Physical Security Information Management (PSIM)
Dragonfly and Vismo announce an integration partnership by which intelligence from Dragonfly’s Security Intelligence & Analysis Service will be available through the Vismo platform. Vismo will have access to Dragonfly’s 19,000 location risk scores and associated detailed intelligence reports and incident data. As a result, users of Vismo’s Locate & Protect App will be better protected when they are on the move. Two complementary capabilities The service combines two...
Arcserve, a major data protection and recovery software company, has been recognised for its excellence in SaaS backup, being named Cloud Backup Company of the Year at the Storage Awards 2024. The award recognised Arcserve as a provider of secure and resilient cloud storage and SaaS protection, highlighting the organisation as a trusted provider of data resilience solutions. Cloud data protection The awards showcase the best technologies, products, and solutions across the storage sector Arc...
RiverSafe, a global cybersecurity, DevOps, and AppSec professional services provider, has partnered with education-based charity - World Vision to improve access to education for children in Africa. World Vision World Vision is a global humanitarian organisation dedicated to improving the lives of children, families, and communities around the world. Focusing on providing education, healthcare, and emergency relief to those in need, they aim to break the cycle of poverty and open doors for a...
As a part of Teleste’s strategy execution, they have entered to an EMS-Partnership with Kyrel Oy from Finland. Through this new collaboration, Teleste aims to ensure continuous high quality, agility, and delivery reliability for our Public Safety and Mobility business unit. Kyrel is well known for its customer-centricity and reliability, values that Teleste shares. This creates a strong foundation for their partnership. Supply chain capabilities Marko Uutela, Director of Operations, Log...
Espria, the pioneer in digital workspace solutions, will host its next Optimise IT 2024 panel discussion, discussing how IT solutions with integrated AI technologies are best suited to support businesses and operation teams in 2024 and beyond. IT panel discussion Throughout 2024, Espria has hosted discussions on various topics, covering themes such as business peace of mind and business readiness. These discussions have featured key spokespeople from some of their pioneering IT solutions partn...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of the new HID® Signo™ Mechanical Keypad Reader 40T, engineered to offer high performance in harsh and challenging environments where the weather is wet or cold and visibility is low. The new reader has a robust IP-65 rated construction meaning the electrical components are dustproof and watertight along with a traditional mechanical push button keypad to make it easy to use when wearing gloves or...
News
Ajax Systems, Europe’s largest security systems manufacturer, and Yale, the smart home security solutions provider, are expanding their partnership to 30 additional countries. This announcement builds on the initial partnership revealed earlier in 2024, which has already seen successful implementations in several countries. Originally rolled out in five European countries, the integration is currently available to users and businesses in many more markets. Countries that support the integration Albania, Austria, Belgium, Bosnia, Bulgaria, Croatia, Cyprus, Czechia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Latvia, Lithuania, Luxembourg, Montenegro, Netherlands, North Macedonia, Poland, Romania, Serbia, Slovakia, Slovenia, Switzerland, Turkey, Ukraine, Norway (previously integrated), Sweden (previously integrated), Spain (previously integrated), Portugal (previously integrated), Italy (previously integrated). Linus® Smart Lock L2 The new smart lock is designed to adapt to most cylinders/locks and can be quickly mounted on the door To further enhance this offering, Yale has released a new model of its flagship smart lock that can also be controlled via Ajax apps, the Linus® Smart Lock L2. It features enhanced durability, quieter performance, and twice the speed of the previous generation of Linus® Smart Lock. The new smart lock is designed to adapt to most cylinders/locks and can be quickly mounted on the door with no modifications needed and removed without leaving any marks. With Linus® L2, consumers can easily lock/unlock their doors without needing to keep track of any keys and share virtual keys with friends, family, and trusted individuals for full control over their home access. Cloud-to-Cloud connection Overall, this partnership makes life easier for Ajax users, as they can manage and control their Yale Smart Locks directly from the Ajax app. Consumers can enjoy a Cloud-to-Cloud connection to guarantee smooth and secure communication with their Yale Smart Lock and Ajax system. With this integration, users can easily lock and unlock their Yale Smart Lock and see the lock status within the app. Advanced automation options Beyond automatic locking or unlocking, the integration offers advanced automation options. Users and security monitoring companies also receive instant notifications whenever there's a change in the status of the Yale smart lock and can respond accordingly. They can access a detailed event history log within the Ajax app.
HID, a worldwide pioneer in trusted identity and physical access control solutions, announces the 2024 State of Physical Access Control Report, identifying five key trends that are shaping the future of access control. Produced by IFSEC Global in partnership with HID, the report surveyed over 1,200 security professionals across the globe to paint a picture of an industry that has been going through considerable transformation. Conducted between November 2023 and January 2024, the survey reveals five trends, as follows: Mobile access and digital ID set to become ubiquitous While physical ID is still prevalent within the access control industry, there is no doubt that mobile access credentials and digital IDs are quickly gaining ground. According to this report, nearly two in five organisations (39%) now actively use mobile identities with respondents naming touchless/contactless solutions (48%) and mobile access (44%) as the two largest trends shaping the wider access control industry. Open standards driving the smart buildings phenomenon Open standards have become key drivers for more converged security solutions Open standards have become key drivers for more converged security solutions, where physical access control data is helping not just to decide who should be allowed into the building, but also how that building can best be used. As the report shows, almost half of organisations (48%) already have access control/badge scanning systems in place to monitor building usage throughout the day, at least to some extent. Additionally, 43% of respondents cited smart buildings and flexible workspaces being among the top three trends shaping the wider access control industry. Integration with other business functions was also listed by one in three respondents (32%) as another top trend. Sustainability becoming a greater influence on business decisions Sustainability plays a significant role in access control with nearly two-thirds (63%) of respondents citing that those with responsibility for sustainability have either some influence or are fully consulted when it comes to upgrading physical access control systems. The rise of artificial intelligence for analytics use cases The use of Artificial Intelligence capabilities in physical access control is becoming more common as AI technologies and expertise are developed. Asked if they are looking to incorporate AI/machine learning into their access control solutions, 38% of them stated they were (although the same percentage said they were unsure of the benefits). Only 23% said they didn’t have any plans to incorporate AI technologies. The growing role of biometrics – especially contactless solutions The biometrics market is growing at a rapid pace. By 2031 the worldwide market for biometrics is expected to reach $136.18 billion while the global facial recognition market alone is predicted to grow to $16.74 billion by 2030, up from $3.83 billion in 2020. That’s a CAGR of 16% from 2021 to 2030. All data cited in this press release are from the full report, which provides an in-depth analysis of what is driving the physical access control industry now and into the future.
Westminster Security Group, a renowned name in private security, announces a strategic investment in Tratix, an innovative technology company based in Tel Aviv. Tratix, founded and led by seasoned entrepreneur - Sharon Rashty, specialises in cutting-edge solutions to help prevent cargo theft. With a distinguished background in Israeli Intelligence services and building early-stage startups, Sharon Rashty brings a wealth of experience to Tratix. Her expertise in tailing detection, counter-surveillance, and criminal behaviour profiling drives innovation in security solutions, safeguarding supply chains, and protecting valuable assets. Tailing Detection System Adopted by industry pioneers, Tratix ensures that cargo receives unparalleled protection Tratix emerges as a beacon of innovation in the realm of logistics and transportation, addressing the escalating threat of cargo theft globally with its groundbreaking technology. The company's flagship solution, the Tailing Detection System, offers a proactive approach to prevent theft incidents before they occur. Amidst dynamic criminal tactics, Tratix emerges as a beacon of innovation, with the Tailing Detection System representing more than just a solution – it embodies a steadfast commitment to securing cargo and fortifying supply chains. Adopted by industry pioneers, Tratix ensures that cargo receives unparalleled protection. Close protection setting John Moore, CEO of Westminster Security Group, said, "As pioneers in the security industry we are always thinking outside of the box and ahead of the curve. Cargo theft is a massive problem globally with vehicles being easy targets and often sitting ducks, Tratix solves this." He adds, "It also has other potential uses such as protecting cash and valuables in transit (CViT) vehicles, anti-stalking, and within a personal close protection setting. We are excited to be working with Sharon to develop this technology, utilising our experience, and expertise to help prevent cargo theft, and help recover it, should the unfortunate happen." Advancing cutting-edge technologies Tratix CEO, Sharon Rashty, said: "I'm thrilled about our partnership with Westminster Security Group. This investment accelerates our journey to revolutionise logistics security. With our Tailing Detection System, we're committed to staying ahead of threats and safeguarding supply chains. Together, we'll redefine industry standards for security solutions." Westminster Security Group's investment in Tratix underscores its commitment to advancing cutting-edge technologies in the realm of security. Together, they aim to revolutionise cargo theft prevention and safeguard supply chains globally.
dormakaba has earned prominent recognition for its sustainability management and is listed as one of the 500 'World’s Most Sustainable Companies 2024' by TIME magazine. The ranking has been developed for the first time by TIME in partnership with Statista with the aim to recognise corporate responsibility and advance sustainable practices. "We have worked diligently to establish a pioneering sustainability program in our industry, and we are delighted to have been recognised by TIME magazine for what we have achieved. Of course, sustainability management is a marathon, not a sprint. So, we are fully dedicated to continuing on this journey together with our colleagues across the world," said Stephanie Ossenbach, Group Sustainability Officer of dormakaba. Other significant recognitions The comprehensive methodology of the selection tapped from a pool of more than 5,000 of the world's largest and most influential companies, assessed over 20 sustainability criteria, including performance in relevant areas of environmental and social KPIs, such as carbon emissions, energy intensity, employee turnover and work safety, public commitment to sustainability targets and transparent reporting. The top-scoring 500 companies were awarded as 'World’s Most Sustainable Companies 2024'. During this year dormakaba achieved other significant recognitions for its sustainability performance, such as a gold medal from the sustainability assessment firm EcoVadis, Prime Status by the ISS ESG Corporate Rating and AA rating by MSCI. Further, dormakaba was recently named as one of Europe’s Climate Leaders by the Financial Times.
Secure Logiq and Ivideon are pleased to announce a strategic partnership aimed at enhancing cooperation and delivering unparalleled video surveillance capabilities. Harnessing the strength of both companies, this partnership merges Secure Logiq’s advanced server technology with Ivideon's comprehensive cloud solutions, creating a hybrid approach that meets the dynamic needs of modern video surveillance. On-premises solutions With over 12 years of experience, Ivideon has emerged as a rapidly growing provider of cloud video surveillance and analytics, serving more than five million users in over 120 countries. Recently, the company introduced Ivideon Node (a local extension of Ivideon Cloud) and Ivideon Smart Bridge, designed for on-premises solutions. Ivideon Smart Bridge further enhances this synergy with AI-powered capabilities Supporting up to 300 cameras per server, Ivideon Node facilitates seamless integration into hybrid networks, ensuring high fault tolerance of local storage, while capitalising on the benefits of cloud surveillance. Ivideon Smart Bridge further enhances this synergy with AI-powered capabilities, such as Face Recognition, Visitor Counters, Footfall Traffic Analysis, ANPR, Fire & Smoke Detection, and Access Control Systems. Key features of the partnership Key features of the partnership include rapid scalability, seamless integration via API & SDK, advanced analytics and reporting tools. These solutions facilitate effortless upgrades, enabling existing CCTV setups to transition seamlessly to cloud integration without camera replacement. "We are very excited to partner with Ivideon to enrich our video surveillance offerings," said Hayley Joseph, Markets & Channel Manager of Secure Logiq. Advanced cloud-based solutions Hayley Joseph adds: "This collaboration allows us to deliver the best of both worlds - high-performance on-premises servers alongside advanced cloud-based solutions." "With a truly hybrid solution catering to diverse needs, we anticipate this partnership to deliver reliability, intelligence and scalability to our clients," noted Iliya Ilchishin, Head of International Sales of Ivideon, adding "We’re eager to see what the future holds with Secure Logiq."
With approximately 3,000 sheriffs covering 70% of the United States, managing resources efficiently is paramount. The integration of security cameras, drones, and body cameras with powerful facial recognition systems enables law enforcement to scan large areas in real-time or retrospectively, identifying suspect appearances and gathering valuable information. Some of these technologies will be showcased at the National Sheriffs' Association Conference in Oklahoma this week. Drones enhancing search and rescue operations Drones have become essential tools for sheriff departments, particularly in search and rescue operations. In Sumter County, Florida, the sheriff's office has utilised high-tech drones to quickly locate missing individuals, saving numerous lives. These drones provide real-time aerial surveillance, which is crucial in vast and challenging terrains where traditional search methods may be less effective. Body cameras identifying suspects in real-time Body cameras are now widely adopted to ensure transparency and accountability in law enforcement. These devices record interactions between officers and the public, providing evidence in cases of allegations of misconduct. Moreover, body cameras help in documenting crime scenes and capturing real-time events, essential for accurate forensic analysis and legal proceedings. Facial recognition for quick identification Facial recognition is rapidly being merged into law enforcement plans to expedite the process Facial recognition technology is rapidly being integrated into law enforcement systems to expedite the identification process. This technology is particularly useful for spotting wanted individuals and verifying the identities of inmates transported to court. Sheriff's departments use facial recognition to cross-reference faces with databases of known offenders, ensuring that suspects are correctly identified and apprehended swiftly. Corsight AI's advanced facial intelligence platform Corsight AI provides an advanced facial intelligence platform to law enforcement agencies worldwide. According to Shay Poleg, Corsight AI U.S. Sales Director: "Our platform allows for real-time scanning and post-event analysis, recognising wanted individuals and identifying suspicious scenarios. We provide sheriffs with the tools they need to enhance public safety and streamline operations. To be able to do this, you'll need software able to reliably recognise a face in real-world conditions of low visibility, poor video quality, limited camera angles, distance, motion, facial coverage, and outdoor darkness." Speeding forensic investigations In forensic investigations, advanced technologies play a pivotal role. When evidence is collected from crime scenes, drones and body cameras help document the scene meticulously. Video analytics and facial recognition further aid in the fast analysis of long hours of video footage to identify suspects or witnesses, significantly speeding up the investigative process. Sheriff departments across the U.S. are committed to leveraging these technologies to enhance their capabilities, improve public safety, and maintain the highest standards of accountability in their operations. As these tools continue to evolve, their integration into everyday law enforcement activities is expected to become even more widespread and sophisticated.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialised skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organised theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilised the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilise security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasising the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organisations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualisation, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organisations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organisations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialised knowledge in data visualisation and metrics analysis will ensure that this technology is utilised effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analysing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralised view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organisation. When security can proactively provide solutions and effectively address risks that arise in all corners of the organisation, it becomes the cornerstone of overall organisational safety. Modern security approaches This collaborative environment will empower the organisation to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organisation to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organisations in an ever-shifting environment.
Where access control is concerned, architects and design teams must find the right balance between aesthetics, functionality and security, says Daniel May of Consort Architectural Hardware. Following a period of innovation and integration, access control has developed into an ever-prominent facet of building design over the past decade. Where systems were once rudimentary, modern user requirements have led to several operational and technological advancements, resulting in a versatile selection of options that move beyond the limited capabilities of centralised deployment architecture. Growing market demand The push for smarter buildings has played its part too. In fact, according to a 2022 report, the number of smart buildings worldwide is projected to climb from 45 million to 115 million by 2026, with global market size estimated to hit $201.16 billion by 2031 - and this growth shows no signs of slowing down (omitting another global pandemic). The number of smart buildings worldwide is projected to climb from 45 million to 115 million by 2026 In order to meet growing market demand, manufacturers continue to modernise access control solutions, introducing the use of mobile credentials, cloud control and even bio-metric systems. As such, the specification process for access control hardware continues to become more nuanced, and for architects in particular, there’s an increasing challenge to ensure all design objectives are met. With this in mind, how can professionals strike a balance between seamless integration and design? Modern hotel environments For many decision makers, access control is viewed as an efficient and flexible route to securing their building. But more than that, it has become critical to the operative performance of our built environment, where from residential settings to commercial space, the adopted use of interconnected systems is further boosting accessibility, functionality and security. Take modern hotel environments for example. According to a 2022 report, 56% of hospitality consumers expressed locking and unlocking rooms using biometrics and facial recognition would enhance their experience. From Wi-Fi infrastructures to cloud services, technology has almost become synonymous with a hotel guest’s experience and is designed to improve their stay. Where digital access control systems are adopted, guests can interact with the premises independently, streamlining their access to essential entry points while safeguarding rooms against unauthorised visitors. Hotel operators benefit from enhanced building security and increased traceability Higher guest ratings Similarly, hotel operators benefit from enhanced building security and increased traceability, not to mention improved business efficiency and higher guest ratings. Ultimately, better-quality aesthetics enhance environments by making them more welcoming However, while security and accessibility are frequently top of the agenda when it comes to specifying hardware, from an architectural perspective, a solution’s aesthetic is just as valuable and plays a crucial role in the decision-making process. Often, door hardware can feel like the finishing touch to a design project, and so, careful consideration must go into consistent design choices that make a positive impact on the building’s aesthetic. Ultimately, better-quality aesthetics enhance environments by making them more welcoming. Access control systems Again, hospitality is a good case in point, where hotels must ensure their environment is visually pleasing as part of the service quality offered to their guests. However, a survey on urban design revealed 40% of architects find incorporating security measures into new developments without impacting aesthetic appeal a key design challenge. With this in mind, architects and design teams can be forgiven for past frustration towards the unattractive and cumbersome access control systems that were once in their infancy. In reality, today’s systems offer a much more seamless design, and with end users placing value on key elements such as accessibility, fire safety and reliability, it’s now possible to incorporate a solution that works for everyone. Hospitality is a good case in point, where hotels must ensure their environment is visually pleasing Combining value and visuals Upon recognising today’s access control systems promote functionality and seamless installation without compromising aesthetics, there’s a growing demand for comprehensive, single-package solutions across many contemporary projects. As a result, architects and designers are increasingly met with questions on door hardware and access control and must keep up to date with the latest solutions that are available. Architects and designers are increasingly met with questions on door hardware and access control As such, the initial design stage provides an opportune period for architectural teams to consider the needs of the end user in relation to access control systems. From a building’s security elements to its flow of movement, there are various objectives to reflect upon, and architects must look to develop their knowledge on access control solutions to ensure all end user objectives are met, and all while considering the final aesthetic. Access control solutions Naturally, projects can often benefit from greater collaboration and architectural professionals are urged to lean on the expertise of manufacturers where required. By working closely with trusted manufacturers early in the process, teams can incorporate the latest technology into buildings at the initial stages of design, as opposed to being an addition later in the process. Teams can incorporate the latest technology into buildings at the initial stages of design In many cases, manufacturers now offer bespoke access control solutions too, each designed to adapt around the end user’s needs while working with the architect on a design level. Through greater collaboration and the use of tailored solutions, architects are given the ability to choose consistent finishes and materials that fit the planned aesthetic, removing the need to try and match across various suppliers later down the line. Introducing tailored solutions Seemingly, access control will continue to play a larger role in building design as the industry progresses. And while the adoption of new technology may inherit an element of uncertainty for some, by introducing tailored solutions with seamless integration at early stages of the design process, architects can rest assured that their proposals address core challenges such as security and fire safety, while keeping their aesthetic vision intact.
Dr. Henrik Siegle has been the CTO at Bosch Building Technologies since November 2021. In this interview, he speaks about the megatrends of energy efficiency and sustainability, and about new developments in the building technology sector. Dr. Siegle, the building industry is currently facing major challenges in the form of climate change and energy shortages. How is Bosch Building Technologies dealing with these challenges? Dr. Henrik Siegle: Energy efficiency and sustainability have long been key priorities for us – and, indeed, for the entire Bosch Group. For Bosch Building Technologies, this also particularly applies to building automation. We have continually built up our strengths in this area in recent years, including through the takeover of other companies, especially in the United States and Germany – all with the aim of making buildings more energy efficient and more sustainable. We do this in a variety of ways, including automated HVAC control systems based on presence detectors, intelligent lighting and shade control. This approach enables us to optimise the operation of buildings, cut costs for customers and play our part in saving resources. Bosch itself became climate-neutral in 2020. How did you manage that? To achieve climate neutrality, we have implemented measures in four key areas Dr. Henrik Siegle: Bosch started addressing energy efficiency issues early on, which is why the Bosch Group, with more than 400 sites worldwide, is already climate-neutral. To achieve climate neutrality, we have implemented measures in four key areas – increasing energy efficiency, using more renewable energy from our own production, purchasing green energy and, finally, offsetting unavoidable CO2 emissions. We are working on further optimising our mix of measures, because the Bosch Group is totally committed to energy efficiency. We want to promote use of our energy-efficient products, but that’s not all – we are also keen to demonstrate our corporate commitment to sustainability. That’s why we analysed all our divisions, documented energy consumption and developed strategies for each individual division to cut our use of energy further. As the Bosch Building Technologies division, we supply solutions for the Group. One example is our cloud-based energy platform, which is used to analyse the individual energy flows in a factory on a very frequent basis and to predict future consumption. This enables us to continuously optimise our energy consumption at each individual site. The Bosch plant in Homburg is a good example. Since introducing the energy platform there, we have cut CO2 emissions by 6,700 metric tons in the first two years alone – that’s a reduction of 12 percent. At the Bosch Group, we also aim to reduce the CO2 emissions that we don’t generate ourselves directly, but which are produced in the supply chain, for example, or when our products are used. At Bosch, we are aiming to reduce these emissions by 15 percent by 2030. Can you give us some more examples of what Bosch Building Technologies is doing to help improve sustainability? Dr. Henrik Siegle: There are many initiatives and projects underway to increase sustainability at Bosch Building Technologies. One example is an environmentally friendly packaging concept that recently won an award within the Bosch Group. The concept, which involves reusing packaging material, not only significantly reduces the volume of waste, but also speeds up the repackaging processes. What’s more, the optimised size of the packaging also substantially reduces freight and storage volumes, which again cuts CO2 emissions. Our remote services are another fantastic example of the steps we are taking to increase sustainability. By offering our customers remote maintenance, we reduce the working hours involved, but that’s not all – this also prevents our service engineers having to travel to the customers’ premises, which again helps cut CO2 emissions. What is the significance of energy efficiency in the building sector overall? Dr. Henrik Siegle: Alongside industry, the building sector is responsible for approximately 40 percent of total CO2 emissions, so energy efficiency is clearly hugely important. The high proportion of emissions demonstrates the enormous potential for reducing energy consumption in the building sector and what big contribution we can make in this area with our sustainable solutions. Bosch turned the climate neutrality that we achieved as a Group into a business model Bosch turned the climate neutrality that we achieved as a Group into a business model and set up Bosch Climate Solutions GmbH, which is now part of Bosch Building Technologies. This means we are now in a position to offer to develop a climate neutrality strategy for other companies and supply them with the solutions they need through our system integrator. Companies have growing obligations to report on what they are doing to help the environment – and that’s why we’re working together with our partners to develop the building management services suite, or BMSS for short. This open, domain-spanning service offering combines and integrates the individual building systems, services and software solutions from various areas of application. This means the reliable facts about sustainability that are needed for ESG reporting can be generated – in other words, facts that constitute evidence of environmentally friendly operations. When it comes to the demand for energy efficiency solutions, is there such a thing as a typical customer? Dr. Henrik Siegle: We have a huge range of customers – from schools and hospitals to drugstore chains and industrial sites. Bosch Building Technologies offers a smartphone-based solution to provide contactless access to buildings Alongside sustainability, the connection of individual systems in safety and security technology has been a key topic for a long time now. How is Bosch Building Technologies positioning itself here as a full-service provider? Dr. Henrik Siegle: When it comes to connectivity, Bosch Building Technologies benefits hugely from cross-divisional collaboration within the Bosch Group. Overall, connectivity and the Internet of Things (IoT) are topics that we actively addressed at Bosch at a very early stage. As a result, we now have many years of experience of developing relevant technologies and applying these solutions professionally. There are a few solutions, in particular, that really stand out, such as Aviotec, our VdS-approved video-based fire detection system. The system’s security camera performs intelligent video analysis, which means we can detect a fire at a much earlier stage compared to conventional fire detection technology. What’s more, the camera’s built-in intelligence means it can be used for other purposes What’s more, the camera’s built-in intelligence means it can be used for other purposes, too, such as anti-intruder and anti-theft protection. We can also use it to monitor compliance with social distancing rules, for example. This is an innovative example of the connection of domains. However, it also goes without saying that connectivity plays a major role in our business within systems, too. In this context, I would like to mention our connected solutions that make it possible for technical building equipment processes to run as smoothly and efficiently as possible. These solutions include condition monitoring and predictive maintenance, for instance. One example is fire detection systems that independently supply information about their own operating condition and the necessary maintenance intervals. Another example comes from our Access & Intrusion business unit: We now also offer contactless access to buildings via a smartphone-based solution, i.e. via mobile credentials. In your view, what are the current and future market trends in security and building technology? Dr. Henrik Siegle: Well, regardless of market trends, it’s really important to us that we always put the customer at the centre of everything we do. What we want are solutions that meet customers’ needs – both now and in the future. Thanks to our user experience, or UX, method, we have an excellent understanding of what a customer actually wants and needs. That’s why we involve customers in the testing of our innovations as early as possible – it helps us find out whether and how the future product works in practice. We’re therefore always particularly close to our customers. We don’t just develop our products and solutions on this basis, but our services, too. When it comes to video security and intelligent building control in particular, artificial intelligence plays a key role Innovations in building technology are very wide ranging and, in my view, they all revolve around the megatrends of energy efficiency, sustainability, security and artificial intelligence. When it comes to video security and intelligent building control in particular, artificial intelligence plays a key role. This has huge potential – and we want to realise this potential more and more at Bosch. The video-based fire detection system that I’ve already mentioned is an excellent example. The thing that makes us stand out on the market is our business model, which is based on two key pillars. One of these is our system integrator business. This means we offer everything from a single source, right from the initial inquiry, consultancy and planning through to implementation and operation. The second pillar is our product business. The direct customer interface in the system integrator means we get direct feedback in the system integrator itself, both from customers themselves and from our colleagues. We incorporate this feedback into our product development processes. How is your system integrator business doing? Dr. Henrik Siegle: Very well. We’ve experienced good growth in this area in both Europe and North America. What’s more, just recently, we’ve also significantly expanded our system integrator business again through acquisitions in Germany, the United Kingdom and the Netherlands. One of our priorities is ensuring that our technology is always state of the art. Developing our expertise in this area also means that regular training for our associates is important, since technical developments are becoming more and more dynamic. Given this background, are you also feeling the impact of the skills shortage? Our business model can only work if we have skilled, motivated associates Dr. Henrik Siegle: It may sound obvious, but needless to say, our business model can only work if we have skilled, motivated associates. The question of how we attract new associates is not the only important one – it’s also vital to consider what we do for the ones we already employ. For example, we have our own academy spread across three sites in Germany, where we provide our associates with regular training, and we also put on a wide range of professional development seminars. To attract new talent, we offer dual study programmes along with programs for trainees, Master’s students and PhD students. We also often attend various career fairs. What’s more, we’re working more closely together with universities and institutes. We have quite a lot to offer in this regard. Our purpose, ‘Building solutions for a better life,’ doesn’t just motivate me personally – it also resonates very well outside Bosch. Bosch gives its associates the opportunity to work directly on important topics of both the present and the future with the aim of making the world a safer, more sustainable place – using state-of-the-art technologies such as artificial intelligence! Nevertheless, the skills shortage naturally still poses a major challenge.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed toward this sector, estimated to grow at about 10% per year. There is no doubt that the Middle East has become one of the most important and fastest-growing security markets in the world. While traditional real estate management requires a location-based approach, the digital transformation of the marketplace means that centralised systems management will replace the traditional approach, and that's exactly what Provis is starting to think about. The customer Provis is a property management company based in the United Arab Emirates (UAE) Provis is a property management company based in the United Arab Emirates (UAE). With over 25,000 units under property management, over 28,000 units under Owners’ Association management, and thousands of properties sold and leased. Based on their accumulated in-depth industry knowledge, and technical expertise, it is their commitment to provide sustainable value-added services through the assets of their clients. Integrated service solutions To provide integrated service solutions based on international standards, allowing clients to focus on their core business with peace of mind, thereby setting a new benchmark for integrated real estate service solutions globally. For its owners to centrally manage their users and deliver smarter, easier real estate solutions to their customers, Provis turned to Anviz's integrator partners, PROGRESS SECURITY & SAFETY SYSTEMS and MEDC, for assistance. The challenge The company's business continues to grow and expand across various regions of the country Traditional property management in the UAE local area is inefficient and intensive, property managers need to spend a lot of time and energy to manually deal with those complicated and repetitive work. Conventional management is unable to effectively analyse a large amount of data, making it difficult to provide a basis for decision-making. Impact on user experience The delay and errors of manual processing are the very drawbacks that can be precisely removed in information management. Moreover, as the company's business continues to grow and expand across various regions of the country, the practice of processing information in a decentralised manner by location not only tends to create information silos, making it difficult to integrate and share data but also leads to delays in customer service due to lack of information exchange, thereby affecting user experience and the corporate image. The solution Thinking about the cut-and-dry and providing a heartfelt service Face Deep 3 maximises supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres No matter whether in the youthful campus or orderly government and other places, there will be the movement of people. Quickly and accurately checking people is a basic requirement for front-end devices, and their Face Deep 3 maximises this need. It supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres (6.5 feet) in less than 0.3 seconds, with customised alerts and various reports. The Account Manager of Provis said, "In the past, we always struggled with the data integration of multi-point control. Having used terminal devices and software that were not part of a single system, we found that it had no linkage effect and could not solve the problem of event recording and data sharing. And location-based time and attendance solutions were ineffective in centralising user management." Perspective of the CrossChex system Based on the scenario of property management, the personnel are scanned and inspected by Face Deep 3 and then redirected to the management department through the CrossChex application and CrossChex Cloud Web software to achieve data sharing and transfer. Thus, the workflow of the property personnel is streamlined and standardised. Efficiency and cost management CrossChex system integrates the property work content in an all-round and multi-dimensional way From the perspective of the CrossChex system, it integrates the property work content in an all-round and multi-dimensional way, which makes property management more scientific and orderly, improves management efficiency, and reduces cost. Meanwhile, the CrossChex system adopts a centralised management approach to gather all the information resources on a single platform. It also supports integration with ERP solutions to facilitate integrated management, which can reduce manpower and improve efficiency. The benefits Precision management, digital intelligence service CrossChex Cloud, as a software platform with customised functions based on customer scenarios, combined with Face Deep 3, which is embedded with the most updated technological algorithms, seamlessly handles the data of people's movements and promptly processes the event records to form multi-form visualisation reports. Additionally, it supports business customisation and expansion to meet different business needs. It provides safe and reliable data encryption and rights management to protect user information security. Client’s quote Provis' Project Manager said, "Choosing to use Anviz's time attendance devices and cloud-based platform, allowed us to solve 89% of the repetitive steps for our owners' property management matters, making our brand image more visible."
Completed in 2023, Thanet Parkway Station, the new high-speed rail hub serving the Thanet area in southeast Kent, has implemented a significant infrastructure enhancement: the installation of high-quality parking barriers to optimise accessibility and safety within its premises. Investment in connectivity Thanet Parkway Station, which opened on 31st July 2023, is a testament to the region's commitment to advancing its transportation infrastructure. With a total investment of £44 million secured through a combination of council financing and various building and growth funds, the station addresses the rising demand for efficient connectivity to London and neighbouring towns. Swift and convenient travel Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility Featuring two expansive platforms capable of accommodating 12-car trains and strategically situated on the high-speed line through Ashford International, Thanet Parkway Station offers commuters swift journeys to key destinations. Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility, alleviating congestion in central Thanet and providing convenient access to the surrounding areas. Enhancing safety and traffic flow To enhance safety and streamline traffic flow within the station's car park and adjoining pedestrian and cycleway, Jacksons Fencing was specified to implement a comprehensive suite of parking barriers and demarcation measures. Warden Swing Barriers were installed along the pedestrian and cycleway to regulate vehicular access. These galvanised steel barriers offer a robust solution, while ensuring ease of operation for maintenance and emergency vehicles. Safeguarding pedestrian pathways Along the same path, Jacksons Fencing’s timber knee rail fencing served as an unobtrusive demarcation device. This fencing solution, constructed from kiln-dried, pressure-treated timber and galvanised steel straps, safeguards grass verges and delineates pedestrian pathways. Ensuring peace of mind Strategically positioned to enforce height restrictions within designated parking areas, Jacksons’ MaxHite parking height restriction barriers were installed. Crafted from galvanised steel and finished in a highly visible yellow polyester powder coating, the barriers provide durable protection against unauthorised access, while facilitating smooth traffic management. Each installed product comes with the assurance of Jacksons Fencing’s 25-year guarantee, symbolising a commitment to quality and sustainability. High-quality, sustainable products Commenting on the project, Peter Jackson, Managing Director of Jacksons Fencing, underscored the transformative impact of the enhanced security measures at Thanet Parkway Station, said "As a local supplier, we’re thrilled to have been involved in this project, and it’s great to see that the developers have invested in high-quality, sustainable products, showcasing this project’s commitment to providing a lasting transport solution for the community." He adds, "Beyond parking, the upgraded access control and increased security measures not only enhance safety, but also foster a profound sense of reassurance and pride in the area for all station users."
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that Park City School District (PCSD) of Summit County, Utah has deployed its proactive gun detection and intelligent situational awareness solution to mitigate gun-related violence. Park City School District (PCSD) Nestled within the mountains of the year-round resort town, PCSD encompasses four elementary schools, a middle school, a junior high, a high school, and a learning centre. The district educates nearly 5,000 students annually and boasts a graduation rate in the top 1 percent of the nation. Intelligent situational awareness software AI gun detection and intelligent situational awareness software is layered on existing digital security cameras PCSD is highly focused on student safety, collaborating with the Summit County Sheriff's Department and the Park City Police Department to deploy advanced electronic, physical, and procedural security measures. ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras at all eight student-occupied PCSD buildings. ZeroEyes Operations Centre If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local staff and first responders in as fast as 3 to 5 seconds from detection. AI algorithms The platform does not store personal or biometric data or conduct any kind of facial recognition The company's AI algorithms only search for guns, not faces or bodies. Until a gun is identified, the monitoring screens in the ZOC stay blank; the ZeroEyes Operations team does not see a live feed from any cameras. Further, the platform does not store personal or biometric data or conduct any kind of facial recognition. Gun-related violence “We hold a deep commitment to safeguarding our students and staff, and ZeroEyes is a compassionate ally in our mission,” said Michael Tanner, COO of Park City School District. He adds, “By addressing the concerns of gun-related violence while also respecting the need for privacy, this solution allows us to provide a secure yet welcoming campus environment.” Proactive safety measures “Between its collaboration with local law enforcement and the deployment of proactive safety measures throughout its schools, Park City School District has shown that it is on the cutting edge of security,” said Mike Lahiff, CEO, and Co-Founder of ZeroEyes, adding “We are proud to work alongside this dedicated leadership team to protect students and staff against gun-related threats.” Park City School District was introduced to ZeroEyes through the company’s exclusive Utah reselling partner Aegix, a provider of industry-pioneering resources, technology, equipment, and training for first responders.
Honeywell announced that Petróleos del Perú S.A. (Petroperú), one of the largest hydrocarbon producers, refiners, and distributors in Peru, will implement Honeywell cybersecurity solutions to help Petroperú strengthen the cyber resiliency of its refinery operations and accelerate its broader digital transformation. Cybersecurity consulting support Petroperú’s multi-year investment with Honeywell includes access to Honeywell’s cybersecurity consulting support, managed security services, and world-class threat detection capabilities. Honeywell will help Petroperú further scale its operational technology (OT) cybersecurity efforts to improve visibility into potential cybersecurity vulnerabilities and threats across its systems. Cybersecurity resiliency “Cybersecurity resiliency is a crucial capability that underpins our sustainable operations as we work toward the future in the energy transition,” said Fernando Villacorta Padilla, Chief Controls and Advanced Applications Engineer at Petroperú. He adds, “Honeywell’s cybersecurity services complement the innovative software solutions that it previously developed to support our digitalisation initiatives and our refinery modernisation project.” Honeywell Forge Workforce Competency solutions Integration of Honeywell cybersecurity solutions will help Petroperú to further improve its operational efficiency Petroperú’s implementation of Honeywell’s cybersecurity solutions builds upon its prior integration of Honeywell Forge Workforce Competency solutions, which the company currently uses to train its industrial workforce regarding safer and more efficient operations. The added integration of Honeywell cybersecurity solutions will help Petroperú to further improve its operational efficiency, safety, and security programs across Petroperú’s plants and refineries. Safe, more efficient operations “Without strong cybersecurity capabilities, energy companies that heavily rely on technology and information systems to operate can face serious consequences, including financial losses, operational disruptions, reputational damage, and environmental risks,” said Sunil Pandita, Vice President and General Manager of Honeywell Cyber & Connected Industrials. He adds, “While Petroperú is already at the forefront of the digital transformation within the energy sector, Honeywell’s cybersecurity solutions will help Petroperú to identify and minimise potential cyber risks in near real-time to create safer, more efficient operations that benefit both customers and employees.” Improving OT cybersecurity defences Honeywell has been working with Petroperú for almost 50 years. Additionally, Honeywell provides engineering, licences, services, and technical support for three units currently in operation. Honeywell cybersecurity solutions can help organisations improve their OT cybersecurity defences with vendor-agnostic solutions designed to assist in identifying, prioritising, and reducing OT cyber risks and potential vulnerabilities through advanced monitoring and detection.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video systems are helping to ensure privacy?
Like any year, 2022 was full of surprises for the physical security industry. Adapting to supply chain shortages, lightning-fast technology development, and changing occupancy patterns in a shifting labor market were just a few of the factors that kept security professionals guessing in 2022. Wonder what the new year will hold? We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead (2023)?
White papers
![Precision and intelligence: LiDAR's role in modern security ecosystems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713973583.png)
Precision and intelligence: LiDAR's role in modern security ecosystems
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![2024 trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1704889476.png)
2024 trends in video surveillance
Download![Securing data centres: Varied technologies and exacting demands](https://www.sourcesecurity.com/img/white-papers/612/920x533_1703082955.png)
Securing data centres: Varied technologies and exacting demands
Download![How to create a successful physical security roadmap](https://www.sourcesecurity.com/img/white-papers/612/920x533_1702485769.png)
How to create a successful physical security roadmap
Download![Best practices for asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1699974817.png)
Best practices for asset management
Download![5 easy steps to an upgraded video surveillance system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1698922562.jpg)
5 easy steps to an upgraded video surveillance system
Download![The top 4 reasons to upgrade physical security with the Cloud](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696264536.jpg)
The top 4 reasons to upgrade physical security with the Cloud
Download![Why SAAS Security Platform is more popular in American SMEs](https://www.sourcesecurity.com/img/white-papers/612/920x533_1692699667.png)
Why SAAS Security Platform is more popular in American SMEs
Download![Combining access control and intercoms for better security](https://www.sourcesecurity.com/img/white-papers/612/woman-keycard-920x533.jpg)
Combining access control and intercoms for better security
Download![Camera cyber lockdown](https://www.sourcesecurity.com/img/white-papers/612/920x533_1689687645.jpg)
Camera cyber lockdown
Download![Video technology strategies for hospitals are moving beyond security](https://www.sourcesecurity.com/img/white-papers/612/healthcare-2.jpg)
Video technology strategies for hospitals are moving beyond security
Download![Beyond compliance: Cyber risk management after IMO](https://www.sourcesecurity.com/img/white-papers/612/920x533_1689332153.png)
Beyond compliance: Cyber risk management after IMO
Download![A step-by-step checklist for choosing an intercom system](https://www.sourcesecurity.com/img/white-papers/612/lg-wp-image-920x533.jpeg)
A step-by-step checklist for choosing an intercom system
Download![The wireless access control report 2023](https://www.sourcesecurity.com/img/white-papers/612/3427649-aa-wac-report-pr-images-920x533.jpg)
The wireless access control report 2023
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download