Physical Security Information Management (PSIM)
UK cyber training organisation, CAPSLOCK announces a new partnership with Nationwide to help the UK building society set up a dedicated cyber security training programme to expand its Technology Development Programme. Working closely with Nationwide’s careers team, CAPSLOCK is the first cyber skills training partner tasked with supporting Nationwide with the onboarding, training and role allocation of new joiners into the cyber security function. Cyber-first company culture As a majo...
The global security order is facing unprecedented challenges. Russia's war of aggression against Ukraine, growing geopolitical tensions, and the vulnerability of critical infrastructures are demanding an increased commitment to defence and security issues from Germany and other European countries. DSEI Germany will be held for the first time from 19 - 22 January 2027 at the Messegelände Hannover (Hannover Exhibition Grounds) to address this demand. DSEI Germany is organised by Deutsche Me...
The UK door entry and access control manufacturer Videx Security announces the appointment of Billy Paton as Strategic Sales Manager for the UK and Ireland. Billy returns to Videx with extensive experience and a proven track record in the access control and security industry, having previously contributed to the company’s success earlier in his career. Billy will focus on strengthening relationships with distribution partners, driving innovative sales strategies and supporting end-user le...
Gunnebo Safe Storage has launched SecureBattery, an innovative product line designed to meet the growing demands for safe battery storage and charging. Increasingly, batteries are essential for powering various devices and equipment across industries and yet present unique storage challenges. The potential risks - ranging from thermal runaway to releasing hazardous gases - pose significant threats to safety. Posing significant threats These dangers make it imperative for industry pioneers to...
Nanodems, a pioneer in Physical Security Information Management (PSIM) announced a strategic partnership between TKH Security, a global pioneer in security and parking guidance technologies. TKH Security TKH Security, based in Zoetermeer, the Netherlands, with over 25 years of experience, provides innovative solutions for security, asset & site, and parking guidance management. Operating in over 80 countries with 12 offices worldwide, TKH Security is committed to delivering high-quality,...
Paxton Access, a renowned global manufacturer of security technology solutions, announced this month that construction on their new US headquarters is complete. The company has intended to grow its US footprint by investing $10 million in the project in Greenville, SC. New US headquarters Adam Stroud, Paxton’s CEO, said, "Paxton’s new US headquarters has been built to a world-class standard. It reflects the scale of our ambition and belief in Greenville as a fantastic...
News
Absolute Security, the pioneer in enterprise resilience, has been recognised by renowned industry analyst organisation - Forrester among Notable Vendors in its recent report: The Zero Trust Edge Solutions Landscape, Q4 2024. This recent report helps organisations understand the main trends, challenges, and benefits driving ZTE adoption, along with providers that deliver on a range of use cases. Zero Trust edge (ZTE) solutions Authored by Forrester Principal Analyst - Andre Kindness, the report states, "You can use Zero Trust edge (ZTE) solutions to increase the productivity and security of your remote workforce; improve business reliability and enable digital initiatives; and optimise operations and match business speed." "System failures, shutdowns, and periods of lost productivity are all increasing due to the growing challenges of hybrid work, rising complexity, cyber threats, and subpar user experiences," said John Herrema, Chief Product Officer, of Absolute Security. Optimised user experience John Herrema adds, "We are honoured to be included in this report. For us, it validates our ability to help enterprises remain defended and resilient against ransomware and other threats, stay protected against risk, and ensure uninterrupted connectivity along with an optimised user experience." In addition to defining ZTE and highlighting the benefits it provides, the report also outlines "core" and "extended" ZTE use cases; mapping identified vendors to those they address. Absolute self-reported the extended use cases of "end-to-end control," "providing Zero Trust access to applications," and "detecting and preventing unauthorised access to data" as the top three use cases for which clients select them.
ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. “We’re honoured to present such a remarkable array of thought leaders at ISC West 2025,” said ISC Event Vice President - Mary Beth Shaughnessy, adding “From tackling the latest cyber threats to reimagining safety for iconic landmarks and redefining leadership, these speakers will inspire and equip attendees with actionable strategies and spark new approaches to the problems we face.” Comprehensive educational offering The Keynote Series is part of the broader SIA Education@ISC program, which is set to be the largest and most comprehensive educational offering ever with 120+ sessions and 220+ speakers. SIA Education@ISC brings together industry pioneers to provide professionals with expertise in business strategies, security technology and career development, and this year’s keynote speakers are an essential part of that. The Keynote Series is part of the broader SIA Education@ISC program “SIA is pleased to partner with ISC in presenting the largest SIA Education@ISC conference yet at ISC West 2025, featuring three impactful keynotes examining top growth areas in our industry – covering critical topics in cybersecurity, retail safety and advancing women in security,” said SIA CEO, Don Erickson. Premier education sessions Don Erickson adds, “This year’s attendees will benefit tremendously from the expert insights shared by keynote speakers Rachel Wilson, Will Bernhjelm and Kate Maxwell, and these keynotes are complemented by a robust conference program featuring expertise in top security technology, business management and career growth issues.” He continues, “With this impressive keynote lineup, 120+ premier education sessions and special courses like SIA’s Security Project Management seminar, Security Industry Cybersecurity Certification Review Course and SIA Open Supervised Device Protocol Boot Camp training, ISC West offers more robust learning opportunities this year than ever before.” Against sophisticated attacks Day 1 Keynote: The New Cyberthreat Landscape Wednesday, April 2 | 9:00 a.m. – 10:00 a.m. | Main Stage Rachel Wilson, Director of Cybersecurity, Morgan Stanley Wealth Management Cyber risks are more prominent than ever. Rachel Wilson, renowned cybersecurity expert, will shed light on the fast-changing challenges in the digital threat landscape. Drawing on her experience, Wilson will provide practical steps organisations can take to fortify their defences against sophisticated attacks. Day 2 Keynote: Securing the Nation’s Largest Mall: Challenges and Innovations in Retail Safety Thursday, April 3 | 9:00 a.m. – 10:00 a.m. | Main Stage Will Bernhjelm, Vice President of Security, Mall of America How is one of the nation’s most frequented destinations secured? Will Bernhjelm will explore the unique challenges Mall of America faces while showcasing the technologies and strategies they employ to maintain safety. Attendees will gain insights into the complexities of managing security at this scale, and its implications for the broader industry. Day 3 Keynote: The Woman in the Arena, presented by SIA Women in Security Forum Friday, April 4 | 10:00 a.m. – 11:00 a.m. | Main Stage Kate Maxwell, Chief Technology Officer, Worldwide Defense and Intelligence, Microsoft ISC West experience Kate Maxwell is set to deliver a powerful talk on leadership, resilience and the courage to lead authentically. She will explore overcoming challenges to remain steadfast in your beliefs and inspire others through authenticity and innovation. Her message will resonate with those looking to lead with integrity in times of change. The ISC West experience extends far beyond this noteworthy keynote lineup. With over 750 exhibitors, cutting-edge security solutions and products and a comprehensive education program, ISC West 2025 continues to be the premier event for professionals seeking to stay ahead of the curve in security innovation.
Iris ID Systems, Inc., a global pioneer in iris recognition technology, is excited to showcase its advanced biometric identification solutions at the 26th annual Intersec Dubai 2025. From January 14-16, visit Iris ID at Booth SA-A22 at the Dubai World Trade Centre to explore a suite of innovative solutions designed for diverse industries. Iris and face fusion solutions "Intersec Dubai provides the perfect stage for Iris ID to showcase its leadership in pioneering iris biometric and multimodal iris and face fusion solutions," said Mohammed Murad, Vice President (VP), Iris ID. He adds, "We look forward to engaging with industry pioneers and demonstrating how we can help address the evolving security and identity needs of businesses worldwide." Demands of modern security environments Iris ID’s biometric solutions are designed to meet the demands of modern security environments With a history of innovation spanning over two decades, Iris ID’s biometric solutions are designed to meet the demands of modern security environments. At Intersec Dubai, attendees will have the exclusive opportunity to explore their latest iris and face recognition reader, the IrisAccess® iA1000. This unique system for access control integrates iris and facial recognition technology, offering seamless, non-contact authentication with industry-renowned accuracy and speed. IrisAccess® iA1000 The IrisAccess® iA1000 offers an extensive mix of features, such as PoE, Wi-Fi, HID iCLASS, Prox, DesFire®, MIFARE®, and more that can accommodate businesses with varying security needs, from data centres to a small business. The iA1000 is also supported by the IrisAccess Management Suite (iA-MS) web-based application inclusive of REST API. Visit the booth Attendees are encouraged to visit the booth to explore these firsthand: Iris & Face Fusion Technology for flexible authentication modes. Presentation Attack Detection (PAD) for enhanced security against spoofing attempts. Advanced Security Protocols, including data encryption and secure boot capabilities. User-Centric Design with automatic height adjustments and intuitive interfaces for all users. IrisTime™ iT100 platform Iris ID’s workforce management solutions stand out with the revolutionary IrisTime™ iT100 platform. Designed to eliminate time fraud and simplify attendance tracking, the iT100 integrates seamlessly with HR management systems, offering scalable support for businesses of any size. Its open Android platform enables independent software vendors (ISVs) to create and deploy custom applications, delivering tailored workforce solutions to meet the unique needs of organisations. Visitors to Booth SA-A22 can connect with Iris ID experts to explore how biometric solutions enhance security, improve time and attendance, and streamline operations.
ZBeta, a pioneer in delivering comprehensive physical security consulting services, announced that Jaret Alexander has been appointed Vice President of Design Services. In this role, he leads ZBeta's technical and operational teams, driving strategic growth and operational excellence. He ensures teams are equipped to deliver high-quality, innovative solutions, while fostering leadership development, optimising processes, and working to position the organisation for long-term success. Prior roles held by Jaret Alexander "Jaret has made a significant impact on ZBeta's operational framework, and his success reflects his ability to lead with integrity, drive innovation, and deliver outstanding results," said Jesse Knutson, Chief Operating Officer, ZBeta, adding "His dedication to data-driven strategies and fostering collaboration sets a high standard and ensures we consistently exceed client expectations across the board." Jaret Alexander has more than 20 years of expertise in security technology and integration Jaret Alexander has more than 20 years of expertise in security technology and integration, complemented by a background in the construction and trade industries. Prior to joining ZBeta in 2023, he held increasingly senior-level operations, management, and engineering roles at SAGE Integration, McKenney’s Inc., and U.S. Security Associates. He holds a variety of licences and certifications, including the PSP certification from ASIS International and the CPSM certification from the Security Industry Association. ZBeta’s mission "Security is a discipline I am deeply passionate about, and I’m excited to support ZBeta’s mission of ensuring security is a cornerstone of business success," said Jaret Alexander. He adds, "I look forward to working with our expert team to further align strategies and improve efficiencies that make us better than yesterday. Together, we will deliver exceptional value to our clients, enhance ZBeta’s competitive advantage, and foster a culture focused on delivering excellence."
Matrix Comsec, a renowned OEM in Security and Telecom solutions, is thrilled to participate in the 3rd edition of the Saurashtra Security Surveillance Association’s (SSSA) Business Expo 2025. On January 10th and 11th, 2025, at Christ College, Munjka, Rajkot, this esteemed event will gather distributors, system integrators, consultants, and other key stakeholders of SSSA. Matrix will highlight its cutting-edge solutions to elevate safety, operational efficiency, and seamless communication across these critical sectors. IP video surveillance solutions Matrix’s IP Video Surveillance solutions are engineered to deliver seamless security management for industries, such as IT, Security, Manufacturing, and more. End-to-end Cyber-secured Video Surveillance Solutions: Matrix network cameras and video management software provide robust security while adhering to global compliance standards like OWASP, safeguarding sensitive data, ensuring regulatory compliance, and mitigating cyber threats to enhance trust and operational reliability. Smart Analytics: Advanced Video Analytics, including intrusion detection, tripwire detection, motion detection, and licence plate recognition, bolster proactive security measures. Remote and Centralised Monitoring: Matrix video surveillance solutions enable centralised management with real-time alerts via SMS, email, or WhatsApp, ensuring continuous monitoring and swift incident response. These solutions are designed to seamlessly integrate into IT, Security, and Manufacturing infrastructure, offering a scalable, future-ready security setup. Access control solutions Matrix Access Control Solutions address the unique challenges of managing access in IT, Security, Manufacturing, and other critical industries. Multi-Location Access Management: Simplified and efficient access control solutions tailored for system integrators and consultants managing diverse projects. Elevator Control Integration: Improve safety and user convenience by regulating floor-wise access in high-rise buildings. Visitor Management: Streamline visitor entry with pre-registration, approval workflows, and live tracking for enhanced security. By integrating advanced features with a seamless user experience, Matrix Access Control Systems deliver a robust and scalable solution for IT, Security, Manufacturing, and other diverse industries. Time-attendance solutions Matrix Time-Attendance solutions are designed to deliver efficient workforce management for real estate, hospitality, and industrial operations, ensuring streamlined processes. Job Processing and Costing: Automates workforce allocation and job tracking, boosting productivity and operational efficiency. Field Visit Management: Enables real-time reporting of field employees, enhancing accountability and workflow optimisation. Easy Attendance Management: Offers self-service options for attendance and leave management, ensuring convenience and flexibility for employees. These solutions are tailored to meet the needs of system integrators and consultants, simplifying workforce management for Industrial projects and operations. Telecom solutions Matrix’s Telecom Solutions are reliable and scalable and designed for enterprise-grade projects and diverse industrial needs. Unified Communication Platforms: Streamline collaboration among project teams operating across multiple locations for enhanced efficiency. VoIP Gateways: High-performance solutions that optimise communication workflows in residential and commercial projects. Scalable Solutions: Designed to adapt to expanding infrastructure, ensuring long-term reliability and value. These solutions simplify communication challenges, offering system integrators and consultants effective tools for various industries. Why visit Matrix at SSSA Business Expo 2025? At SSSA Business Expo 2025, Matrix will showcase live product demonstrations and interactive sessions, highlighting how its solutions integrate seamlessly into diverse industry needs. Visitors will gain valuable insights into Matrix’s expertise in delivering scalable, secure, and reliable systems designed for IT, Security, Manufacturing, and other critical sectors.
Matrix is thrilled to announce its participation in Intersec Dubai 2025, the premier global exhibition for security, emergency response, and safety. From January 14th to 16th, 2025, at Booth CA-29, Saeed Hall 1, Matrix will showcase its comprehensive portfolio of cutting-edge, NDAA-compliant security solutions designed to meet the diverse needs of modern enterprises. End-to-end cyber-secure solutions VMS has gained cybersecurity certification and aligns with the OWASP Top 10 Desktop Risks Matrix, one of the first Indian companies to deliver end-to-end cyber-secure video surveillance solutions, is committed to safeguarding critical assets and sensitive data. The video management software (VMS) has achieved cybersecurity certification and aligns with the OWASP Top 10 Desktop Security Risks. Visitors to Intersec Dubai 2025 can experience the exceptional capabilities of Matrix’s Project Series and Professional Series Bullet and Dome Cameras. These cameras are designed to meet OWASP ASVS 4.0 L2 standards, ensuring they adhere to the highest levels of cybersecurity. Additionally, they carry UL and CE certifications, showcasing their compliance with global safety and quality standards. New standard in video surveillance Matrix will showcase its All-Colour Network Cameras, providing superior-quality colour images even in low-light or no-light conditions, setting a new standard in video surveillance. With robust cybersecurity features, they deliver unmatched performance for enterprise-grade surveillance needs. The latest innovation, the Video Management Software Platform (VMSP), integrates NVR, server, and VMS into a unified platform for seamless surveillance management. In addition, Matrix is also introducing new features across its solutions, including BACnet Integration for seamless communication with Building Management Systems (BMS) and WhatsApp Integration for instant notifications, enhancing user experience and operational efficiency in both Video Surveillance and Access Control, Time-Attendance systems. Unified access control and time-attendance solutions Matrix’s GDPR-compliant Access Control and Time-Attendance solutions offer a unified approach Matrix’s GDPR-compliant Access Control and Time-Attendance solutions offer a unified approach to managing physical security and workforce operations. With features like WhatsApp Integration, users can receive real-time alerts and notifications directly on the app, enhancing convenience and responsiveness. Matrix COSEC ARGO FACE200T, an advanced facial recognition time-attendance terminal, delivers exceptional accuracy, fast identification speed, and high user capacity. Integration into enterprise systems With seamless connectivity through PoE and Ethernet, this device ensures efficient integration into enterprise systems. Additionally, businesses can benefit from solutions tailored for specific needs, such as Visitor Management for secure and efficient handling of guests, and Canteen Management to streamline cafeteria operations. These innovations are designed to simplify processes, enhance productivity, and create a safer, smarter working environment. Showcasing innovation in the UAE region Matrix recognises the unique security challenges faced by the Middle East as infrastructure projects Matrix recognises the unique security challenges faced by the Middle East as infrastructure projects and critical assets grow. Intersec Dubai provides an opportunity to engage with industry pioneers and explore tailored solutions that meet the region’s evolving demands. Matrix’s comprehensive security offerings — from robust video surveillance to intelligent access control — are designed to enhance the safety and efficiency of enterprises. These solutions address the specific needs of Middle Eastern organisations, safeguarding both their physical assets and sensitive data with the highest level of protection. Visit Matrix at booth CA-29, Saeed Hall 1 Discover how Matrix is revolutionising enterprise security with its future-ready solutions at Intersec Dubai 2025. Don’t miss the chance to explore the NDAA-compliant portfolio, cyber-secure innovations, and intelligent solutions designed to empower the organisation’s security and operational efficiency.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialised skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organised theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilised the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilise security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasising the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organisations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualisation, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organisations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organisations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialised knowledge in data visualisation and metrics analysis will ensure that this technology is utilised effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analysing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralised view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organisation. When security can proactively provide solutions and effectively address risks that arise in all corners of the organisation, it becomes the cornerstone of overall organisational safety. Modern security approaches This collaborative environment will empower the organisation to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organisation to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organisations in an ever-shifting environment.
Where access control is concerned, architects and design teams must find the right balance between aesthetics, functionality and security, says Daniel May of Consort Architectural Hardware. Following a period of innovation and integration, access control has developed into an ever-prominent facet of building design over the past decade. Where systems were once rudimentary, modern user requirements have led to several operational and technological advancements, resulting in a versatile selection of options that move beyond the limited capabilities of centralised deployment architecture. Growing market demand The push for smarter buildings has played its part too. In fact, according to a 2022 report, the number of smart buildings worldwide is projected to climb from 45 million to 115 million by 2026, with global market size estimated to hit $201.16 billion by 2031 - and this growth shows no signs of slowing down (omitting another global pandemic). The number of smart buildings worldwide is projected to climb from 45 million to 115 million by 2026 In order to meet growing market demand, manufacturers continue to modernise access control solutions, introducing the use of mobile credentials, cloud control and even bio-metric systems. As such, the specification process for access control hardware continues to become more nuanced, and for architects in particular, there’s an increasing challenge to ensure all design objectives are met. With this in mind, how can professionals strike a balance between seamless integration and design? Modern hotel environments For many decision makers, access control is viewed as an efficient and flexible route to securing their building. But more than that, it has become critical to the operative performance of our built environment, where from residential settings to commercial space, the adopted use of interconnected systems is further boosting accessibility, functionality and security. Take modern hotel environments for example. According to a 2022 report, 56% of hospitality consumers expressed locking and unlocking rooms using biometrics and facial recognition would enhance their experience. From Wi-Fi infrastructures to cloud services, technology has almost become synonymous with a hotel guest’s experience and is designed to improve their stay. Where digital access control systems are adopted, guests can interact with the premises independently, streamlining their access to essential entry points while safeguarding rooms against unauthorised visitors. Hotel operators benefit from enhanced building security and increased traceability Higher guest ratings Similarly, hotel operators benefit from enhanced building security and increased traceability, not to mention improved business efficiency and higher guest ratings. Ultimately, better-quality aesthetics enhance environments by making them more welcoming However, while security and accessibility are frequently top of the agenda when it comes to specifying hardware, from an architectural perspective, a solution’s aesthetic is just as valuable and plays a crucial role in the decision-making process. Often, door hardware can feel like the finishing touch to a design project, and so, careful consideration must go into consistent design choices that make a positive impact on the building’s aesthetic. Ultimately, better-quality aesthetics enhance environments by making them more welcoming. Access control systems Again, hospitality is a good case in point, where hotels must ensure their environment is visually pleasing as part of the service quality offered to their guests. However, a survey on urban design revealed 40% of architects find incorporating security measures into new developments without impacting aesthetic appeal a key design challenge. With this in mind, architects and design teams can be forgiven for past frustration towards the unattractive and cumbersome access control systems that were once in their infancy. In reality, today’s systems offer a much more seamless design, and with end users placing value on key elements such as accessibility, fire safety and reliability, it’s now possible to incorporate a solution that works for everyone. Hospitality is a good case in point, where hotels must ensure their environment is visually pleasing Combining value and visuals Upon recognising today’s access control systems promote functionality and seamless installation without compromising aesthetics, there’s a growing demand for comprehensive, single-package solutions across many contemporary projects. As a result, architects and designers are increasingly met with questions on door hardware and access control and must keep up to date with the latest solutions that are available. Architects and designers are increasingly met with questions on door hardware and access control As such, the initial design stage provides an opportune period for architectural teams to consider the needs of the end user in relation to access control systems. From a building’s security elements to its flow of movement, there are various objectives to reflect upon, and architects must look to develop their knowledge on access control solutions to ensure all end user objectives are met, and all while considering the final aesthetic. Access control solutions Naturally, projects can often benefit from greater collaboration and architectural professionals are urged to lean on the expertise of manufacturers where required. By working closely with trusted manufacturers early in the process, teams can incorporate the latest technology into buildings at the initial stages of design, as opposed to being an addition later in the process. Teams can incorporate the latest technology into buildings at the initial stages of design In many cases, manufacturers now offer bespoke access control solutions too, each designed to adapt around the end user’s needs while working with the architect on a design level. Through greater collaboration and the use of tailored solutions, architects are given the ability to choose consistent finishes and materials that fit the planned aesthetic, removing the need to try and match across various suppliers later down the line. Introducing tailored solutions Seemingly, access control will continue to play a larger role in building design as the industry progresses. And while the adoption of new technology may inherit an element of uncertainty for some, by introducing tailored solutions with seamless integration at early stages of the design process, architects can rest assured that their proposals address core challenges such as security and fire safety, while keeping their aesthetic vision intact.
Dr. Henrik Siegle has been the CTO at Bosch Building Technologies since November 2021. In this interview, he speaks about the megatrends of energy efficiency and sustainability, and about new developments in the building technology sector. Dr. Siegle, the building industry is currently facing major challenges in the form of climate change and energy shortages. How is Bosch Building Technologies dealing with these challenges? Dr. Henrik Siegle: Energy efficiency and sustainability have long been key priorities for us – and, indeed, for the entire Bosch Group. For Bosch Building Technologies, this also particularly applies to building automation. We have continually built up our strengths in this area in recent years, including through the takeover of other companies, especially in the United States and Germany – all with the aim of making buildings more energy efficient and more sustainable. We do this in a variety of ways, including automated HVAC control systems based on presence detectors, intelligent lighting and shade control. This approach enables us to optimise the operation of buildings, cut costs for customers and play our part in saving resources. Bosch itself became climate-neutral in 2020. How did you manage that? To achieve climate neutrality, we have implemented measures in four key areas Dr. Henrik Siegle: Bosch started addressing energy efficiency issues early on, which is why the Bosch Group, with more than 400 sites worldwide, is already climate-neutral. To achieve climate neutrality, we have implemented measures in four key areas – increasing energy efficiency, using more renewable energy from our own production, purchasing green energy and, finally, offsetting unavoidable CO2 emissions. We are working on further optimising our mix of measures, because the Bosch Group is totally committed to energy efficiency. We want to promote use of our energy-efficient products, but that’s not all – we are also keen to demonstrate our corporate commitment to sustainability. That’s why we analysed all our divisions, documented energy consumption and developed strategies for each individual division to cut our use of energy further. As the Bosch Building Technologies division, we supply solutions for the Group. One example is our cloud-based energy platform, which is used to analyse the individual energy flows in a factory on a very frequent basis and to predict future consumption. This enables us to continuously optimise our energy consumption at each individual site. The Bosch plant in Homburg is a good example. Since introducing the energy platform there, we have cut CO2 emissions by 6,700 metric tons in the first two years alone – that’s a reduction of 12 percent. At the Bosch Group, we also aim to reduce the CO2 emissions that we don’t generate ourselves directly, but which are produced in the supply chain, for example, or when our products are used. At Bosch, we are aiming to reduce these emissions by 15 percent by 2030. Can you give us some more examples of what Bosch Building Technologies is doing to help improve sustainability? Dr. Henrik Siegle: There are many initiatives and projects underway to increase sustainability at Bosch Building Technologies. One example is an environmentally friendly packaging concept that recently won an award within the Bosch Group. The concept, which involves reusing packaging material, not only significantly reduces the volume of waste, but also speeds up the repackaging processes. What’s more, the optimised size of the packaging also substantially reduces freight and storage volumes, which again cuts CO2 emissions. Our remote services are another fantastic example of the steps we are taking to increase sustainability. By offering our customers remote maintenance, we reduce the working hours involved, but that’s not all – this also prevents our service engineers having to travel to the customers’ premises, which again helps cut CO2 emissions. What is the significance of energy efficiency in the building sector overall? Dr. Henrik Siegle: Alongside industry, the building sector is responsible for approximately 40 percent of total CO2 emissions, so energy efficiency is clearly hugely important. The high proportion of emissions demonstrates the enormous potential for reducing energy consumption in the building sector and what big contribution we can make in this area with our sustainable solutions. Bosch turned the climate neutrality that we achieved as a Group into a business model Bosch turned the climate neutrality that we achieved as a Group into a business model and set up Bosch Climate Solutions GmbH, which is now part of Bosch Building Technologies. This means we are now in a position to offer to develop a climate neutrality strategy for other companies and supply them with the solutions they need through our system integrator. Companies have growing obligations to report on what they are doing to help the environment – and that’s why we’re working together with our partners to develop the building management services suite, or BMSS for short. This open, domain-spanning service offering combines and integrates the individual building systems, services and software solutions from various areas of application. This means the reliable facts about sustainability that are needed for ESG reporting can be generated – in other words, facts that constitute evidence of environmentally friendly operations. When it comes to the demand for energy efficiency solutions, is there such a thing as a typical customer? Dr. Henrik Siegle: We have a huge range of customers – from schools and hospitals to drugstore chains and industrial sites. Bosch Building Technologies offers a smartphone-based solution to provide contactless access to buildings Alongside sustainability, the connection of individual systems in safety and security technology has been a key topic for a long time now. How is Bosch Building Technologies positioning itself here as a full-service provider? Dr. Henrik Siegle: When it comes to connectivity, Bosch Building Technologies benefits hugely from cross-divisional collaboration within the Bosch Group. Overall, connectivity and the Internet of Things (IoT) are topics that we actively addressed at Bosch at a very early stage. As a result, we now have many years of experience of developing relevant technologies and applying these solutions professionally. There are a few solutions, in particular, that really stand out, such as Aviotec, our VdS-approved video-based fire detection system. The system’s security camera performs intelligent video analysis, which means we can detect a fire at a much earlier stage compared to conventional fire detection technology. What’s more, the camera’s built-in intelligence means it can be used for other purposes What’s more, the camera’s built-in intelligence means it can be used for other purposes, too, such as anti-intruder and anti-theft protection. We can also use it to monitor compliance with social distancing rules, for example. This is an innovative example of the connection of domains. However, it also goes without saying that connectivity plays a major role in our business within systems, too. In this context, I would like to mention our connected solutions that make it possible for technical building equipment processes to run as smoothly and efficiently as possible. These solutions include condition monitoring and predictive maintenance, for instance. One example is fire detection systems that independently supply information about their own operating condition and the necessary maintenance intervals. Another example comes from our Access & Intrusion business unit: We now also offer contactless access to buildings via a smartphone-based solution, i.e. via mobile credentials. In your view, what are the current and future market trends in security and building technology? Dr. Henrik Siegle: Well, regardless of market trends, it’s really important to us that we always put the customer at the centre of everything we do. What we want are solutions that meet customers’ needs – both now and in the future. Thanks to our user experience, or UX, method, we have an excellent understanding of what a customer actually wants and needs. That’s why we involve customers in the testing of our innovations as early as possible – it helps us find out whether and how the future product works in practice. We’re therefore always particularly close to our customers. We don’t just develop our products and solutions on this basis, but our services, too. When it comes to video security and intelligent building control in particular, artificial intelligence plays a key role Innovations in building technology are very wide ranging and, in my view, they all revolve around the megatrends of energy efficiency, sustainability, security and artificial intelligence. When it comes to video security and intelligent building control in particular, artificial intelligence plays a key role. This has huge potential – and we want to realise this potential more and more at Bosch. The video-based fire detection system that I’ve already mentioned is an excellent example. The thing that makes us stand out on the market is our business model, which is based on two key pillars. One of these is our system integrator business. This means we offer everything from a single source, right from the initial inquiry, consultancy and planning through to implementation and operation. The second pillar is our product business. The direct customer interface in the system integrator means we get direct feedback in the system integrator itself, both from customers themselves and from our colleagues. We incorporate this feedback into our product development processes. How is your system integrator business doing? Dr. Henrik Siegle: Very well. We’ve experienced good growth in this area in both Europe and North America. What’s more, just recently, we’ve also significantly expanded our system integrator business again through acquisitions in Germany, the United Kingdom and the Netherlands. One of our priorities is ensuring that our technology is always state of the art. Developing our expertise in this area also means that regular training for our associates is important, since technical developments are becoming more and more dynamic. Given this background, are you also feeling the impact of the skills shortage? Our business model can only work if we have skilled, motivated associates Dr. Henrik Siegle: It may sound obvious, but needless to say, our business model can only work if we have skilled, motivated associates. The question of how we attract new associates is not the only important one – it’s also vital to consider what we do for the ones we already employ. For example, we have our own academy spread across three sites in Germany, where we provide our associates with regular training, and we also put on a wide range of professional development seminars. To attract new talent, we offer dual study programmes along with programs for trainees, Master’s students and PhD students. We also often attend various career fairs. What’s more, we’re working more closely together with universities and institutes. We have quite a lot to offer in this regard. Our purpose, ‘Building solutions for a better life,’ doesn’t just motivate me personally – it also resonates very well outside Bosch. Bosch gives its associates the opportunity to work directly on important topics of both the present and the future with the aim of making the world a safer, more sustainable place – using state-of-the-art technologies such as artificial intelligence! Nevertheless, the skills shortage naturally still poses a major challenge.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
Located in Istanbul, Turkey, the Nish Adalar Konut Project is a large residential community covering 61 blocks with over 2,000 apartments. DNAKE IP video intercom system has been implemented throughout the community to provide an integrated security solution, offering residents an easy and remote access control living experience. The solution Solution highlights: Great scalability in large residential apartments Real-time video and audio communication Remote and easy mobile access Enhance the safety and functionality of elevator systems Installed products: S215 4.3" SIP Video Door Station C112 One-button SIP Video Door Station E216 7" Linux-based Indoor Monitor 902C-A Master Station Solution benefits Each entry point features DNAKE S215 4.3” SIP video door stations for secure access DNAKE smart intercom system offers easy and flexible access through various methods, including PIN code, IC/ID card, Bluetooth, QR code, temporary key, and more, providing residents with great convenience and peace of mind. Each entry point features DNAKE S215 4.3” SIP video door stations for secure access. Residents can open doors for visitors not only through the E216 Linux-based indoor monitor, typically installed in every apartment, but also via the Smart Pro mobile application, accessible anywhere and anytime. Overall safety and security C112 has been installed in every elevator to enhance the safety and functionality of elevator systems, making it a valuable addition to any building. In case of an emergency, residents can quickly communicate with building management or emergency services. Moreover, with C112, security guards can monitor elevator usage and respond to any incidents or malfunctions promptly. 902C-A master station is typically installed in every guard room for real-time communication. Guards can receive immediate updates on security events or emergencies, engage in two-way conversations with residents or visitors, and grant them access if necessary. It can connect multiple zones, allowing for better monitoring and response across the premises, thereby enhancing overall safety and security.
Victoria University City Tower is the largest vertical campus in Australia, consolidating all of the University’s operations and campuses in the CBD into one location. The 32-level building brings together select universities and TAFE courses located in the CBD. Courses include business, education and English, but also trades such as health and beauty. EQUANS were engaged as the audio-visual integrator for this construction project, supplying and installing multiple audio-visual systems throughout the campus. Video conference equipment EQUANS worked closely with Victoria University to deliver the audio-visual systems throughout the educational high rise. Meeting rooms, open area presentations, council rooms, teaching and learning rooms, simulation labs, spa, salon and hairdressing rooms and staff areas deployed Crestron video conference equipment as specified by the client. Utilising Crestron allowed EQUANS to deliver Fusion server integration, a smart system to communicate all communication and data requests and their status to the building manager in real time. This enables live updates on system performance, allowing the client and EQUANS to easily troubleshoot, remotely access the information and monitor equipment energy usage and adjust accordingly. Pre-commissioning field equipment To increase the efficiency of the build onsite, much of the work was done offsite In addition, the rollout of the unified Crestron video conferencing systems throughout the buildings provides a premium user experience for educators and students, ensuring they have a familiar user experience throughout the whole building. EQUANS forecasted COVID-19-related delays, mainly due to site restrictions and industry-wide equipment shortages. To increase the efficiency of the build onsite, much of the work was done offsite. This included scheduling equipment prior to build to ensure availability, pre-commissioning field equipment, and offsite system recommissioning including rack builds. Unified audio-visual systems Not only enabled these measures the project to be on time, but also within budget. Zero defects were found during the witness test after installation onsite, allowing EQUANS to confidently hand over the systems to Victoria University. Victoria University now boosts the latest audio visual systems, integrated into their state-of-the art educational facility. EQUANS is proud to be Victoria University’s long-standing audio-visual partner, delivering diverse audio-visual systems throughout the facility, catering to the unique requirements of each room type. Victoria University City Tower is now ready to welcome students and educators to learn and collaborate via unified audio-visual systems.
A housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. There is one entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution Highlights: Easy Intercom Retrofitting with Existing Cables Good Scalability for Easy Addition of New Units or Expansion Remote Access with App-based Features Solution Benefits: Future-proofing: With DNAKE 2-wire IP intercom solution, residences can now enjoy high-quality audio and video communication, multiple access options, including remote access, and the integration with surveillance systems, providing a more versatile and secured living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
There is an older housing estate located in Nagodziców 6-18, Poland with 3 entrance gates and 105 apartments. The investor wants to retrofit the property to improve the community safety and elevate residents’ smart living experience. One of the main challenges in this retrofit is managing the wiring. How can the project minimise disruption to the building’s occupants and reduce the impact on residents’ daily activities? Additionally, how can the costs be kept down to make the retrofit more economically attractive? The Solution Solution Highlights: No Wiring No Indoor Units Fast, Cost-Saving Retrofits Future-Proof Intercom Solution Solution Benefits: No Indoor Units, Cost-effectiveness: DNAKE cloud-based intercom services eliminate the need for expensive hardware infrastructure and maintenance costs associated with traditional intercom systems. There is no need to invest in indoor units or wiring installations. Instead, residents can pay for a subscription-based service, which is often more affordable and predictable. No Wiring, Ease of Deployment: Setting up DNAKE cloud-based intercom service is relatively easier and quicker, when compared to traditional systems. There’s no need for extensive wiring or complicated installations. Residents can connect to the intercom service using their smartphones, making it more convenient and accessible. Easy and Multiple Access Ways: In addition to facial recognition, PIN code, and IC/ID card, there are also multiple app-based access methods available, including calling & app unlocking, QR code, temp key and Bluetooth. Residence can manage access from anywhere at any time.
Soyak Olympiakent in Turkey comprises thousands of apartments that prioritise 'Quality in Life.' It offers a quality and safe living experience, featuring a natural environment, sports facilities, swimming pools, ample parking areas, and a 24-hour private security system supported by an IP video intercom system. The Solution Solution Highlights: Great scalability in large residential apartments Remote and easy mobile access Real-time video and audio communication Emergency alerts Solution Benefits: DNAKE smart intercoms have been installed in 4 Blocks, covering a total of 1,948 apartments. Each entry point features DNAKE S215 4.3” SIP video door stations for secure access. Residents can open doors for visitors not only through the 280M-S8 indoor monitor, typically installed in every apartment, but also via the Smart Pro mobile application, accessible anywhere and anytime. The master station 902C-A in the guard room facilitates real-time communication, enabling guards to receive updates about security events or emergencies immediately. It can connect multiple zones, allowing for better monitoring and response across the premises, thereby enhancing overall safety and security.
The building, constructed in 2005, consists of three 12-storey towers with a total of 309 residential units. Residents have been experiencing issues with noise and unclear sound, which hinder effective communication and lead to frustration. Additionally, there is an increased need for remote unlocking capabilities. The existing 2-wire system, which supports only basic intercom functions, fails to meet the current needs of the residents. The Solution Solution highlights Easy Intercom Retrofitting with Existing Cables Tenant’s Own Choice on Answering Units Solution benefits For installer: DNAKE 2-wire IP intercom solution leverages existing wiring, which allows for a quicker and more efficient installation process. This solution helps avoid the costs associated with new cabling and extensive rewiring, keeping project costs down and making the retrofit more economically attractive. For property manager: The Central Management System (CMS) is an on-premises software solution for managing video intercom systems via the LAN, which has greatly improved the efficiency of property managers. Additionally, with the 902C-A master station, property managers can receive security alarms to take immediate action, and remotely unlock doors for visitors. For resident: Residents can choose their preferred answering unit based on their needs. Options include Linux-based or Android-based indoor monitors, audio-only indoor monitors, or even app-based services without a physical indoor monitor. With DNAKE's cloud service, residents can unlock doors from anywhere, at any time.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?
White papers
![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Physical access control](https://www.sourcesecurity.com/img/white-papers/612/920x533_1729871143.png)
Physical access control
Download![The key to unlocking K12 school safety grants](https://www.sourcesecurity.com/img/white-papers/612/920x533_1729696792.png)
The key to unlocking K12 school safety grants
Download![Security practices for hotels](https://www.sourcesecurity.com/img/white-papers/612/920x533_1723114696.png)
Security practices for hotels
Download![Precision and intelligence: LiDAR's role in modern security ecosystems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713973583.png)
Precision and intelligence: LiDAR's role in modern security ecosystems
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![2024 trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1704889476.png)
2024 trends in video surveillance
Download![Securing data centres: Varied technologies and exacting demands](https://www.sourcesecurity.com/img/white-papers/612/920x533_1703082955.png)
Securing data centres: Varied technologies and exacting demands
Download![How to create a successful physical security roadmap](https://www.sourcesecurity.com/img/white-papers/612/920x533_1702485769.png)
How to create a successful physical security roadmap
Download![Best practices for asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1699974817.png)
Best practices for asset management
Download![5 easy steps to an upgraded video surveillance system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1698922562.jpg)
5 easy steps to an upgraded video surveillance system
Download![The top 4 reasons to upgrade physical security with the Cloud](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696264536.jpg)
The top 4 reasons to upgrade physical security with the Cloud
Download![Why SAAS Security Platform is more popular in American SMEs](https://www.sourcesecurity.com/img/white-papers/612/920x533_1692699667.png)
Why SAAS Security Platform is more popular in American SMEs
Download![Combining access control and intercoms for better security](https://www.sourcesecurity.com/img/white-papers/612/woman-keycard-920x533.jpg)
Combining access control and intercoms for better security
Download![Camera cyber lockdown](https://www.sourcesecurity.com/img/white-papers/612/920x533_1689687645.jpg)
Camera cyber lockdown
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download