Physical security
Rhombus, a pioneer in open, cloud-managed physical security, announced the opening of its new office in London, United Kingdom, due to growing global demand for secure, scalable, and adaptable security solutions. This expansion will enable Rhombus to better serve manufacturing, education, retail, and healthcare industries across North America and Europe. Latest Techspace in the UK The Rhombus UK office showcases its products and services in the redeveloped Techspace "With security concerns s...
Gunnebo Group will present its commitment to innovation in advanced security solutions and sustainability across its flagship brands at Intersec 2025, held in Dubai, UAE, from January 14 -16, 2025. As a global pioneer in security solutions, Gunnebo will be on stand S2, A22, presenting a range of advanced, innovative technologies in safe storage, entrance control, and high-security electronic locks, with a focus on sustainability in design, materials, and energy efficiency. Safe storage solutio...
2025 marks the half-way point of the decade and over ten years since they introduced the flagship Codelocks NetCode® Technology. The innovative, award-winning technology has driven a lot of the growth and change at Codelocks since its introduction. This got them to thinking; what will be the direction of travel for access control over the next 10 years? NetCode® didn’t emerge out of nowhere 10 years ago. It was intentionally developed to meet the demand for greater control and th...
Nanodems, a global provider of Physical Security Information Management (PSIM) solutions, is pleased to share the success of its participation in ISC East 2024, held at the Javits Centre in New York City from November 19–21. As one of the Northeast’s pioneer security and public safety trade shows, ISC East provided an excellent platform for Nanodems to present its AI-powered PSIM software platform, NDIS. Advanced PSIM software The event showcased the company’s innovati...
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
Siemens and Genea recently announced a second collaborative effort to provide security professionals and facility managers with improved security using the cloud. The security solution allows teams to leverage their existing technology, like security cameras, door readers, controllers and more, and manage it all from a modern dashboard, anytime, anywhere. Siemens’ security customers Through Genea’s customisable, cloud-based, open API platform, Siemens’ security customers ca...
News
Verkada, a pioneer in cloud-based physical security solutions, announced that CDW named the company a 2024 CDW Partner of the Year. CDW recognised Verkada and its other Partner of the Year honourees for representing the power of modern, customer-first partnerships and providing exemplary products, programs, solutions, and services to support shared customers. Support and collaboration "Verkada is honoured to be recognised by CDW for the exemplary support and collaboration we provide to our shared customers," said Ryan Bettencourt, Senior Vice President of Global Channel Sales. "Partners like CDW play a critical role in advancing our mission and helping us make the communities we live and work in safer, and we are grateful to CDW for partnering with us to make this a reality." Evolving IT landscape "We're grateful for the collaborative, customer-first mindset exhibited by all of our 2024 Partner of the Year Award winners," said Mark Chong, senior vice president of product and partner management for CDW. "It's truly rewarding to celebrate exceptional partners like Verkada for their significant contributions over the past year. Working together to deliver outstanding outcomes, we remain ideally positioned to guide our mutual customers through the complexities of today's rapidly evolving IT landscape." Verkada Certified Engineer program Verkada has made significant investments in its Channel sales organisation, launching a reimagined Partner Program, growing its team 3x in the last 18 months, and introducing expanded training and resources for Partners. This year, Verkada has certified more than 2,500 individuals representing 550 unique Partner companies globally through its Verkada Certified Engineer (VCE) program.
High-quality skin care products, developed using the latest technologies and manufactured in a sustainable way: the international Babor Beauty Group is represented in more than 70 countries with its sought-after beauty brands. Research and development, as well as production, take place at the company's headquarters in Aachen, Germany, while filling and logistics are located just a few miles away in Eschweiler. In 2023, the family enterprise inaugurated a cutting-edge production facility here, known as the “Babor Beauty Cluster”. Use of digital processes The fully networked complete key from Bosch Building Technologies for safety, security Around half a million jars, tubes, and ampoules are filled there every day, and logistics and shipping are also handled on-site. A special feature of the 60,000 sq.m plant is its extensive use of digital processes for working and operating as efficiently as possible. The fully networked complete solution from Bosch Building Technologies for safety, security, and building management makes a valuable contribution to this. Digitalization ensures greater safety and security The smart solution from Bosch Building Technologies was precisely tailored to meet the Babor Beauty Group’s requirements. It integrates, among other things, fire protection, intrusion alarm and access control systems, as well as a video security solution for safeguarding the perimeter and premises. The AI-based video security solution analyzes every captured image while using predefined rules and only triggers an alarm if at least one of them is met. This avoids false alarms, thus enabling even more effective security management. Digital visitor management system Bosch Building Technologies includes a digital visitor management system that saves time The solution from Bosch Building Technologies also includes a digital visitor management system that saves time with a self-registration function. It ensures fast, frictionless reception of guests and tradespeople and includes audit-proof archiving, which significantly eases the workload of Babor’s operating team. User-friendly access control Another highlight is the smart truck and parking space management with licence plate detection for user-friendly access control. Properly secured loads are also automatically documented. The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording to providing comprehensive documentation of the process. Management system for control across sites The Babor Beauty Group’s technical operations and facility management team is responsible The Babor Beauty Group’s technical operations and facility management team is responsible for both the company’s headquarters in Aachen and the production and logistics cluster in Eschweiler. The safety and security systems of both sites have therefore been integrated into the “Building Integration System 360” from Bosch Building Technologies. Integration of future site extensions This centralised management platform provides control of all building systems, enabling Babor Beauty Group's operations and management team to respond efficiently to security-related events. The solution is also flexibly scalable to facilitate the integration of future site extensions. Bosch Building Technologies will operate this complete solution for the next ten years within the scope of a build-operate-transfer model.
Alcatraz AI, a pioneer in access control and AI-powered security solutions, announces the launch of its “Switch to Alcatraz AI” promotion. From November 18, 2024, through February 15, 2025, this initiative offers an exclusive discount for new customers seeking to replace outdated biometric readers with Alcatraz AI’s advanced Rock or Rock X solutions–modern, frictionless facial authentication systems that enhance security without compromising user privacy. Physical and cyber security In landscape, increased security and privacy standards are in place to address evolving concerns and challenges for both physical and cyber security. As new industry regulations are implemented to protect against potential threats, companies using legacy systems often struggle to stay compliant. Alcatraz AI’s solutions Alcatraz AI’s Rock and Rock X keys handle these crises with facial authentication Alcatraz AI’s Rock and Rock X solutions address these concerns with touchless facial authentication, real-time tailgating detection, and robust consent management, all fully compliant with BIPA, GDPR, CCPA, and more. Unlike legacy biometric readers, Alcatraz AI’s solutions maintain data integrity by creating a secure digital profile without exposing personally identifiable information (PII). User images, names, and job titles are never displayed or stored, ensuring compliance and peace of mind. Modern security solutions During the “Switch to Alcatraz AI” promotion, eligible new customers can receive a trade-in credit on each Rock or Rock X device when replacing ten or more outdated biometric access points, including fingerprint, palm, or iris readers. Terms and conditions apply. “Yesterday’s technology is no match for today’s challenges,” said Tina D’Agostin, CEO of Alcatraz AI. “With the Rock and Rock X solutions, companies can make the shift from lagging legacy systems to pioneering-edge, privacy-first technology that seamlessly addresses today’s evolving security issues. Now is the perfect time to step confidently into 2025 with modern security solutions that protect both people and privacy.” Alcatraz AI’s Rock solutions Alcatraz AI’s Rock and Rock X keys empower organisations across multiple industries Alcatraz AI’s Rock and Rock X solutions empower organisations across multiple industries, including data centres, critical infrastructure, healthcare facilities, higher education campuses, entertainment venues, and more, to secure their spaces with cutting-edge technology, ensuring operational efficiency and alignment with evolving privacy standards. With an increase in companies enacting return-to-office (RTO) mandates ahead of 2025, it’s more important than ever for enterprises to prioritise workplace safety and ensure their security is well-equipped to handle the influx of additional people back in the office. Data safety This promotion marks a significant opportunity for enterprises to future-ready their access control and compliance needs and put their people's and data safety at the forefront of their business. Ring in the New Year with Alcatraz AI–make the switch and lead the way in access control technology.
HiveWatch, a physical security software company reimagining how organisations keep their people and assets safe, announced a breakthrough in enterprise security operations using Anthropic’s Claude AI technology to transform traditional security monitoring from reactive alert processing into strategic intelligence operations. The new HiveWatch® AI Operator uses Claude’s advanced language understanding and reasoning capabilities to intelligently filter and contextualise security alerts, dramatically reducing false alarms while spotting complex threats. AI Operator AI Operator is customisable based on existing SOPs and is able to acknowledge, analyse, escalate The AI Operator is customisable based on existing Standard Operating Procedures (SOPs) and is able to acknowledge, analyse, escalate, and respond to alarms in real-time. It does this while maintaining meticulous incident records, reducing the opportunity for human error. "Physical security teams protect some of our most valuable assets, yet they're drowning in data and false alarms," said Ryan Schonfeld, Co-Founder & CEO, HiveWatch. Physical security teams Schonfeld added: "By collaborating with Anthropic to deliver the AI Operator to our initial Fortune 500 customer base, we're not just adding AI to existing systems – we're fundamentally reimagining how companies protect their people and assets in an increasingly complex threat landscape." Physical security teams manage over $300 billion in annual security spending, yet face a critical challenge: operators spend most of their time processing alerts, many of which are false alarms, leaving minimal capacity for strategic security work. Impactful and preventative initiatives The HiveWatch AI Operator is a force multiplier that reduces operator turnover, missed incidents The HiveWatch AI Operator is a force multiplier that reduces operator turnover, missed incidents, and cost, ultimately allowing the team to focus on more impactful and preventative initiatives to reduce risk for the business and keep assets and people safe. "Claude's ability to understand complex security protocols, reason about multiple data streams, and explain its decisions makes it uniquely suited for security operations," said Jamie Neuwirth, Head of Startups at Anthropic. HiveWatch's platform Neuwirth added: "Through HiveWatch's platform, Claude works alongside security teams, augmenting their expertise by rapidly processing alerts and providing contextual insights that help professionals make better-informed decisions." "When security teams and AI work together this way, professionals can focus their expertise on strategic threat analysis and critical response planning, while maintaining full visibility into the AI's decision-making process." Early adopters among fortune 500 enterprises The union marks a pivotal moment in updating an industry that has stayed largely unchanged The collaboration marks a pivotal moment in modernising an industry that has remained largely unchanged as it releases to an initial group of Fortune 500 enterprises ready to revolutionise physical security through advanced AI integration. Initial early customers include a $300 billion public technology company, a $200 billion life sciences company, a $150 billion marketplace, a $30 billion Fortune 500 retailer, a $30 billion public gaming company, and a healthcare system – all of whom have requested to remain anonymous because of security implications. Strategic security analysts "HiveWatch stands apart with their enterprise-scale security platform," said the confidential $300B public technology company’s Chief Security Officer. "We anticipate their AI Operator will transform how we approach security operations, enabling our team of operators to evolve into strategic security analysts while strengthening our entire global security program." The HiveWatch AI Operator will be available to enterprise customers starting in January 2025. Early access programs have already begun with select Fortune 500 companies across the financial services, technology, healthcare, retail, and life sciences sectors.
barox Kommunikation AG, the global manufacturer of professional standard switches, PoE media converters and IP extenders, is proud to announce its inclusion in the new Harper Chalice demonstration HUB - opened at Harper Chalice headquarters in Coventry. Part of the Vitaprotech Group, Harper Chalice are experts in perimeter security solutions, manufacturing, supplying and installing specialist electronic perimeter security systems. They offer a complete range of modular and scalable solutions, with systems used to protect varied sites from the highest level of security threat, through to commercial, single-site applications. Integrated product solutions Visitors to the new protest HUB will see the barox range defined with a full product showcase The new Harper Chalice demonstration HUB features displays of integrated product solutions across multiple vendors, all targeted towards the high security/CNI (Critical National Infrastructure) space and showcasing NPSA-approved PIDS/hatch detection and Access Control systems, as well CAPSS-approved PSIM/VMS solutions. Visitors to the new demonstration HUB will see the barox range represented with a full product showcase. Offering a ‘hands-on’, real-time user experience, multiple barox industrial switch options can be configured to illustrate seamless third-party integration to cameras, perimeter detection, access control and multiple different PSIM and VMS platforms. Long-term technical relationship Product vendors include Advancis, Genesys by ISM, Genetec, Milestone, Prysm, Synectics, Velocity Vision, Veracity, TDSI, Hanwha, 360 Vision Technology and many more. barox’s inclusion in the new HUB stems from a long-term technical relationship between the two businesses, with both companies part of the successful CNI Security Group. CNI security applications CNI stakeholders can visit a single location to experience the many different integrated technologies The ethos of the CNI Security Group, to promote synergy between partner businesses with tailored product solutions for deployment in the high security/CNI space, is realised at the HUB, with real-time physical demonstrations available for evaluation by integrator and end-user customers. At the HUB, CNI stakeholders can visit a single location to experience the many different integrated technologies suitable for CNI security applications. Users can experience barox 10G switch options, alongside multiple switch and media converter alternatives, including those suitable for sub-station installation. Access control systems Partner manufacturers’ cameras, perimeter detection solutions and access control systems complete the showcase - all displayed and controlled through multiple different control platforms, to give a genuine hands-on experience of an end-to-end solution designed specifically for High Security, CNI, and Rail applications. The centre is also available to be used as a comprehensively equipped conference facility for customer meetings. “We’re thrilled to be offering a world-class demonstration facility to benefit our installer, solution integrator, end-user and specifiers customers,” says Adam O’Reilly, Managing Director of Harper Chalice." HUB’s extensive solutions The centre is also available to be used as a fully equipped conference facility for client meetings O’Reilly added: “The Harper Chalice demonstration HUB has been designed to demonstrate integrated solutions across multiple vendors, whilst also showcasing NPSA-approved PIDS/detection and hatch systems, with the idea that all CNI stakeholders can visit just a single location to see the many different integrated technologies available for CNI security applications." “As part of the HUB’s extensive solutions offering, our long-term technical partner, barox, will be showing multiple industrial switch options and their unparalleled depth of third-party control system integrations.” CNI security innovation Sara Fisher, barox International Market Development Specialist commented: “barox is delighted to have been selected to be part of the Harper Chalice HUB initiative, a ‘centre of excellence’ for CNI security innovation. It’s fabulous to have the opportunity to showcase our technologies alongside other ‘best in class’ partner manufacturers in the security industry." "Feedback from the market has been very positive and we look forward to welcoming our clients and contacts to the HUB soon, to see the power of barox products in action.” PoE video switches barox products are currently employed within many high security, high profile and Critical National Infrastructure sites both in the UK and overseas. For more information on the barox range of managed and unmanaged industrial media converters and professional PoE video switches designed specifically for CNI security applications.
According to the 2024 Access Control report by Omdia, Genetec., the pioneer in enterprise physical security software, has consistently gained market share over the last six years, solidifying its position as a worldwide market pioneer and building upon its #2 global position for access control software. In the Americas market, access control software has evolved beyond the physical security department to become an essential component of business operations. 2024 Access Control report According to the Omdia report, this broader adoption has increased demand for unified security platforms that allow organisations to manage systems - such as access control, video surveillance, and intrusion detection - through a single interface. By anticipating market needs for access control innovation, Genetec continues to expand its market share, growing at a 28% CAGR over the past six years. Access control innovation “While many legacy access control vendors rely on acquisitions to expand their market share, Genetec has achieved rapid organic growth through innovation and investment in new technologies,” said Christian Morin, Vice President of Product Engineering, Genetec Inc. Christian Morin adds, “Over the last year, we introduced Security Center SaaS, HID Mercury Security MP controllers, Axis Powered by Genetec, and an I/O module in partnership with STid as part of our European high assurance access control system offering. This demonstrates our commitment to expanding our access control portfolio through innovation and partnerships, paving the way for future growth.” Providing adaptable solutions Omdia also reports that end users in the region prefer open systems that offer flexibility and customisation In a highly fragmented EMEA market, Genetec remains among the top 10 access control software providers by focusing on open architecture systems that allow users to integrate components from different vendors. Omdia also reports that end users in the region prefer open systems that offer flexibility and customisation. This further supports the company’s strategy to provide adaptable solutions tailored to the region, as evidenced by its partnership with STid. Strong integration capabilities In the Asia-Pacific region (excluding China), Genetec continues to rapidly expand its market share, reaching #6 position (up from #10 in 2021). As enterprise users and multinational corporations modernise their access control infrastructure, they seek feature-rich, cyber-secure systems with strong integration capabilities. An open-architecture solution, such as the Genetec access control solution, allows organisations to secure assets and people, enhance business operations, and easily upgrade technology at their own pace. Full cloud deployments Genetec has retained its #1 global position in the VMS market while also ranking #1 in the combined VMS The Omdia report also indicates that the access control market is increasingly adopting hybrid cloud deployments. Genetec is at the forefront of this change. Security Center SaaS is a physical security solution that brings the power of Genetec access control and video management to the cloud. Security Center SaaS supports hybrid or full cloud deployments, allowing organisations to move components and sites to the cloud based on their needs and requirements at their own pace. Genetec solutions Because Genetec solutions are based on an open platform architecture, users choose the access control devices that best suit their needs while also preserving their existing investments. In addition to its success in access control, Genetec has retained its #1 global position in the VMS market, while also ranking #1 in the combined Video Management Software (VMS) and Video Surveillance as a Service (VSaaS) market, according to Omdia’s recently released 2024 Video Surveillance & Analytics Database Report.
Expert commentary
The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically adjust access protocols based on real-time threat assessments to healthcare facilities using AI-enhanced video analytics for patient safety, these technologies are reshaping the industry landscape. But with this transformation comes a new era of regulatory oversight that security professionals must navigate carefully. Convergence of AI The convergence of powerful AI capabilities with traditional security systems has created unprecedented opportunities for enhanced protections while simultaneously raising important questions about privacy, transparency, and responsible deployment. As these technologies become more sophisticated, security professionals face the dual challenge of maximising their potential while ensuring compliance with evolving regulatory frameworks. The current state of AI in security systems By combining multiple data streams, AI creates a more comprehensive and intelligent security ecosystem Today's AI-driven security solutions extend far beyond traditional security capabilities. Modern systems can understand complex human behaviours, analyse crowd patterns in transportation hubs, detect early signs of trouble in retail environments, and even predict potential security breaches before they occur. By combining multiple data streams — video feeds, access control systems, audio detection, and various sensors — AI creates a more comprehensive and intelligent security ecosystem. Industrial applications The impact is particularly evident in integrated security operations. In healthcare settings, AI systems can simultaneously monitor patient safety, manage access control, and detect unauthorised entries, all while maintaining strict privacy protocols. In education environments, these technologies help safeguard campuses by identifying unusual behaviour patterns while respecting student privacy rights. Retail operations benefit from AI's ability to not only detect potential theft but also analyse customer flow patterns and identify operational inefficiencies. The technology's capabilities continue to expand through: Advanced anomaly detection that establishes normal activity patterns and flags deviations. Predictive analytics that forecast potential security risks before incidents occur. Natural language interfaces that allow security teams to query video data using voice or text commands. Multimodal analysis combining data from thermal cameras, LIDAR, IoT sensors, and other sources. Integration of multiple data sources Security systems are evolving into predictive platforms that can anticipate and prevent incidents These innovations represent just the beginning of AI's potential impact on security applications. As algorithms become more sophisticated and computing power increases, security systems are evolving into predictive platforms that can anticipate and prevent incidents rather than simply respond to them. The integration of multiple data sources allows for a more nuanced understanding of security situations, enabling more precise and effective responses to potential threats. Emerging regulatory frameworks The rapid advancement of AI capabilities has prompted governments worldwide to develop comprehensive regulatory frameworks. The European Union has taken the lead with its AI Act, categorising AI systems based on their potential risks and establishing strict guidelines for high-risk applications. Focus on safe, secure AI The United States is following suit, with recent executive orders focusing on safe, secure, and trustworthy AI development. These initiatives reflect growing global awareness of the need to balance technological advancement with ethical considerations and human rights protection. These regulations are reshaping how security technology providers approach development and implementation. Responsibility-by-design approach Companies must consider the entire lifecycle of their AI solutions, from initial development The focus has shifted toward a "responsibility-by-design" approach, where privacy protection, data security, and ethical considerations are built into systems from the ground up. This includes robust testing protocols, responsible data practices, and continuous monitoring of AI systems post-deployment. Companies must consider the entire lifecycle of their AI solutions, from initial development through deployment and ongoing operation. Transparency, accountability For security professionals, this regulatory evolution means adapting to new requirements around transparency, accountability, and human oversight. Security teams must document how AI systems make decisions, implement safeguards against bias, and ensure human operators maintain final authority over critical security decisions. The regulations also emphasise the importance of data protection, requiring organisations to implement strict controls over how information is collected, stored, and used within AI-powered security systems. Address challenges of AI The regulatory landscape continues to evolve, with new frameworks emerging that specifically address the unique challenges of AI in security applications. These include requirements for regular system audits, mandatory impact assessments for high-risk deployments, and specific guidelines for handling sensitive personal data in security contexts. Organisations must also develop clear procedures for addressing potential AI system errors or biases, ensuring that corrective measures can be implemented quickly when needed. Preparing for the future The challenge lies in maximising security effectiveness while maintaining transparency and public trust The security industry stands at a crucial junction where innovation meets responsibility. As AI capabilities grow more sophisticated, security professionals must balance the use of these powerful tools while adhering to evolving regulatory requirements. This balance becomes particularly critical in smart city applications, where AI systems might monitor public spaces for safety while respecting individual privacy rights. The challenge lies in maximising security effectiveness while maintaining transparency and public trust. Proactive approach Success in this new landscape requires a proactive approach. Security teams should invest in understanding both the technical capabilities and regulatory implications of their AI systems. This includes developing clear protocols for data handling, establishing robust testing procedures, and implementing continuous monitoring systems that can detect and address potential issues before they become problems. Organisations must also create comprehensive training programs to ensure security personnel understand both the capabilities and limitations of AI-powered systems. Human-in-the-loop approach The human element remains crucial. While AI can process vast amounts of data and identify patterns beyond human capability, security professionals must maintain oversight and final decision-making authority. This "human-in-the-loop" approach ensures that AI serves as a powerful tool for augmenting human judgment rather than replacing it. Training and education become increasingly important as security teams must understand not only how to operate AI-enhanced systems but also how to interpret their outputs and make informed decisions based on AI-generated insights. An ever-evolving environment The integration of emerging technologies like large language models and computer vision will create new opportunities Looking ahead, the security industry will likely see continued evolution in both AI capabilities and regulatory requirements. Future systems may incorporate more advanced predictive capabilities, enhanced natural language processing, and improved ability to understand complex human behaviours. However, these advancements will need to develop within an increasingly structured regulatory framework that prioritises privacy, transparency, and ethical use. The integration of emerging technologies like large language models and computer vision will create new opportunities while also introducing novel regulatory challenges. Physical security transformation The transformation of physical security through AI represents both an opportunity and a responsibility. By embracing responsible innovation practices while maintaining strong ethical standards, security professionals can help shape a future where advanced AI capabilities and regulatory compliance work together to create safer, more secure environments for everyone. Need for security guidelines The key to success lies in viewing regulatory requirements not as obstacles but as guidelines for developing more trustworthy and effective security solutions. As the industry continues to evolve, organisations that prioritise both innovation and compliance will be best positioned to leverage AI's full potential while maintaining public trust and regulatory compliance.
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Security beat
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and school uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate and school security environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasises not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification programme developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The programme emphasises the importance of both physical and digital security, recognising that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardised procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardised procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centres. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasising a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Case studies
Delta Electronics UK is a globally renowned provider of telecom, datacentre and industrial power solutions. Jason Butcher, Managing Director of Delta Electronics UK in Hemel Hempstead, recognised the importance of staying ahead in today’s rapidly evolving security landscape. With a commitment to ensuring the safety of employees and visitors, he sought to upgrade the company’s existing video security system. Although the current system was functional, it lacked the advanced AI-driven features and capabilities that modern security solutions offer. Taiwanese security solution Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security key provider and part of Delta To enhance the overall security infrastructure and take advantage of cutting-edge technology, Delta Electronics UK turned to VIVOTEK, a renowned Taiwanese security solution provider and part of Delta Group. VIVOTEK was selected for its innovative technologies and seamless integration capabilities, effectively addressing Delta Electronics UK's evolving security needs as a trusted partner within the Delta family. Challenge Delta Electronics UK faced several challenges with their outdated system, including: Improved Image Quality: The company required high-resolution image quality for both day and night security. A particular focus was on achieving clear and detailed images in low-light conditions to ensure round-the-clock security. Enhanced Analytics: Advanced AI analytics were necessary to bolster security and operational efficiency. Reliable Performance: The new system needed to deliver consistent and reliable performance, with the ability to scale as the company’s needs evolved. Solution VIVOTEK provided a comprehensive security solution tailored to Delta’s specific goals. Premier Security Systems, a trusted integrator, managed the process from setup to installation. The key components of the solution included: High-Resolution Cameras: VIVOTEK deployed a range of high-resolution IP cameras strategically throughout Delta’s facilities. These cameras offered crystal-clear images, capturing intricate details during the day and maintaining exceptional quality in low-light conditions. To enhance perimeter security, 180-degree panoramic cameras were installed outside the building. These cameras provided a comprehensive overview of the surroundings, significantly reducing the number of cameras required, minimising cabling, lowering maintenance efforts, and ultimately saving costs. Advanced AI Analytics: VIVOTEK’s AI-powered analytics suite played a crucial role in enhancing both security and operational efficiency. The Deep Search capabilities allowed Delta’s security team to quickly locate specific events or objects within recorded footage, streamlining investigations. AI-driven high accuracy detection like line crossing, intrusion detection, and loitering provided real-time insights and actionable data, enabling a proactive approach to security management. Reliability and Scalability: VIVOTEK’s robust hardware and software solutions ensured uninterrupted security, crucial for maintaining the safety and security of Delta’s operations. The system was designed with scalability in mind, allowing Delta Electronics UK to expand coverage easily as their security needs grew. Results The implementation of VIVOTEK Total Solutions, with Premier Security Systems overseeing the installation, delivered significant benefits: Sharper Images: The new high-resolution cameras enabled Delta’s security personnel to identify individuals and incidents with greater accuracy, significantly enhancing situational awareness, particularly in low-light conditions. Proactive Alerts: The integration of AI analytics provided real-time alerts for potential security threats, reducing response times and allowing for quicker interventions. Operational Insights: People counting data provided by the system helped optimise office space utilisation, while facial recognition features improved access control, streamlining security operations. Cost Efficiency: The use of 180-degree panoramic cameras reduced the number of cameras required, pioneering to cost savings in terms of equipment, cabling, and maintenance. Successful Implementation: Premier Security Systems successfully managed the setup and installation, ensuring that the entire process was seamless and met Delta’s high standards. Results and customer feedback VIVOTEK's new AI-enhanced security system at Delta Electronics UK has significantly enhanced the company's security capabilities. Jason Butcher, Managing Director of Delta Electronics UK, praised the upgrade, stating: "Working with VIVOTEK and Premier Security Systems has been a transformative experience for Delta Electronics UK. The upgrade to our security system has significantly enhanced our ability to maintain a secure environment for our employees and visitors." He adds, "This collaboration has reinforced our commitment to security and operational excellence, and we look forward to continuing our partnership with VIVOTEK as our needs evolve." AI-powered solution The success of this AI-powered solution highlights the value of partnerships in delivering a comprehensive security system. Special thanks go to Kevin Brown of Envisage Technology for his crucial support throughout the implementation.
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
HID, a worldwide pioneer in trusted identity and access control solutions, announced that Deskbee, a global provider of corporate space management solutions, has integrated HID Mobile Access and Identity Positioning technologies into its platform. With an already robust workplace management application, Deskbee wanted to enhance security and optimise operational efficiencies by integrating digital credentials and real-time positioning into its platform. HID Mobile Access With HID Mobile Access, Deskbee app users can employ their smartphones and tablets to securely access facilities, eliminating the need for physical cards and reducing the risks associated with lost or misused credentials. This implementation not only enhances convenience and security but also seamlessly integrates with existing systems, simplifying the issuance and revocation of credentials from a single platform. Identity Positioning technology By analysing occupancy data, managers can optimise space planning, improve resource allocation Furthermore, Identity Positioning technology enables building managers to track employee and visitor locations in real-time, providing valuable insights for optimising space planning and resource allocation. By analysing occupancy data, managers can optimise space planning, improve resource allocation (such as energy, water, and HVAC), and enhance overall operational efficiency. Secure, efficient, and personalised experience “The integration of HID’s Mobile Identities solutions demonstrates the enormous potential that application development companies have to transform access control systems and workplace management,” said Rogerio Coradini, HID’s Commercial Director of Physical Access Control in Latin America. “Through collaboration with HID, developers of mobile platforms and applications can adapt to the changing needs of the market and provide a more secure, efficient, and personalised experience for their clients.” Detailed monitoring and improved access management Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage Due to HID mobile identity technologies, Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage, providing accurate data on occupancy, location, and duration of stay. “The ability to automate the registration process and improve access management has been a significant change. HID's reliability and support have been fundamental to these advancements, and we are seeing how these results are positively impacting our clients. The trust in the brand and its support has been essential to our success,” said Gorguet. Employee badge integration Headquartered in Brazil, Deskbee has experienced rapid growth, consolidating its position in the Brazilian market and expanding its operations to more than 25 countries, including Mexico, Chile, Argentina, the United States, Portugal, Spain, Germany, and the United Kingdom. Still this year, the company will offer employee badge integration with Google Wallet, also powered by HID technology.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announced that 22 Bishopsgate is centralising the control of IoT and physical security with Genetec™ Security Center. The software is helping to maximise the return on the prestigious facility's smart building investments, adding value for visitors and tenants. 22 Bishopsgate Sitting in the heart of the City of London's financial district, 22 Bishopsgate is a multi-tenanted commercial development that stands 278m tall and comprises 1,275 million square feet of floor space across its 62 storeys. Completed in 2020, it offers a secure workplace for up to 12,000 employees while also maintaining public access to amenities including a viewing gallery, restaurant, and gymnasium. Smart building vision "The beauty of what 22 Bishopsgate has created is that the more the building is used, the smarter it becomes." "We're proud to be providing them with the tools through which their smart building vision has been realised," says Nick Smith, Business Development Manager, UK & Ireland, Genetec Inc. Sustainability, connectivity, and workplace wellbeing Security Center could meet their specific needs such as streamlining and consolidating all aspects From the start, the vision for 22 Bishopsgate was to be a people-centred smart building that would continually evolve to meet the changing needs of its occupants. Technology would be intelligently deployed in pursuit of new standards for sustainability, connectivity, and workplace wellbeing. As a unified security platform, Security Center could meet their specific needs such as streamlining and consolidating all aspects of security and operations, The open architecture also allows it to pull in data from a range of devices and present this to its operators through one intuitive interface. Customisation and flexibility "The danger of relying on lots of different systems is that many alarms are generated without necessarily being presented to the right people at the right time," explains Glenn Cowell, Smart Systems Manager, 22 Bishopsgate. "The beauty of the Security Center platform is its in-built customisation and flexibility. We own it and know we can shape it to our precise needs." Daily building occupancy and usage It then began implementing a series of IoT protocols - such as BACnet, MQTT, and SNMP One of the priorities for 22 Bishopsgate was to analyse daily building occupancy and usage, giving management and tenants a better understanding of how the facilities were being used. Working with its chosen integrator Total IT, the 22 Bishopsgate team started by deploying Synergis™ access control. This was quickly unified with video surveillance and analytics through the Security Center. It then began implementing a series of IoT protocols - such as BACnet, MQTT, and SNMP - to begin ingesting data from other building systems and devices that could be visualised within Security Center. Identify meaningful patterns These integrations have brought the engineering and operations functions together at both a technical and management layer, ensuring any possible incident can quickly be identified, logged, and responded to appropriately. They can also more easily identify meaningful patterns and trends on which to base future investment decisions.
A prestigious sports club recognised for its premium offerings and high-end facilities caters to a distinguished clientele, including business pioneers, corporate professionals, and other elite members. Committed to maintaining its reputation, the organisation continually strives to enhance security and streamline operations, ensuring an exceptional experience for its members. Face recognition-based approach Confronted with rising security concerns and operational bottlenecks, the sports club sought a sophisticated solution to integrate physical access control with its existing membership management system. The preference was for a face recognition-based approach that would automate access based on subscription validity, improve process efficiency, and elevate member experience. Matrix provided a solution that centralised membership management, automated access procedures, and delivered real-time insights. Challenges Security Vulnerabilities: The club faced increasing challenges related to unauthorised access and potential security threats. Ensuring that only legitimate members could enter the premises was a critical requirement, leading to a preference for advanced face recognition-based access control. Operational Inefficiencies: Manual verification of subscription statuses created significant delays, particularly for the finance team, which had to cross-check member records frequently. The process was error-prone, creating workflow bottlenecks and hampering productivity. Enhancing Member Experience: Delays due to manual verification detracted from the overall member experience. The club aimed to improve efficiency in facility access to ensure that members enjoyed a seamless and trouble-free experience. Matrix solution Matrix implemented a robust face recognition-based access control system that seamlessly integrated with the club's membership management software. The solution offered the following capabilities: Centralised Management: All member information, including access rights and subscription details, was consolidated within a single platform, enabling centralised oversight. This allowed for real-time updates and streamlined control over member access. Automated Access Control: The system automatically authenticated members based on their subscription status, allowing only those with valid memberships to access the facilities. This automation eliminated the need for manual checks, greatly enhancing operational efficiency. Real-Time Monitoring and Reporting: With real-time access monitoring, staff could immediately respond to unauthorised access attempts. Detailed reports on access trends and member behavior supported informed decision-making and further optimisation of services. Deployment scenario Results Heightened Security: The implementation of high-speed face recognition-based access control significantly improved security by effectively blocking unauthorised access and mitigating the risk of breaches. Members felt reassured by the enhanced safety measures. Optimised Operations: Automating access control eliminated manual subscription verification, allowing the finance team to focus on more value-added tasks. The streamlined process improved the accuracy and speed of operations. Superior Member Experience: Members experienced faster and more efficient facility access, boosting overall satisfaction and engagement with the club. Actionable Data Insights: The system provided detailed data on member activity, allowing the organisation to make data-driven improvements to its offerings and facilities. Products deployed COSEC ARGO FACE: Facial Recognition Access Control System with EM Proximity Card Compatibility COSEC PANEL200P: Centralised Access Controller Hub COSEC PLATFORM: Software Platform Licence COSEC PLT: Platform Licence for 17,000 Users COSEC FR: Facial Recognition Licence for 17,000 Users COSEC ACM: Access Control Licence for 17,000 Users Matrix’s solution effectively addressed the sports club’s security concerns, streamlined operational processes, and enhanced the member experience, setting a benchmark for access control in the industry.
Sharry, a global workplace experience platform built around digital employee badges, has successfully delivered its enterprise solution to London’s new international hub opened by PATRIZIA, a global real estate investment manager. The state-of-the-art mobile access leverages Gallagher Mobile Connect credentials and, through full integration with the Gallagher Command Centre access control system, enhances physical security and significantly improves the workplace experience. PATRIZIA’s international hub Located in London’s Endell Street, PATRIZIA’s new international hub was opened after an extensive brown-to-green refurbishment that delivers sustainable ‘office of the future’ combining smart building tech, wellness amenities, hospitality services, street art, and flexible workspaces. The five-floor hub brings together PATRIZIA’s 200 UK-based employees. Their access to the existing Victorian building is completely managed through the PATRIZIA App and web-based PortalWX developed by Sharry. The workplace experience platform is fully integrated into the Gallagher Command Centre access control system allowing users to unlock their office doors simply and quickly by presenting their smartphones. Innovative approach If an employee arrives from another office, they can generate a mobile access badge in the app in seconds “PATRIZIA’s employees in London and those visiting from our other offices can enjoy seamless and touchless mobile access to our new international hub in London’s Covent Garden,” said Shreya Sheth, Associate Director, Building Technology & Sustainability at PATRIZIA. If an employee arrives from another office, they can generate a mobile access badge in the app in seconds. There is no need to send a new badge request, pick up the plastic card in person, or wait for it to be sent, and think about returning it when they leave. This innovative approach saves time while strengthening security policy. Next-generation security solution “We are very excited to be supporting PATRIZIA with their new innovative London office. Their commitment to creating a flagship workspace for the future of work is truly inspiring. It's been an incredible honour to be able to support them with a smart workplace app and integrated access control solution for the space,” said Ondřej Vodňanský, Head of Sales EMEA at Sharry. “We are thrilled to collaborate with Sharry and PATRIZIA to deliver a next-generation security solution at their new London hub. By integrating our Mobile Connect credentials with Sharry's workplace platform, we've created a seamless and secure access experience that not only enhances security but also aligns with the modern, flexible work environment that PATRIZIA envisions,” said Gordon Swallow, UK Sales Manager at Gallagher Security. Enhance experience and operations Beyond mobile access, the PATRIZIA App offers users a comprehensive set of features designed to enhance their workplace experience. To name a few: Reservations: Employees can easily reserve shared workstations or book access to the Health Club. Service Requests: With one tap, users can request any service or maintenance through the app. Guestpasses: The app also simplifies visitor management by allowing users to invite guests to the building and send them a guestpass with all the necessary information. Integrated access control solution Sharry provides an efficient platform for managing workplace access and offers powerful tools For facility and office managers, Sharry provides an efficient platform for managing workplace access and offers powerful tools for communication and engagement with all users, including the ability to send news updates, polls, and event invitations straight to the mobile app. Sharry and Gallagher's integrated access control solution significantly enhances physical security in many areas. For example, a manager can remotely revoke any mobile or plastic badge with just one click in the PortalWX. Even the end-user can immediately report their plastic card as lost in the PATRIZIA app and thus suspend it. The building operating system Finally, managers can access real-time data on workplace occupancy, enabling more informed decisions regarding space and amenities utilisation thanks to a partnership with Trigrr. The building operating system Trigrr has been deployed in PATRIZIA HQ to simplify system integrations and provide a centralised tool that unifies data, automation, and controls across Sharry, HVAC, IoT and lighting. Thanks to Trigrr BOS, occupants can remotely control office room temperature, adjust lighting, monitor CO2 levels, or launch smart scenarios directly in the Sharry workplace platform. "Partnering with Sharry on the new PATRIZIA international hub is a fantastic opportunity to generate more value by combining all applications and systems into a flexible tool that can adapt building behaviour in real-time according to the needs of the occupants," said Jean-Michel Verhulst, CEO of Trigrr.
Round table discussion
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
Products
White papers
Integrating IT & physical security teams
DownloadVerkada workplace safety survey
DownloadHow to create a successful physical security roadmap
Download5 easy steps to an upgraded video surveillance system
DownloadImproving city mobility using connected video technology
Download5 ways to strengthen physical security with an integrated system
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadUnified physical security
DownloadIntegrated access control: reap the benefits of connected security
DownloadSecuring unmanned infrastructure at the network edge
Download10 top insights in access, cloud and more
Download12 questions to ask your access control provider
DownloadMoving to mobile: A guide for businesses switching to mobile access control
DownloadSchool security moves to the cloud
DownloadHow security systems ensure healthy workplaces during COVID and after
DownloadVideos
Physical security: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download