katherine Warington School is a brand-new secondary school that opened in 2019 and welcomed its first cohort of 180 year-seven students in September of that year, before moving into a completed main building in the summer of 2020. Honeywell Gent solution Following a storm that damaged the school’s fire alarm system, the school consulted with Amthal to rectify the situation. Amthal recommended a specialist Honeywell Gent solution to restore the system to full functionality. Amthal continued to monitor the site remotely, working with the management team to service and support security, which included updating the intruder alarm system and access control. Each is now supported to the highest possible standards to create a safe learning environment enabling "every student to make outstanding progress, whatever their starting point.” Safe and secure learning environment It is also developing as a hub for the local area to enjoy and share in our exceptional facilities" Dean Inns, Katherine Warington School’s Business Manager, said: “Our school fosters a learning culture that rewards effort, inspires learning and engenders a shared belief amongst all members of our school that they are equipped to thrive in a changing world. It is also developing as a hub for the local area to enjoy and share in our exceptional facilities." Dean Inns adds, “To achieve this, we must offer a safe and secure learning environment for our staff, pupils and the wider community. This is where Amthal really came into its own, quickly responding when the storm damaged our life safety systems and continuing to work with us to enhance our security. Our continued collaboration reflects our dedication to maintaining a secure and conducive learning environment." Security and fire safety Amthal’s team works closely with Katherine Warington School and continues to monitor security and fire safety on site. Conducting continuous risk assessments, providing bespoke recommendations and delivering training to staff to ensure the seamless integration and maximum utilisation of all safety and security systems in place. Paul Rosenthal, Amthal Sales Director, stated: “Amthal’s expertise in delivering integrated solutions in education settings played a crucial role in securing the project. We were able to identify requirements quickly and efficiently, working around learning environments. The fire safety system, working with our partners at Honeywell Gent ensures early detection capability and enables a prompt response in case of emergencies." Safe educational setting The need for an enhanced intruder alarm was clear, to ensure the protection of the premises" Paul Rosenthal adds, “When we took over the service, support and remote monitoring, the need for an enhanced intruder alarm was clear, to ensure protection to the premises, in and outside of school hours." He continues, "Our continued partnership has also led to us updating the access control on site as the school continues to support young people to thrive, and welcomes its neighbours from the local area to take advantage of the facilities in a safe educational setting.” Advanced security solutions Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, fire, access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB), United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Round table discussion
For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
White papers
Managing security in the age of boundaryless working
DownloadThe welcoming workplace
DownloadAccess and security in the age of hybrid working
DownloadModernizing facilities management
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadThe role of access control in a safe return to the workplace
DownloadBoosting on-site safety and security
DownloadBuilding a safe ecosystem for visitors post COVID-19
DownloadIs your access control system as secure as you think?
DownloadVideos
Office security: Manufacturers & Suppliers
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download