Perimeter protection
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimeters, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology offers benefits such as scalability, cost-efficiency, and centralised managem...
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimetres, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology Cloud technology offers benefits such as scalability, cost-efficien...
Hanwha Vision, the global vision solution provider, has unveiled its new high-performance bi-spectrum radiometric thermal AI cameras, which are ideal for use in perimeter protection, traffic monitoring, manufacturing, industrial facilities, data centres, solar farms, and more. TNM-C3620TDR/C3622TDR cameras The TNM-C3620TDR/C3622TDR cameras serve as compact indoor models and feature QVGA resolution on the thermal lens and 2MP on the visible sensor, while the TNM-C4940TDR/C4942TDR ou...
By combining innovative radar, camera and software technologies, Navtech and Dallmeier Electronic now offer an integrated solution for optimised airside security at airports. By integrating the two systems, airport operators can achieve a very high level of objective security against a wide range of threat scenarios at a low total cost of ownership. Airside violations are a major security problem in air traffic. The scenario of possible threats ranges from disruptions of flight operations by ac...
MOBOTIX ONE is an extremely robust and maintenance-free video system 'Made in Germany' that impresses with both its application-oriented design and its high-quality components: fiberglass-reinforced, saltwater-resistant housing allows use in the harshest environments, strong processors and image sensors ensure excellent image quality. In addition, cyber-secure firmware developed by MOBOTIX with integrated AI video analysis tools for intelligent, video-based perimeter protection and object dete...
Westminster Security Group, a renowned name in private security, announces a strategic investment in Tratix, an innovative technology company based in Tel Aviv. Tratix, founded and led by seasoned entrepreneur - Sharon Rashty, specialises in cutting-edge solutions to help prevent cargo theft. With a distinguished background in Israeli Intelligence services and building early-stage startups, Sharon Rashty brings a wealth of experience to Tratix. Her expertise in tailing detection, counter-survei...
News
Security is more relevant than ever. Whether it’s cybersecurity, intrusion protection or access control - the demand for individual and tailor-made security solutions in industry, companies and private households is constantly increasing. As the pioneering trade fair, Security Essen brings together the security industry and showcases innovations and developments with around 500 exhibitors from September 17 to 20. At the same time, it celebrates its 50th anniversary. What began in 1974 with 105 exhibitors and about 1,000 visitors has long since developed into an international success story. Range of products and services Trade visitors from all over the world can expect a vast range of products and services in the array halls “Today, Security Essen is the comprehensive platform and indispensable meeting place for the security industry. Thanks to our continuous further development, it always remains at the cutting edge. This year, visitors can also look forward to a number of new features," reveals Project Manager Julia Jacob. Trade visitors from all over the world can expect an extensive range of products and services in the exhibition halls. Around 500 exhibitors from over 30 nations will present their solutions in these subject areas: Access/Mechatronics/Mechanics/Systems Perimeter Protection Fire/Intrusion/Systems Digital Networking Security Services Civil Protection Special-Purpose Vehicles Video Market pioneers as well as hidden champions and niche players will be there. At the same time, Security Essen offers newly founded companies the opportunity to make contacts in the global market and to promote and market products made in Germany internationally. At the "Young Innovators" joint stand, start-ups will show, among other things, how AI robots can take over surveillance tasks, which furniture makes prisons look secure and stylish at the same time and how users can protect their passwords. A comprehensive supporting program enhances the trade fair Security Essen offers special theme days and high-caliber professional lectures, providing added value for all trade visitors: The first European Drone Conference, for example, celebrates its premiere on September 19 and 20. It will shed light on innovative applications and safety aspects in the use of drone technology. Aimed at young talents and specialists is the Training and Further Education Day on September 17. The Federal Association of the Security Industry (BDSW) will also honour the best trainees on this day. Pressing digital security issues will address the DNS Digital Networking Security Conference on September 17 and 18. Among others, intelligence and crime analyst Mark T. Hoffmann will provide insights into the psychology of cybercrime in his presentation "Profiling Hackers". Spectacular explosive attacks on financial institutions have made headlines in the past. The Banks and Savings Banks Day on September 19 will show how these institutions can protect themselves. Partners of the theme days include the German Association of the Security Industry (BDSW), the International Physical Security Association (ESSA), the Confederation of European Security Services (CoESS), Datakontext and kes. The lectures will take place directly in the exhibition halls and are already included in the ticket price. Tickets available online Security Essen will be held at Messe Essen from September 17 to 20, 2024. The exhibition halls will be open from 9 a.m. to 6 p.m. from Tuesday to Thursday and from 9 a.m. to 4 p.m. on Friday. Tickets are available online for 48 euros.
Security is more relevant than ever. Whether it’s cybersecurity, intrusion protection, or access control - the demand for individual and tailor-made security solutions in industry, companies, and private households is constantly increasing. Security Essen As a major trade fair, Security Essen brings together the security industry and showcases innovations and developments with around 500 exhibitors from September 17 to 20. At the same time, it celebrates its 50th anniversary. What began in 1974 with 105 exhibitors and about 1,000 visitors has long since developed into an international success story. Comprehensive platform "Today, Security Essen is the comprehensive platform and indispensable meeting place for the security industry. Thanks to our continuous further development, it always remains at the cutting edge. This year, visitors can also look forward to several new features," reveals Project Manager, Julia Jacob. Solutions on display Trade visitors from all over the world can expect an extensive range of products and services in the exhibition halls. Around 500 exhibitors from over 30 nations will present their solutions in these subject areas: Access/Mechatronics/Mechanics/Systems Perimeter Protection Fire/Intrusion/Systems Digital Networking Security Services Civil Protection Special-Purpose Vehicles Video Young Innovators Security Essen offers newly founded companies the opportunity to make contacts in the global market Market pioneers, as well as hidden champions and niche players will be there. At the same time, Security Essen offers newly founded companies the opportunity to make contacts in the global market and to promote and market products made in Germany internationally. At the 'Young Innovators' joint stand, start-ups will show, among other things, how AI robots can take over surveillance tasks, which furniture makes prisons look secure and stylish at the same time, and how users can protect their passwords. Special theme days A comprehensive supporting programme enhances the trade fair Security Essen offers special theme days and high-caliber professional lectures, providing added value for all trade visitors: The first European Drone Conference, for example, celebrates its premiere on September 19 and 20. It will shed light on innovative applications and safety aspects in the use of drone technology. Aimed at young talents and specialists is the Training and Further Education Day on September 17. The Federal Association of the Security Industry(BDSW) will also honour the best trainees on this day. Pressing digital security issues will address the DNS Digital NetworkingSecurity Conference on September 17 and 18. Among others, intelligence and crime analyst Mark T. Hoffmann will provide insights into the psychology of cybercrime in his presentation "Profiling Hackers". Spectacular explosive attacks on financial institutions have made headlines in the past. The Banks and Savings Banks Day on September 19 will show how these institutions can protect themselves. Partners of the theme days include the German Association of the Security Industry (BDSW), the International Physical Security Association (ESSA), the Confederation of European Security Services (CoESS), Datakontext, and Kes. The lectures will take place directly in the exhibition halls and are already included in the ticket price. Tickets available online Security Essen will be held at Messe Essen from September 17 to 20, 2024. The exhibition halls will be open from 9 a.m. to 6 p.m. from Tuesday to Thursday and from 9 a.m. to 4 p.m. on Friday. Tickets are available online for 48 euros.
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, announces a significant upgrade to its HeatPro Bi-Spectrum Thermal cameras with the integration of VCA 3.0. This improvement introduces a range of advanced features designed to enhance performance, detection, and accuracy, further solidifying Hikvision’s commitment to providing innovative security solutions. This advancement will be covered in Hikvision’s June 27 HeatPro webinar. Hikvision’s new VCA 3.0 update All webinar attendees are eligible to win 1 of 10 Hikvision Thermal HeatPro Bi-Spectrum Cameras. Dealer attendees will be eligible for a 50% discount on the HeatPro Bullet (DS-2TD2628-3/QA) and Turret (DS-2TD1228-2/QA) models after the webinar (maximum 2 units). All webinar attendees are eligible to win 1 of 10 Hikvision Thermal HeatPro Bi-Spectrum Cameras "Hikvision’s new VCA 3.0 update for our HeatPro Bi-Spectrum Thermal Cameras sets a new standard in security technology. By integrating intelligent deep learning algorithms and advanced analytics, we deliver unparalleled accuracy and efficiency in threat detection, ensuring our customers have the most reliable protection available," said John Xiao, Vice President of Marketing, Hikvision USA. “The addition of VCA 3.0’s self-learning calibration and distillation model further enhances our cameras' performance, leaving more time for true fire prevention and other critical security measures." Intelligent VCA setup The VCA 3.0 upgrade brings enhanced algorithms that significantly improve processing power and efficiency, allowing for greater accuracy in detecting and analysing potential threats. VCA 3.0 ensures that the cameras can operate effectively in all weather conditions, providing reliable performance regardless of environmental challenges. The intelligent VCA setup has been simplified, making the configuration process more straightforward and user-friendly. This allows users to quickly and easily set up their systems to maximise the benefits of the advanced features. Self-learning calibration feature The distillation model introduced in VCA 3.0 offers advanced filtering capabilities Accurate alarms are now more precise, reducing false positives and ensuring that genuine threats are promptly identified and addressed. The distillation model introduced in VCA 3.0 offers advanced filtering capabilities, ensuring that the most relevant data is highlighted for security personnel. The self-learning calibration feature allows the system to adapt and improve over time, continuously enhancing its performance. Combined event alarms integrate multiple event triggers, offering a cohesive and comprehensive alert system that ensures no critical event goes unnoticed. Key features of Hikvision’s Bi-Spectrum Cameras Hikvision’s Bi-Spectrum HeatPro Thermal Bi-Spectrum Cameras debunk common myths for thermal technology, bringing cost-effective innovation to the market with several key features: Discover Hidden Objects: Thermal technology is not limited by smoke, fog, darkness, or strong backlight, illuminating the unseen for maximum protection. Early Detection and Warning: Monitors temperature changes and triggers alarms before a fire occurs for rapid response and asset protection. Accurate Target Focus: Using deep learning algorithms, HeatPro cameras accurately identify humans and vehicles, no matter the environment, for improved alarm efficiency. Cost-Effective Technology: Intelligent thermal perimeter protection, early temperature anomaly detection, and asset protection are all available at a competitive market price. To provide further insights into the HeatPro thermal cameras and the new VCA 3.0 features, Hikvision will be hosting a webinar on June 27. Attendees will have the opportunity to learn about the latest advancements, see demonstrations of the new features in action, and enter for a chance to win Hikvision thermal cameras.
The California Alarm Association (CAA) is proud to announce that Lilianne G. Chaumont has been awarded the prestigious Mark Schubert Memorial Award for her outstanding dedication and contributions to the electronic security and life safety industries. The award ceremony took place on Friday, May 17, 2024, recognising Lilianne's tireless efforts and commitment to the industry. Involvement with the CAA Program Lilianne G. Chaumont, President of Chaumont Law Inc., has been a pillar of the electronic and physical security, fire, and life safety industries for over 25 years. Her law firm is dedicated to protecting and representing companies nationwide that provide a wide range of services, including intrusion detection, monitoring, fire detection and suppression, access control, and more. Lilianne has demonstrated an unwavering commitment to giving back to the industry Beyond her professional accomplishments, Lilianne has demonstrated an unwavering commitment to giving back to the industry. She has served as the California Alarm Association Youth Scholarship Chair for ten years and as an ESA Scholarship Judge for eight years. Through her involvement with the CAA Youth Scholarship Program, Lilianne has made a significant impact on the lives of countless individuals in the law enforcement and firefighting communities. Impact through volunteering "I am deeply honoured and humbled to receive the Mark Schubert Memorial Award," said Lilianne G. Chaumont. "Volunteering and serving others with excellence and joy is at the core of my beliefs. The CAA Youth Scholarship Program has allowed me to make a meaningful difference in the lives of deserving children of law enforcement and firefighter parents and their families. I am grateful for the opportunity to contribute to such a worthy cause." Schubert Memorial Award is the highest honour vested upon an associate fellow of the CAA The Mark Schubert Memorial Award is the highest honour bestowed upon an associate member of the CAA. Each year, local chapter presidents nominate an associate member who has made the most significant impact through volunteering. The CAA President then selects the recipient, and the award includes a $500 grant sponsored by ISC West, which the recipient can designate to any industry program or association. Well-deserved recognition "Lilianne's dedication to the industry and her unwavering commitment to the CAA Youth Scholarship Program make her an exemplary recipient of the Mark Schubert Memorial Award," said Sean Cooke, President of the California Alarm Association. "Her passion for serving others and her dedicated efforts have touched the lives of many, and we are proud to recognise her outstanding contributions." The California Alarm Association congratulates Lilianne G. Chaumont on this well-deserved recognition and extends its gratitude for her years of service and dedication to the industry and the community.
Oakdoor, a pioneer in hardware-enforced security solutions, which is part of PA Consulting (PA), and Nexor, the pioneering specialist in Secure Information Exchange, have announced a strategic partnership to advance a high assurance cross-domain solution for secure data sharing. The partnership will start to create highly integrated software guarding and hardware verification solutions – with the aim of making access to data more secure and manageable for customers using multiple security domains worldwide. Oakdoor's UK CAPS-approved data Oakdoor has revolutionised data diodes in recent years, raising security standards and diode performance whilst reducing their complexity and cost. Meanwhile, Nexor has over 30 years of experience in delivering secure information exchange at the highest level. By working together and sharing their expertise, the two companies will work to make the most secure cross-domain solutions available to a wider range of customers. Nexor has over 30 years of venture in delivering secure facts exchange at the highest level The partnership will enable Nexor's GuarDiode to be combined with Oakdoor's cutting-edge data diodes to form a powerful cross-domain solution, which will deliver unparalleled protection and resilience against evolving cyber threats. This is because Nexor's software detects and removes malicious content by validating data against comprehensive information management policies. This allows controlled filtering of sensitive information assets into and out of critical systems. Meanwhile, Oakdoor's UK CAPS-approved data diodes are a critical hardware component for eliminating infiltration or exfiltration attack vectors within the cross-domain solution. Nexor's advanced software Tim Lunn, Founder and Head of Product at Oakdoor, said: "We are excited to announce our partnership with Nexor, which aims to bring this high assurance cross-domain solution to the market. By integrating Oakdoor's National Cyber Security Centre-approved diodes with Nexor's proven protocol and management software system, we are creating a more holistic solution for customers who are working at the highest classification levels." Tim Thompson, Managing Director at Nexor, said: "We are thrilled to partner with Oakdoor, part of PA Consulting, combining Nexor's advanced software with robust hardware to enhance market support and innovation. By harnessing exceptional engineering prowess alongside advanced software and hardware development, this strategic alliance positions both companies to pioneer more cohesive and impactful solutions, steadfastly advancing our pledge to excellence and customer satisfaction."
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, concluded its “Powering Innovation 2024: A Genetec Empower 360 roadshow” in Saudi Arabia. The roadshow took place on 13 May at the Narcissus Hotel Riyadh and showcased the company’s latest innovations and strategic vision for the future. Genetec roadshow As Saudi Arabia continues to prioritise smart city initiatives, physical security assumes paramount importance within the nation's overarching security infrastructure. Echoing this dedication, the Genetec roadshow delved into critical topics impacting security professionals. In collaboration with Axis Communications, HID Global, and Ipsotek, the event explored biometrics, video analytics, and access control solutions that transcend conventional boundaries. Central to the discussions was the exploration of a unified approach to seamlessly integrate these solutions. Regional physical security Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches The event covered important themes around the state of regional physical security and the evolving trends and best practices for safeguarding assets and infrastructure. Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches, and strategic initiatives shaping the industry landscape. Additionally, they had the opportunity to engage in live demonstrations of solutions and connect with both industry experts and partners to explore emerging trends and technologies. Innovation and collaboration "At Genetec, we're committed to shaping the future of physical security and public safety through innovation and collaboration," said Firas Jadalla, Regional Director – Middle East, Turkey & Africa, Genetec Inc. “Our goal is to equip our customers in with the resources and knowledge they need to effectively navigate the complex world of physical security. The roadshow was a testament to our dedication to empowering professionals with cutting-edge solutions. In collaboration with our long-standing partners, we hope this event in Riyadh paves the way for a safer, smarter tomorrow." SaaS solution The “Powering Innovation 2024: A Genetec Empower 360 roadshow” also showcased Security Center SaaS, a massively scalable, open, and unified software as a service (SaaS) solution. The new offering combines access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
A mix of Hubble Panoramic and PTZ cameras from Dahua Technology have been installed at Tripoli Stadium in Libya to help it meet modern international standards. Built in 1970, it is the largest Olympic stadium in the country and has been renovated and refurbished to meet FIFA’s requirements for stadium safety and security. Challenges With a capacity of 50,000 spectators, the stadium becomes crowded on match days and control of spectators and crowds becomes paramount. With only a limited number of police, security and stadium staff to rely on, stadium managers needed to have an overview of crowd flows and potential congestion to help ensure safety at these busy times. In addition, the stadium needed to stream images of match action to large screens strategically located inside and outside the stadium for fan interaction, as well as provide screens for advertising. Solution Cameras contain wise roles such as face recognition, perimeter protection and people-counting A mixture of eight Hubble panoramic and more than 180 WizMind 5 series cameras have been installed at the stadium to improve the situational awareness for stadium managers and the security team. The Hubble cameras are situated high up in the stadium to provide a panoramic overview, while being able to track specific incidents. They consist of an array of fixed cameras providing 180o, 270o or 360o coverage, together with an integrated dome camera to zoom into a particular scene and track specific objects. With Ultra HD resolution of up to 24MP, Hubble also features crowd number and density detection, vehicle-counting and density monitoring and augmented reality mapping. Dahua’s DSS video management software The cameras are available in dust-proof, waterproof and vandal-proof versions Also installed are more than 180 WizMind 5 series cameras. Featuring Starlight and deep learning algorithms, the cameras incorporate intelligent functions such as face recognition, perimeter protection and people-counting, which all greatly improve the accuracy of video analysis. The cameras are available in dust-proof, waterproof and vandal-proof versions. Intelligent recognition plays a big part in the security of the stadium, with cameras being able to identify and subsequently track any blocklisted suspects. This feature is also used at the entrance of the stadium to validate authorised ticket holders. Also installed are giant 15m x 9m LED screens to provide images of play on the pitch, as well as advertising coverage. All equipment is managed by Dahua’s DSS video management software located in the central control room. Results The installation of the Dahua equipment has provided stadium staff and security personnel with a high degree of situational awareness at the venue. They are now able to control access to the stadium through face recognition, anticipate overcrowding and potential congestion points with automatic heat mapping from camera images and track suspicious people or potential incidents. The cameras also provide a high degree of perimeter protection to detect and track abnormal intrusion.
Jacksons Fencing has recently completed a project with the Kingdom Hall in Hoddesdon, striving to enhance both the safety and visual appeal of its premises. As a place of worship for Jehovah’s Witnesses, the Kingdom Hall is meticulously maintained by its congregants to embody modesty and purpose. Enhancing security and aesthetics The primary goal was to bolster security against unauthorised access, vandalism, and theft, while also complementing the dignified exterior of the place of worship. Recognising the importance of creating a secure yet welcoming environment for congregation members and visitors alike, Jacksons Fencing was entrusted to install vertical bar railings around the building’s perimeter. These railings, coated in black architectural grade polyester powder, were chosen for their security features and aesthetic compatibility with the existing brick façade. The solution The black polyester powder-coated finish was chosen for its longevity and low maintenance The selection of a black polyester powder coating not only ensures durability and weather resistance, but also aligns with the hall’s commitment to sustainability and environmental stewardship, by minimising maintenance needs. Safety and security were paramount concerns for the premises. To prevent unauthorised access, vandalism, and theft, and to safeguard everyone within the premises, the installation of vertical bar railings was deemed essential. Additionally, enhancing the building's exterior aesthetics was a key consideration. The decision to use black polyester powder-coated railings was driven by the ability to harmonise with the brick façade, thereby enhancing the overall sophistication of the hall’s appearance. Jacksons Fencing’s experienced installation team anchored the Barbican Imperial® vertical bar railings to the brick wall, utilising cranked posts for added stability. The black polyester powder-coated finish was chosen for its longevity and low maintenance, reflecting Jehovah’s Witnesses' emphasis on sustainable practices and responsible investments. Ensuring sustainability Environmental stewardship is at the heart of Jehovah’s Witnesses teachings, and this principle guided every aspect of the project. Emphasising quality and longevity reduces lifetime costs and environmental impact by decreasing waste and the need for replacements. Jacksons Fencing’s 25 year guarantee on both steel and timber products further ensured that the fencing and gates were an ideal fit for this project. The power of protection Project not only managed the useful needs of the flock but also enhanced the visual harmony The installation of the vertical bar railings not only delineated clear boundaries but also effectively deterred unauthorised access, ensuring unobstructed views from inside the building to the surroundings and contributing to a safer environment. Through detailed planning, bespoke design, and precise execution, the Kingdom Hall achieved significant advancements in both security and aesthetics. This project not only addressed the practical needs of the congregation but also enhanced the visual harmony of the premises, creating a secure and welcoming environment for all. Well-being of congregation members Peter Jackson, Managing Director, Jacksons Fencing, says “We are proud to have contributed to creating a secure and welcoming environment for the Kingdom Hall in Hoddesdon. In today’s world, ensuring the safety and well-being of congregation members and visitors is more important than ever." "We have worked closely with the congregation to ensure the final solution is fit for purpose now and well into the future. Our products aim to help the community feel safe and secure as they worship and gather.”
The University of California San Diego (UCSD) Police Department is a full-fledged law enforcement agency responsible for patrolling, investigating, and preventing crime within its jurisdiction. Spanning over 1,200 acres and comprising 900 buildings, UCSD’s campus presents unique challenges for law enforcement. The department’s Communications Division serves as the nerve centre, coordinating responses to emergencies, managing communications, and ensuring coordination among officers. Garrett Williams, a seasoned Sergeant at the University of California San Diego (UCSD) Police Department, oversees the Communications Division. With over two decades of experience, Williams understands the critical role technology can play in public safety. The challenge Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations. Dispatchers juggled multiple computers, including a CAD, radio, and phone computer, each requiring separate keyboards and mice. “I didn’t look to RGB to solve all my problems. However, I understood all that could be accomplished once the team showed us how the technology operated and what was possible,” Garrett Williams, Sergeant, University of California San Diego Police Department. “Three separate mice and operators constantly moving side to side to look from one to the other and then having to move their hands back and forth between control devices - anytime they have to do that, it’s slowing their workflow down; we figured there had to be a better solution,” shared Williams. “And up to 25% of our operators were suffering from repetitive movement and neck Injuries, resulting in downtime and light duty restrictions.” Why UCSD chose XtendPoint KVM-over-IP UCSD wanted a seamless KVM solution that integrated multiple systems over IP under a unified interface. It explored various options before discovering RGB Spectrum’s XtendPoint™ solution, which provides local and remote access to source computers, consolidates separate monitors into multi-view displays, and unifies control for more streamlined operation and enhanced efficiency. With RGB’s XtendPoint KVM system, UCSD grew access to the fire alarm system at each operator’s station UCSD’s key selling point was its ergonomic benefits. It offered a solution to the ergonomic challenges plaguing dispatchers by minimising the need for multiple keyboards and mice. So did replacing monitor clutter. With the XtendPoint solution, single-signal monitors are consolidated on each console using multiview displays that can handle up to four computer signals each or up to eight signals displayed on just two pieces of glass. A notable feature of this solution is the ability to offer each operator customised display viewing, even in a multi-shift operation. A KVM-over-IP backbone offers additional benefits. Before, only one dispatcher station could see the fire alarm system. With RGB’s XtendPoint KVM system, UCSD expanded access to the fire alarm system at each operator’s station. Now, no matter where dispatchers are seated, they have access to all needed systems. How UCSD uses RGB’s solution The RGB Spectrum solution marked a significant turning point for UCSD’s dispatch operations. Dispatchers experienced a dramatic improvement in efficiency, ergonomics, and situational awareness. Gone are the days of dispatchers juggling multiple control devices. With a unified interface, dispatchers can control all systems from a single keyboard and mouse. A streamlined workflow accelerated response times and reduced errors. Video integration proved invaluable. Dispatchers can now access live video feeds and additional mission-critical systems directly within one system interface, providing them with real-time visual information as required. With a unified interface, dispatchers can control all systems from a single keyboard and mouse Additionally, support for video integration with a video wall provided opportunities for enhanced collaboration and situational awareness. Commented Williams, “The flexibility of the RGB system also allowed UCSD dispatchers to leverage video wall capabilities. They can easily share critical information and task lists with colleagues. A more collaborative environment has facilitated communication and coordination among dispatchers, ensuring that tasks are efficiently managed and prioritised during high-stress situations. We can use the RGB system to throw things up on the wall so other dispatchers can see what’s happening and interact as needed.” “In addition," said Williams, “the resilience of the RGB XtendPoint system is invaluable in maintaining operational continuity. For example, in the event of a problem at a station, technicians can work on the issue while the dispatcher moves to a backup computer or station, allowing dispatchers to continue critical work without interruption. This proactive approach to system maintainability and resilience saves time and resources and ensures that dispatch operations remain fully functional at all times.” The result The impact of XtendPoint KVM-over-IP on UCSD’s dispatch operations has been profound. UCSD witnessed significant improvements in efficiency, ergonomics, and situational awareness. Efficiency soared as dispatchers seamlessly controlled multiple systems from a single interface. Ergonomic issues were mitigated, and dispatcher morale improved, enabling dispatchers to respond more effectively to emergencies. Future plans with RGB Spectrum Williams is enthusiastic about the wraparound monitors RGB has announced Looking ahead, UCSD sees opportunities to leverage RGB Spectrum’s technology further to enhance operations. RGB system’s versatility also enables UCSD to adapt to evolving threats and emergencies. In the event of, say, a building evacuation or siege, for example, UCSD could almost immediately establish a satellite facility. Williams is enthusiastic about the wraparound monitors RGB has announced. “We are looking at RGB’s new, yet to come to market, 43-inch curved monitors that will be the finishing touch for even better ergonomics and a customised workspace.” Another potential interest is a “flyaway” kit, a transportable command-and-control system with integral radio access. This mobile system would enable UCSD to monitor special events, such as festivals, where real-time situational awareness is crucial for ensuring the safety of attendees and staff. Williams notes, “We can have a mobile command post set up near a festival or special event, take one of our dispatch systems and put it there without having to move a lot of equipment or figuring out how to get it on the network.” Implementing RGB Spectrum’s solutions UCSD also aims to extend the reach of its dispatch operations by providing in-the-field personnel with access to real-time information. By equipping mobile units with RGB’s AV-over-IP systems via smartphones, police officers could receive critical updates and better collaborate with dispatchers to respond to incidents. “If you think of the unthinkable, like a school shooting, it would be ideal to share live coverage of what’s happening, detailed building schematics, and info on weapons the assailant might be using. Who doesn’t want to know what’s potentially happening behind closed doors before walking in? It’s situational awareness on a whole new level,” commented Williams. The partnership between the UCSD Police Department and RGB Spectrum has proven successful. By implementing RGB Spectrum’s solutions, UCSD transformed its dispatch operations to achieve unprecedented levels of efficiency, ergonomics, and situational awareness. And it is just a start.
Wetlands, the "kidneys of the Earth", are considered one of the three major ecosystems on Earth, along with forests and oceans. Hosting a diverse range of terrestrial and aquatic plant and animal species, wetlands serve as crucial habitats for numerous bird species. Red-crowned cranes Beautiful Wetlands vs Critically Endangered Cranes The Red-crowned Crane is considered as the "God of Wetlands" and is highly sensitive to environmental changes. It is one of 14 bird species in China classified as critically endangered, with only around 2,000 wild Red-crowned Cranes remaining worldwide. Monitoring these rare bird species not only aids in their effective protection but also reflects changes in the wetland ecosystem to some extent. Red-crowned Cranes migrate between the regions of East China and Northeast China In China, during spring and autumn seasons, Red-crowned Cranes migrate between the regions of East China and Northeast China, requiring wetland management personnel to make all necessary preparations in advance every year. Recording and tracking data (e.g. time of arrival/departure, and total number) play a significant role in monitoring both the Red-crowned Cranes and the wetland ecosystem. Hence, monitoring rare bird species is essential not only for their conservation but also for understanding the changes in wetland ecological environments. Red-crowned crane captured by Dahua camera Vigilant cranes, eager for improved, smarter observation However, Red-crowned Cranes have extremely strong vigilance. Even while foraging or resting, there are often adult birds designated to be on alert, making warning calls and taking flight if any danger is detected. Therefore, it becomes challenging for monitoring personnel to observe them up close, as they need to maintain a distance of several hundred metres using binoculars to avoid disturbing the cranes. Such limitations in observation pose difficulties in monitoring the population distribution and activities of Red-crowned Cranes. To achieve efficient and intelligent monitoring while minimising human interference, many wetlands have enlisted the assistance of an intelligent "avian expert". Dahua: the guardian of cranes with smart technologies In recent years, avian intelligent recognition systems have been increasingly applied in wetland monitoring. Dahua Technology actively explores the integration of technology and wetland conservation to support the monitoring and protection of bird species across multiple wetlands. Rare bird species like the Red-crowned Crane can be automatically identified and counted By employing high-point video footage combined with avian intelligent recognition algorithms, rare bird species like the Red-crowned Crane can be automatically identified and counted. This allows monitoring personnel to discover and observe various bird species clearly and promptly without disturbing them. Additionally, techniques such as background removal and contour deformation processing help reduce the interference caused by lighting conditions and backgrounds, ensuring that the footage presents the identifying characteristics, location, and time for each bird. With this approach, comprehensive and accurate data recording and result analysis can be achieved without disturbing the Red-crowned Cranes up close. A brighter future for biodiversity using intelligent analysis In addition to population counting, vocalisations play a crucial role in bird research. By utilising voiceprint recognition, it becomes possible to track and study the population distribution of rare bird species. Many regions have established and improved databases of avian vocalisations, creating a foundation for biodiversity monitoring and analysis. These databases, combined with visual identification, are being cataloged in order to facilitate more comprehensive research and analysis, optimise timely conservation measures, and enhance dynamic and diverse science communication and education. Dahua Technology continues to empower biodiversity conservation through technology. The Dahua AI platform enables continuous algorithm training that helps reduce the development cycle of recognition algorithms for specific species. At present, Dahua has developed over 800 bird recognition algorithms, with more than 500 focused on waterfowl and migratory birds primarily inhabiting wetland environments. This extensive collection of algorithms greatly supports and contributes to biodiversity conservation efforts around the globe.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Michigan’s Pontiac School District (PSD) to protect students and faculty against gun-related threats. Pontiac School District (PSD) PSD includes nine schools and takes pride in offering its students work-based learning opportunities in industries such as Health Sciences, Business/Finance, and Hospitality/Tourism. The district is also at the forefront of security innovation, adding ZeroEyes to a multi-layered approach that includes a visitor check-in system, smart sensors, and video management software, among others, to provide a safe and secure educational environment. Enhance security and safety “At Pontiac, we've dedicated significant resources to fostering opportunities for students, and we've witnessed the positive impact rippling throughout our community,” said Dr. Kimberly Leverette, Interim Superintendent of Pontiac School District. Dr. Kimberly Leverette adds, “Our mission is to cultivate our schools as safe havens, and with ZeroEyes, we can enhance security and safety both during and after school hours.” AI gun detection and intelligent situational awareness software If a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and PSD staff as quickly as 3 to 5 seconds from detection. Gun-related violence “In the past few years, the state of Michigan has experienced great hardship when it comes to gun-related violence,” said Mike Lahiff, CEO of ZeroEyes. He adds, “Pontiac School District continues to show its dedication to safety and eye for innovation with its deployment of ZeroEyes.”
RecFaces, an international facial recognition software developer played an indispensable role in promoting and maintaining safety during the Brazilian Carnival 2024. The company's one of the best and highly accurate products, Id-Guard, was applied to secure an open-air carnival and turned out to be a great solution to the security challenges faced. Facial recognition software The cameras equipped with facial recognition software were placed at mobile control checkpoints, which enabled people to move around and take part in live processions happening at the venue. Because of its fast identification ability, smart surveillance, and immediate notification of unwarranted persons present in the audience, facial recognition technology proved to be a good alternative for securing big events and carnivals. Accurate threat detection alerts FRS minimises human error and removes proximity challenges of mobile authentication FRS minimises human error and removes proximity challenges of mobile authentication. In the present-day security landscape, FRS becomes prominent as it contributes to the overall security of big public places, by producing quick but accurate threat detection alerts. Id-Guard's performance Maria Kazhuro, Business Development Director of RecFaces in the LATAM region, expressed pride in Id-Guard's performance, stating, "We are proud to say that our solution has once again performed exceptionally well in supporting security services during a mass outdoor event even under complex conditions of low light, high traffic, masked visitors and crowd." Maria Kazhuro adds, "Confidence in the quality of our facial recognition solutions allows us to look forward to the future with optimism and meet the demands of the most discerning customers. As expected, Id-Guard was vastly praised for being the best solution that elevated the security of the event." Public safety RecFaces will remain in the lead of technological innovation, and thus, it will support and ensure the enhancement of public safety and the well-being of citizens. While Brazilian Carnival 2024 progressed, RecFaces gained a reputation as an indispensable partner ensuring visitors’ safety with its novel facial recognition technology.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Videos
Perimeter protection: Manufacturers & Suppliers
- Dahua Technology Perimeter protection
- Hikvision Perimeter protection
- Senstar Perimeter protection
- Bosch Perimeter protection
- DSC Perimeter protection
- OPTEX Perimeter protection
- Visonic Perimeter protection
- Climax Technology Perimeter protection
- eneo Perimeter protection
- Aritech Perimeter protection
- RISCO Group Perimeter protection
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download