Physical Security Information Management (PSIM)
Onity, a global pioneer in electronic access solutions and mobile credentialing and a Honeywell brand, announces the expansion of its partnership with Extra Space Storage, Inc., the largest self-storage company in the United States. Onity and Extra Space Storage are advancing storage unit access across the country with next-generation mobile access technology, allowing customers to enter storage units quickly and safely without a traditional lock and key. Onity's Passport locking solutio...
In recent years, remote working has become the norm for many professionals operating in a wide range of different sectors. To take full advantage of the convenience and flexibility this brings, secure and convenient remote access to the systems they need to do their jobs has become mission-critical. That’s where workplace solutions pioneer - WEYTEC comes in. The Swiss-based IT company has developed a new software receiver, smartREMOTE, aimed at offering secure and flexible remote access t...
Allegion US, a pioneer in security products and solutions, is the first to support mobile credentials in Google Wallet™ on Wear OS smartwatches. Available starting December 9, 2024, for all Schlage® mobile credentials currently offered in Google Wallet on Android™, such as student IDs and employee badges, the solution equips Wear OS smartwatch users with convenience, enhanced security, and seamless access. Secure access "We are privileged to be the first security sol...
Integrated Access Control and Security manufacturer - TDSi announces it will be joining forces with fellow Vitaprotech Group companies - Harper Chalice, PRYSM, and Hirsch for its forthcoming appearance at Intersec 2025, which takes place from 14th – 16th January in Dubai, UAE. The combined stand, S3 B32, will offer visitors a comprehensive insight into the best access control, perimeter intrusion detection, and intelligent monitoring solutions. Secure access control Thibaut Galland, Vit...
CIBC Innovation Banking has provided a $30 million growth financing for Aerospike, a real-time database engineered for speed, scale and cost efficiency, powering mission-critical applications across diverse use cases, including Artificial Intelligence (AI) and Machine Learning (ML). This funding will further expand the company’s go-to-market strategy and product innovation. Aerospike operates at the intersection of the world’s growing data needs and the new opportuni...
Magenta Security Services has once more demonstrated its leadership in sustainability, securing the coveted "Security or Fire Sustainability Champion" award at the prestigious Security and Fire Excellence Awards 2024 for the second consecutive year. The awards ceremony, a hallmark of excellence in the security and fire sectors, celebrates organisations that set benchmarks in innovation, performance, and commitment to sustainability. Magenta Security’s pioneering sustainability initiatives...
News
Recognising the growing demand from chain enterprises to boost operational efficiency through cloud security solutions, the global pioneering security solution provider - VIVOTEK (3454-TW) has announced a partnership between its AI-Powered cloud surveillance platform, VORTEX, and Kabob, a startup providing one-stop cloud management solutions for retail stores. This collaboration aims to revolutionise retail management, initially targeting the US, Japan and Taiwan markets, benefiting over 450 chain brands and approximately 15,000 stores. Advanced AI-Powered insights Kabob users can log in to the VORTEX platform through their accounts to access unlimited device connections and user accounts with a simple subscription, enabling remote management of store surveillance, real-time operations monitoring and advanced AI-Powered insights. With VORTEX, retailers can analyse crowd flow patterns, recognise vehicle licence plates and refine marketing strategies to unlock new business opportunities. Boosting retail security efficiency VORTEX's high versatility and robust security features are specifically designed for business environments Managing hundreds or even thousands of retail outlets simultaneously poses a significant challenge for chain enterprises. VORTEX's high versatility and robust security features are specifically designed for fast-paced business environments, offering smart management services for retail stores, shopping malls, and other venues requiring multi-site monitoring. VORTEX's flexible hybrid cloud architecture provides seamless integration with its cloud-native cameras for precise AI video analytics and anomaly alerts. For retailers using existing network cameras, VORTEX enables cloud connectivity via VIVOTEK’s network video recorders, facilitating real-time remote management and event detection. This ensures store safety, smooth operations and maximum cost-effectiveness and security performance. Incorporates secure network transmission VORTEX incorporates advanced encryption, secure network transmission, and privacy management measures to safeguard user data and video information, including end-to-end encryption, Single Sign-On (SSO) and Multi-Factor Authentication (MFA). Moreover, VORTEX offers up to 10 years of warranty and flexible subscription licencing, all compliant with the US National Defense Authorisation Act (NDAA) and Trade Agreements Act (TAA). AI-driven insights to enhance customer engagement Beyond security, VORTEX leverages its AI technology to identify hotspots with high foot traffic and recognise licence plates of frequent visitors. By integrating these capabilities with in-store marketing activities, VORTEX boosts customer interactions, increases sales and enhances customer satisfaction. VIVOTEK stated, "By combining video analytics technology with our camera hardware-software integration and the VORTEX cloud platform, alongside Kabob's extensive experience in retail, we aim to deliver an all-in-one solution that maximises benefits for retailers while creating a safer and more satisfying consumer experience." Kabob added, "VORTEX’s AI-powered security services provide users with cost-effective smart security and operational solutions. We believe this innovative cloud platform will deliver a safer, more convenient and intelligent experience in commercial environments."
Userful Corporation, a global pioneer in IT solutions and data visualisation, has achieved SOC 2 certification for its Infinity Platform and Global Cluster Manager solutions. This certification underscores its commitment to secure data management and compliance in critical operations environments. This achievement demonstrates Userful’s dedication to maintaining a high level of security, integrity, and availability for its customers and partners. Userful’s secure infrastructure Userful’s secure infrastructure gives customers full control over their security environment Userful’s secure infrastructure gives customers full control over their security environment. Features like role-based access control, options for isolated (offline) network deployment, and private cloud infrastructure provide adaptable, high-security configurations tailored to each customer’s needs. A downloadable security guide is available on request. Userful’s Type I certification SOC 2, developed by the American Institute of Certified Public Accountants (AICPA), is a voluntary compliance standard for service organisations managing sensitive customer data. It aligns with the Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy. Userful’s Type I certification, validated by an external audit of nearly 101 security controls, reflects the organisation’s robust protocols at a specified point in time. With real-time data and secure, centralised management at the forefront of operations, SOC 2 certification reinforces Userful’s commitment to data security, assuring partners and customers of its stringent data protection standards.
Gunnebo Group will present its commitment to innovation in advanced security solutions and sustainability across its flagship brands at Intersec 2025, held in Dubai, UAE, from January 14 -16, 2025. As a global pioneer in security solutions, Gunnebo will be on stand S2, A22, presenting a range of advanced, innovative technologies in safe storage, entrance control, and high-security electronic locks, with a focus on sustainability in design, materials, and energy efficiency. Safe storage solution Under its trusted brands Chubbsafes and Tecnosicurezza, visitors to Gunnebo Safe Storage will experience the latest in security innovation. Products include the Chubbsafes™ 1835, Europa 6, Vega, and Fortis, which showcase product innovation and quality, ensuring the highest standards of safety and durability. Visitors will see Gunnebo’s EverydaySafe line for residential security, featuring the compact Harmony and Unity models, bringing a Sold Secure approved discreet storage solution. High-security electronic lock Tecnosicurezza will showcase its newly launched high-security electronic lock that features integrated connectivity Tecnosicurezza will showcase its newly launched high-security electronic lock that features integrated connectivity, combining Bluetooth® technology with a specialist Gunnebo iQ, a cloud-based management platform. It will be displayed alongside Tecnosicurezza’s full range of solutions, recognised for compliance with the highest safety standards, with no compromise to design or ease of use. Gunnebo iQ systems Gunnebo will feature its recently updated high-security electronic lock and Gunnebo iQ systems. Each lock is engineered to secure against increasingly sophisticated burglary threats and plays a significant role in safeguarding valuables, cash, and document storage in high-risk environments. Safe Deposit Box systems The latest innovations in Safe Deposit Box systems and physical security will also be featured. The popular SafeStore Auto and the ModuleGuard T2 door are also being showcased as the latest lightweight vault door solutions with fire rating and burglary resistance in grades I, III, and IV. Smart solutions "At Gunnebo, we are proud to showcase our most comprehensive and diverse product portfolios at Intersec 2025," said Jacob Touma, Vice President (VP) for Gunnebo MEA. He adds, "From home safes to advanced safe storage solutions to intelligent entrance control and locking systems, our lineup reflects the depth and innovation of Gunnebo’s offerings. Intersec provides the perfect platform for us to demonstrate how our smart solutions can meet a wide range of high-security needs, each with a focus on reliability, sustainability, and efficiency." Sustainable entrance management solutions Gunnebo Entrance Control will present an expanded portfolio of sustainable entrance management solutions. SpeedStile FLs MAX SpeedStile FLs MAX delivers enhanced flow management and energy efficiency, making it ideal for high-traffic areas In the latest offerings, the SpeedStile FLs MAX will be a highlight for its minimal footprint and transparent and user-friendly design for all users. Where sites have limited space and aesthetics are important, SpeedStile FLs MAX delivers enhanced flow management and energy efficiency, making it ideal for high-traffic areas in contemporary settings. SpeedStile FP Glide In addition to SpeedStile FLs Max, advanced solutions on display include the stylish SpeedStile FP Glide, which brings a contemporary design that provides innovative single-person detection for both wide and narrow access within a smaller footprint. GlasStile S Detect Alongside will be GlasStile S Detect, a highly popular solution for lobbies and reception areas that provides enhanced crawlproofing and climb detection to present an effective visual deterrent, while blending seamlessly into its environment. HiSec and QFG models For high-security applications, the HiSec and QFG models provide reliable access control, while Wedge II and City Protector solutions present barriers and turnstiles engineered for durability. Intersec 2025 "We’re excited to connect with industry professionals and see how our extensive Group range can support and enhance security for a variety of environments and sectors," said Jacob Touma, adding "Our goal is to inspire confidence and provide solutions that align with the changing needs of our customers in today’s world." Gunnebo will be on stand S2, A22 at Intersec 2025, taking place 14 – 16 January 2025 at the Dubai World Trade Centre, in Dubai, UAE.
Integrated Access Control and Security manufacturer - TDSi announces that its Managing Director, John Davies, will retire from his role at the end of 2024. TDSi's existing senior team will continue to operate the business as usual under the leadership of Thibaut Galland, Chief Operating Officer (COO) for the United Kingdom at TDSi's parent organisation, Vitaprotech. John Davies joined TDSi in 2003, pioneering a management buyout of the business in February 2005. In 2019 John oversaw the next chapter of TDSi’s journey when it joined Vitaprotech, a major international group of premium security providers of solutions in access control and management, smart monitoring, and perimeter intrusion detection. TDSi’s product developments As part of the wider Security Industry, John is also a hugely respected and well-recognised figure As part of the wider Security Industry, John is also a hugely respected and well-recognised figure, offering his expertise for the benefit of others outside of TDSi by representing both the BSIA and Worshipful Company of Security Professionals for many years. Along with TDSi’s ongoing product developments, most recently with the launch of GARDiS Hardware and Software and an ever-expanding suite of Access Control Integrations; John has overseen large TDSi projects in notable sites around the world, including major infrastructure projects for the Royal Thai Navy, Brunei Telecom, Shanghai Metro, China Petroleum Corp and China Coal. John’s incredible leadership Upon the announcement, Thibaut Galland commented, "John leaves TDSi with a fantastic, growing team of industry professionals and a strong senior leadership group, all of whom are committed to developing the great foundations left by John to ensure our future success." He adds, "The whole team at TDSi would like to express their gratitude for John’s incredible leadership, dedication and support throughout his years here. John’s passion and commitment over the course of his 21 years at TDSi have been central to the success of the business."
Robotic Assistance Devices (RAD), proudly announces the launch of SARA™ (Speaking Autonomous Responsive Agent). This innovative software solution is poised to redefine security monitoring, offering unparalleled efficiency and cost-effectiveness, while reshaping how Global Security Operations Centres (GSOCs) operate. Security operations Centre A typical security operations centre relies on human workers to review video footage escalated by analytics, assess the situation, and decide on appropriate actions, which may include verbal engagement or escalation to facility management or law enforcement. SARA automates these tasks with significant improvements, delivering enhanced efficiency, reduced costs, and superior performance across a wide range of scenarios. AIR™ (Autonomous Intelligent Response) technology This innovative application of AIR technology represents a significant milestone for AITX SARA marks the debut of AITX’s AIR™ (Autonomous Intelligent Response) technology in a fully realised product. As the foundational AI driving SARA, AIR enables the software to autonomously assess situations, engage intelligently, and execute actions traditionally performed by human operators. This innovative application of AIR technology represents a significant milestone for AITX, showcasing its potential to revolutionise security operations through adaptive, responsive, and cost-effective solutions. SARA’s unique benefits Efficiency: Traditional GSOCs must anticipate staffing needs to handle incoming alerts, often leading to under or over-staffing. SARA eliminates this guesswork by scaling instantly and infinitely to manage any volume of escalations. Cost: Staffing a GSOC requires ongoing recruitment, human resource management, and the burden of rising labour costs. SARA offers a software-driven alternative that reduces these expenses by over 90%, providing a cost-effective solution without sacrificing performance. Performance: SARA can escalate incidents with precision, simultaneously contacting up to three parties, such as facility management, law enforcement, and security guards. Each message is tailored to the recipient, ensuring clear and actionable communication. Transparency: SARA delivers comprehensive incident reports that include video footage, call logs, and transcripts, ensuring full accountability and visibility for every escalation. Ease of Deployment: Starting in January 2025, SARA will be an available upgrade on all RAD devices, including previously deployed units. Even as an upgrade, SARA provides a compelling alternative, reducing monitoring expenses by over 90%, while maintaining exceptional performance. The setup is simple, leveraging RAD’s device ecosystem and enabling seamless integration with existing LAN-based cameras through RAD’s Operations System Software (ROSS). Reduced costs and improved performance "There are over 225 Global Security Operations Centres, and the monitoring industry generates over $3 billion annually," said Steve Reinharz, CEO/CTO of AITX and RAD, adding "SARA represents a seismic shift for this market, enabling organisations to enhance their security offerings at a fraction of the cost while improving performance." He continues, "We see accelerated growth in the number of cameras connected to GSOCS as SARA makes these services incredibly accessible. However, this decrease in overall costs will challenge this market niche to maintain industry growth. We see rapid adoption of these solutions given SARA’s compelling value proposition." Market projection Its seamless integration with RAD’s proprietary ROSS allows for a smooth upgrade of existing infrastructure The Global Security Operations Centre market is projected to reach $16.18 billion by 2032, growing at a compound annual growth rate of 10.2% from 2024. SARA is set to disrupt this growth trajectory by automating labour-intensive processes, empowering security firms and end-users to achieve more with fewer resources. Its seamless integration with RAD’s proprietary Operations System Software (ROSS) allows for a smooth upgrade of existing infrastructure without the need for significant hardware investment. Efficiency, responsiveness SARA’s introduction signals a pivotal moment in the evolution of security operations. By automating traditionally labour-intensive processes, it empowers GSOCs and security firms to reimagine their capabilities, delivering improved efficiency, responsiveness, and cost management. This revolutionary approach aligns with the demands of an industry poised for significant growth, enabling organisations to enhance their services, while maintaining a competitive edge. RAD invites security professionals and stakeholders to explore SARA’s transformative capabilities.
Gcore, the global edge AI, cloud, network, and security solutions provider, and Ezditek, an innovator in data centre and digital infrastructure services in the Kingdom of Saudi Arabia (KSA), have launched a joint venture focused on providing high-performance AI infrastructure in the KSA. The joint venture will develop an ‘AI factory’, which can be used for building, training, and deploying generative AI solutions locally and across the globe. Ezditek’s innovative approach The joint venture brings together Gcore’s expertise in cloud-based AI infrastructure and Ezditek’s innovative approach to sustainable and AI-centric data centre design and build. The joint venture is the result of an agreement signed by Gcore and Ezditek in May 2024 and will support the KSA’s position as a pioneering global AI hub. The incorporation process of the joint venture is currently underway and is subject to regulatory approvals, including from the General Authority for Competition in the KSA. Generative AI models AI factory will be deployed in an Ezditek data centre and be home to tens of thousands of GPUs “We are excited to join forces with Ezditek in building this groundbreaking AI factory. By combining our cloud services and AI infrastructure capabilities with Ezditek’s expertise in data centre development, we are setting a new standard for AI infrastructure in the region,” said Andre Reitenbach, CEO at Gcore. The AI factory will be deployed in an Ezditek data centre and be home to tens of thousands of GPUs that will empower organisations to train and deploy sophisticated generative AI models. This will enable the rapid training and development of predictive analytics models, deep data analysis, and process optimisation, as well as a growing number of AI use cases. AI innovation and adoption “Over the last six months, we have worked in collaboration with Gcore to identify areas where we can deliver the most value for customers, and support the KSA’s vision for AI leadership. Together, we are developing an AI factory purpose-built for enabling and accelerating AI innovation and adoption,” said Ibrahim Almulhim, CEO at Ezditek. Ibrahim Almulhim adds, “We’re extremely proud to be working with a global leader in AI enablement and bringing a visionary approach to AI innovation to market in the KSA.” Digital capabilities “This partnership will accelerate the adoption of AI and cloud computing solutions, benefiting businesses and citizens alike,” said Eng. Bassam Al-Bassam, Deputy Minister of Telecommunications and Digital Infrastructure at MCIT. Al-Bassam also pointed out that this partnership will boost digital investment and national digital capacity in Saudi Arabia, underpinned by its digital capabilities and reliable infrastructure.
Expert commentary
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialised skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organised theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilised the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilise security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasising the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organisations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualisation, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organisations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organisations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialised knowledge in data visualisation and metrics analysis will ensure that this technology is utilised effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analysing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralised view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organisation. When security can proactively provide solutions and effectively address risks that arise in all corners of the organisation, it becomes the cornerstone of overall organisational safety. Modern security approaches This collaborative environment will empower the organisation to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organisation to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organisations in an ever-shifting environment.
Where access control is concerned, architects and design teams must find the right balance between aesthetics, functionality and security, says Daniel May of Consort Architectural Hardware. Following a period of innovation and integration, access control has developed into an ever-prominent facet of building design over the past decade. Where systems were once rudimentary, modern user requirements have led to several operational and technological advancements, resulting in a versatile selection of options that move beyond the limited capabilities of centralised deployment architecture. Growing market demand The push for smarter buildings has played its part too. In fact, according to a 2022 report, the number of smart buildings worldwide is projected to climb from 45 million to 115 million by 2026, with global market size estimated to hit $201.16 billion by 2031 - and this growth shows no signs of slowing down (omitting another global pandemic). The number of smart buildings worldwide is projected to climb from 45 million to 115 million by 2026 In order to meet growing market demand, manufacturers continue to modernise access control solutions, introducing the use of mobile credentials, cloud control and even bio-metric systems. As such, the specification process for access control hardware continues to become more nuanced, and for architects in particular, there’s an increasing challenge to ensure all design objectives are met. With this in mind, how can professionals strike a balance between seamless integration and design? Modern hotel environments For many decision makers, access control is viewed as an efficient and flexible route to securing their building. But more than that, it has become critical to the operative performance of our built environment, where from residential settings to commercial space, the adopted use of interconnected systems is further boosting accessibility, functionality and security. Take modern hotel environments for example. According to a 2022 report, 56% of hospitality consumers expressed locking and unlocking rooms using biometrics and facial recognition would enhance their experience. From Wi-Fi infrastructures to cloud services, technology has almost become synonymous with a hotel guest’s experience and is designed to improve their stay. Where digital access control systems are adopted, guests can interact with the premises independently, streamlining their access to essential entry points while safeguarding rooms against unauthorised visitors. Hotel operators benefit from enhanced building security and increased traceability Higher guest ratings Similarly, hotel operators benefit from enhanced building security and increased traceability, not to mention improved business efficiency and higher guest ratings. Ultimately, better-quality aesthetics enhance environments by making them more welcoming However, while security and accessibility are frequently top of the agenda when it comes to specifying hardware, from an architectural perspective, a solution’s aesthetic is just as valuable and plays a crucial role in the decision-making process. Often, door hardware can feel like the finishing touch to a design project, and so, careful consideration must go into consistent design choices that make a positive impact on the building’s aesthetic. Ultimately, better-quality aesthetics enhance environments by making them more welcoming. Access control systems Again, hospitality is a good case in point, where hotels must ensure their environment is visually pleasing as part of the service quality offered to their guests. However, a survey on urban design revealed 40% of architects find incorporating security measures into new developments without impacting aesthetic appeal a key design challenge. With this in mind, architects and design teams can be forgiven for past frustration towards the unattractive and cumbersome access control systems that were once in their infancy. In reality, today’s systems offer a much more seamless design, and with end users placing value on key elements such as accessibility, fire safety and reliability, it’s now possible to incorporate a solution that works for everyone. Hospitality is a good case in point, where hotels must ensure their environment is visually pleasing Combining value and visuals Upon recognising today’s access control systems promote functionality and seamless installation without compromising aesthetics, there’s a growing demand for comprehensive, single-package solutions across many contemporary projects. As a result, architects and designers are increasingly met with questions on door hardware and access control and must keep up to date with the latest solutions that are available. Architects and designers are increasingly met with questions on door hardware and access control As such, the initial design stage provides an opportune period for architectural teams to consider the needs of the end user in relation to access control systems. From a building’s security elements to its flow of movement, there are various objectives to reflect upon, and architects must look to develop their knowledge on access control solutions to ensure all end user objectives are met, and all while considering the final aesthetic. Access control solutions Naturally, projects can often benefit from greater collaboration and architectural professionals are urged to lean on the expertise of manufacturers where required. By working closely with trusted manufacturers early in the process, teams can incorporate the latest technology into buildings at the initial stages of design, as opposed to being an addition later in the process. Teams can incorporate the latest technology into buildings at the initial stages of design In many cases, manufacturers now offer bespoke access control solutions too, each designed to adapt around the end user’s needs while working with the architect on a design level. Through greater collaboration and the use of tailored solutions, architects are given the ability to choose consistent finishes and materials that fit the planned aesthetic, removing the need to try and match across various suppliers later down the line. Introducing tailored solutions Seemingly, access control will continue to play a larger role in building design as the industry progresses. And while the adoption of new technology may inherit an element of uncertainty for some, by introducing tailored solutions with seamless integration at early stages of the design process, architects can rest assured that their proposals address core challenges such as security and fire safety, while keeping their aesthetic vision intact.
Dr. Henrik Siegle has been the CTO at Bosch Building Technologies since November 2021. In this interview, he speaks about the megatrends of energy efficiency and sustainability, and about new developments in the building technology sector. Dr. Siegle, the building industry is currently facing major challenges in the form of climate change and energy shortages. How is Bosch Building Technologies dealing with these challenges? Dr. Henrik Siegle: Energy efficiency and sustainability have long been key priorities for us – and, indeed, for the entire Bosch Group. For Bosch Building Technologies, this also particularly applies to building automation. We have continually built up our strengths in this area in recent years, including through the takeover of other companies, especially in the United States and Germany – all with the aim of making buildings more energy efficient and more sustainable. We do this in a variety of ways, including automated HVAC control systems based on presence detectors, intelligent lighting and shade control. This approach enables us to optimise the operation of buildings, cut costs for customers and play our part in saving resources. Bosch itself became climate-neutral in 2020. How did you manage that? To achieve climate neutrality, we have implemented measures in four key areas Dr. Henrik Siegle: Bosch started addressing energy efficiency issues early on, which is why the Bosch Group, with more than 400 sites worldwide, is already climate-neutral. To achieve climate neutrality, we have implemented measures in four key areas – increasing energy efficiency, using more renewable energy from our own production, purchasing green energy and, finally, offsetting unavoidable CO2 emissions. We are working on further optimising our mix of measures, because the Bosch Group is totally committed to energy efficiency. We want to promote use of our energy-efficient products, but that’s not all – we are also keen to demonstrate our corporate commitment to sustainability. That’s why we analysed all our divisions, documented energy consumption and developed strategies for each individual division to cut our use of energy further. As the Bosch Building Technologies division, we supply solutions for the Group. One example is our cloud-based energy platform, which is used to analyse the individual energy flows in a factory on a very frequent basis and to predict future consumption. This enables us to continuously optimise our energy consumption at each individual site. The Bosch plant in Homburg is a good example. Since introducing the energy platform there, we have cut CO2 emissions by 6,700 metric tons in the first two years alone – that’s a reduction of 12 percent. At the Bosch Group, we also aim to reduce the CO2 emissions that we don’t generate ourselves directly, but which are produced in the supply chain, for example, or when our products are used. At Bosch, we are aiming to reduce these emissions by 15 percent by 2030. Can you give us some more examples of what Bosch Building Technologies is doing to help improve sustainability? Dr. Henrik Siegle: There are many initiatives and projects underway to increase sustainability at Bosch Building Technologies. One example is an environmentally friendly packaging concept that recently won an award within the Bosch Group. The concept, which involves reusing packaging material, not only significantly reduces the volume of waste, but also speeds up the repackaging processes. What’s more, the optimised size of the packaging also substantially reduces freight and storage volumes, which again cuts CO2 emissions. Our remote services are another fantastic example of the steps we are taking to increase sustainability. By offering our customers remote maintenance, we reduce the working hours involved, but that’s not all – this also prevents our service engineers having to travel to the customers’ premises, which again helps cut CO2 emissions. What is the significance of energy efficiency in the building sector overall? Dr. Henrik Siegle: Alongside industry, the building sector is responsible for approximately 40 percent of total CO2 emissions, so energy efficiency is clearly hugely important. The high proportion of emissions demonstrates the enormous potential for reducing energy consumption in the building sector and what big contribution we can make in this area with our sustainable solutions. Bosch turned the climate neutrality that we achieved as a Group into a business model Bosch turned the climate neutrality that we achieved as a Group into a business model and set up Bosch Climate Solutions GmbH, which is now part of Bosch Building Technologies. This means we are now in a position to offer to develop a climate neutrality strategy for other companies and supply them with the solutions they need through our system integrator. Companies have growing obligations to report on what they are doing to help the environment – and that’s why we’re working together with our partners to develop the building management services suite, or BMSS for short. This open, domain-spanning service offering combines and integrates the individual building systems, services and software solutions from various areas of application. This means the reliable facts about sustainability that are needed for ESG reporting can be generated – in other words, facts that constitute evidence of environmentally friendly operations. When it comes to the demand for energy efficiency solutions, is there such a thing as a typical customer? Dr. Henrik Siegle: We have a huge range of customers – from schools and hospitals to drugstore chains and industrial sites. Bosch Building Technologies offers a smartphone-based solution to provide contactless access to buildings Alongside sustainability, the connection of individual systems in safety and security technology has been a key topic for a long time now. How is Bosch Building Technologies positioning itself here as a full-service provider? Dr. Henrik Siegle: When it comes to connectivity, Bosch Building Technologies benefits hugely from cross-divisional collaboration within the Bosch Group. Overall, connectivity and the Internet of Things (IoT) are topics that we actively addressed at Bosch at a very early stage. As a result, we now have many years of experience of developing relevant technologies and applying these solutions professionally. There are a few solutions, in particular, that really stand out, such as Aviotec, our VdS-approved video-based fire detection system. The system’s security camera performs intelligent video analysis, which means we can detect a fire at a much earlier stage compared to conventional fire detection technology. What’s more, the camera’s built-in intelligence means it can be used for other purposes What’s more, the camera’s built-in intelligence means it can be used for other purposes, too, such as anti-intruder and anti-theft protection. We can also use it to monitor compliance with social distancing rules, for example. This is an innovative example of the connection of domains. However, it also goes without saying that connectivity plays a major role in our business within systems, too. In this context, I would like to mention our connected solutions that make it possible for technical building equipment processes to run as smoothly and efficiently as possible. These solutions include condition monitoring and predictive maintenance, for instance. One example is fire detection systems that independently supply information about their own operating condition and the necessary maintenance intervals. Another example comes from our Access & Intrusion business unit: We now also offer contactless access to buildings via a smartphone-based solution, i.e. via mobile credentials. In your view, what are the current and future market trends in security and building technology? Dr. Henrik Siegle: Well, regardless of market trends, it’s really important to us that we always put the customer at the centre of everything we do. What we want are solutions that meet customers’ needs – both now and in the future. Thanks to our user experience, or UX, method, we have an excellent understanding of what a customer actually wants and needs. That’s why we involve customers in the testing of our innovations as early as possible – it helps us find out whether and how the future product works in practice. We’re therefore always particularly close to our customers. We don’t just develop our products and solutions on this basis, but our services, too. When it comes to video security and intelligent building control in particular, artificial intelligence plays a key role Innovations in building technology are very wide ranging and, in my view, they all revolve around the megatrends of energy efficiency, sustainability, security and artificial intelligence. When it comes to video security and intelligent building control in particular, artificial intelligence plays a key role. This has huge potential – and we want to realise this potential more and more at Bosch. The video-based fire detection system that I’ve already mentioned is an excellent example. The thing that makes us stand out on the market is our business model, which is based on two key pillars. One of these is our system integrator business. This means we offer everything from a single source, right from the initial inquiry, consultancy and planning through to implementation and operation. The second pillar is our product business. The direct customer interface in the system integrator means we get direct feedback in the system integrator itself, both from customers themselves and from our colleagues. We incorporate this feedback into our product development processes. How is your system integrator business doing? Dr. Henrik Siegle: Very well. We’ve experienced good growth in this area in both Europe and North America. What’s more, just recently, we’ve also significantly expanded our system integrator business again through acquisitions in Germany, the United Kingdom and the Netherlands. One of our priorities is ensuring that our technology is always state of the art. Developing our expertise in this area also means that regular training for our associates is important, since technical developments are becoming more and more dynamic. Given this background, are you also feeling the impact of the skills shortage? Our business model can only work if we have skilled, motivated associates Dr. Henrik Siegle: It may sound obvious, but needless to say, our business model can only work if we have skilled, motivated associates. The question of how we attract new associates is not the only important one – it’s also vital to consider what we do for the ones we already employ. For example, we have our own academy spread across three sites in Germany, where we provide our associates with regular training, and we also put on a wide range of professional development seminars. To attract new talent, we offer dual study programmes along with programs for trainees, Master’s students and PhD students. We also often attend various career fairs. What’s more, we’re working more closely together with universities and institutes. We have quite a lot to offer in this regard. Our purpose, ‘Building solutions for a better life,’ doesn’t just motivate me personally – it also resonates very well outside Bosch. Bosch gives its associates the opportunity to work directly on important topics of both the present and the future with the aim of making the world a safer, more sustainable place – using state-of-the-art technologies such as artificial intelligence! Nevertheless, the skills shortage naturally still poses a major challenge.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
A housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. There is one entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution Highlights: Easy Intercom Retrofitting with Existing Cables Good Scalability for Easy Addition of New Units or Expansion Remote Access with App-based Features Solution Benefits: Future-proofing: With DNAKE 2-wire IP intercom solution, residences can now enjoy high-quality audio and video communication, multiple access options, including remote access, and the integration with surveillance systems, providing a more versatile and secured living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
There is an older housing estate located in Nagodziców 6-18, Poland with 3 entrance gates and 105 apartments. The investor wants to retrofit the property to improve the community safety and elevate residents’ smart living experience. One of the main challenges in this retrofit is managing the wiring. How can the project minimise disruption to the building’s occupants and reduce the impact on residents’ daily activities? Additionally, how can the costs be kept down to make the retrofit more economically attractive? The Solution Solution Highlights: No Wiring No Indoor Units Fast, Cost-Saving Retrofits Future-Proof Intercom Solution Solution Benefits: No Indoor Units, Cost-effectiveness: DNAKE cloud-based intercom services eliminate the need for expensive hardware infrastructure and maintenance costs associated with traditional intercom systems. There is no need to invest in indoor units or wiring installations. Instead, residents can pay for a subscription-based service, which is often more affordable and predictable. No Wiring, Ease of Deployment: Setting up DNAKE cloud-based intercom service is relatively easier and quicker, when compared to traditional systems. There’s no need for extensive wiring or complicated installations. Residents can connect to the intercom service using their smartphones, making it more convenient and accessible. Easy and Multiple Access Ways: In addition to facial recognition, PIN code, and IC/ID card, there are also multiple app-based access methods available, including calling & app unlocking, QR code, temp key and Bluetooth. Residence can manage access from anywhere at any time.
Soyak Olympiakent in Turkey comprises thousands of apartments that prioritise 'Quality in Life.' It offers a quality and safe living experience, featuring a natural environment, sports facilities, swimming pools, ample parking areas, and a 24-hour private security system supported by an IP video intercom system. The Solution Solution Highlights: Great scalability in large residential apartments Remote and easy mobile access Real-time video and audio communication Emergency alerts Solution Benefits: DNAKE smart intercoms have been installed in 4 Blocks, covering a total of 1,948 apartments. Each entry point features DNAKE S215 4.3” SIP video door stations for secure access. Residents can open doors for visitors not only through the 280M-S8 indoor monitor, typically installed in every apartment, but also via the Smart Pro mobile application, accessible anywhere and anytime. The master station 902C-A in the guard room facilitates real-time communication, enabling guards to receive updates about security events or emergencies immediately. It can connect multiple zones, allowing for better monitoring and response across the premises, thereby enhancing overall safety and security.
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expanding the reach of learning for the community. Colleges' challenge Alamo’s challenges included leveraging technology to support its high standards of safety and security as a priority for its campuses. They were tackling a technology gap among users across the diverse landscape of the larger San Antonio area and also wanted to support an effective work-life balance by transitioning faculty and staff from desktop to mobile devices. Action taken To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms A long-time customer of Alcatel-Lucent Enterprise, Alamo Colleges has stayed focused on providing a secure, reliable, and accessible network for learning. To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms and Alcatel-Lucent OmniAccess® Stellar wireless networking across its campuses. They expanded the reach of the OmniAccess Stellar Access Points to develop Park and Learn, enabling students to connect and complete their studies from the parking lots without the need to physically be on campus. Alcatel-Lucent solution Security and safety are of the utmost concern, and Alamo has leveraged its Alcatel-Lucent OmniPCX® phone system to make emergency calls to Alamo Colleges dispatch, 911, and local Bear County authorities. They recently added the Alcatel-Lucent Visual Notification Assistant (VNA) solution, which can pick up a call from a user on a mobile device and provide their location, expediting response time. To manage all these systems, Alamo uses Alcatel-Lucent OmniVista® Network Management. With one view of all the networks, Alamo’s IT staff can monitor the network during the ongoing construction of centres and provide maintenance remotely across its far-reaching network. Products and solutions Alcatel-Lucent OmniPCX® Enterprise Alcatel-Lucent 8128 MIPT handsets Alcatel-Lucent OmniSwitch® 6900-X72-F Alcatel-Lucent OmniSwitch® 6960E-U28 Alcatel-Lucent OmniSwitch® 6860E-P48 Alcatel-Lucent OmniSwitch® 6450E-P48 Alcatel-Lucent OmniAccess® Stellar AP1101 Alcatel-Lucent OmniVista® 2500 Network Management System Alcatel-Lucent Visual Notification Assistant (VNA) Results obtained Technical benefits Delivers redundant, reliable networks and high data transfer rates with OmniSwitch layer 3 and chassis solutions. Provides consistent and complete Wi-Fi across campuses and parking lots with OmniAccess Stellar wireless network. Advanced phone system supports 911 calls and notifies college security and county authorities with Alcatel-Lucent VNA solution. Simplifies monitoring with a unified view of the network and visual maps showing the status of switches in all college facilities. Financial benefits Saves on recurring service costs with the ALE solutions. Network Management single view shows how many switches and how many ports are in use, which helps in decision-making. User experience benefits Provides messaging notification services, conferencing capabilities, and broadcast alerts during a crisis on campus with VNA connected with Rainbow™ by Alcatel-Lucent Enterprise. eSports' popularity with students is growing thanks to high-performance networks. “The Alcatel-Lucent Enterprise products are reliable and just work. What I like best about the partnership with Alcatel-Lucent Enterprise is they’re always there for us,” said Christopher Delgado, Senior Manager of Network Operations, at Alamo Colleges.
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Aperio visitor access system Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key card and issue a replacement. Real-time and future-proofed Security staff at The Camp ensure only authorised users enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because (access) rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto, adding “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Aperio product ecosystem’s performance Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery-powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
Products
Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video systems are helping to ensure privacy?
White papers
Physical access control
DownloadThe key to unlocking K12 school safety grants
DownloadSecurity practices for hotels
DownloadPrecision and intelligence: LiDAR's role in modern security ecosystems
DownloadIntegrating IT & physical security teams
Download2024 trends in video surveillance
DownloadSecuring data centres: Varied technologies and exacting demands
DownloadHow to create a successful physical security roadmap
DownloadBest practices for asset management
Download5 easy steps to an upgraded video surveillance system
DownloadThe top 4 reasons to upgrade physical security with the Cloud
DownloadWhy SAAS Security Platform is more popular in American SMEs
DownloadCombining access control and intercoms for better security
DownloadCamera cyber lockdown
DownloadVideo technology strategies for hospitals are moving beyond security
DownloadPalm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download