Public sector security
Artificial Intelligence Technology Solutions, Inc., a global pioneer in AI-driven security and productivity solutions for enterprise clients, along with its subsidiary Robotic Assistance Devices, Inc. (RAD), announced that it has further expanded its footprint in the county government sector with the addition of a new county client. With another county government joining RAD’s expanding client base, the Company continues to modernise local security by providing AI-driven solutions. RAD&r...
Codelocks has extended its CL5000 electronic lock range with new Do Not Disturb (DND) models. The new CL5000 DND electronic locks prevent interruptions and unwanted access to locations where controlled privacy is important for people’s comfort and confidence. The new CL5000 DND electronic locks are particularly suitable for private spaces such as meeting rooms, consulting rooms, toilets and changing rooms. Locks Do Not Disturb feature The locks Do Not Disturb feature is activa...
Zenitel, a global pioneer in Unified Critical Communication solutions, proudly announces the launch of a new range of IP Speakers, further strengthening its market leadership position within safety and security communications. The addition of new IP Speakers, together with Zenitel Connect Pro — the industry's first Unified Critical Communication Platform — paves the way for unifying communication technologies to address life safety, security, and operational communication needs under...
Secure Logiq is proud to return to Intersec 2025, where the team will be available to discuss the latest advancements in surveillance storage technology and share their insights on optimising video systems for the most demanding applications. Visitors can meet the Secure Logiq team at Stand S1-G40, where they’ll have the opportunity to connect with industry experts, including Ben Yoxall, Robin Hughes, Anand Subbiah and the dedicated Middle East sales team. Demand for robust surveill...
Boon Edam Inc., a global pioneer in physical security entrance products, announces the launch of its innovative Speedlane Compact Platform. This modular platform, designed for the Lifeline Speedlane Compact Optical Turnstile, offers a groundbreaking solution for facilities seeking advanced entry control while preserving existing floors. Modern entry solutions “Preserving architectural integrity is a priority for many historical and high-design buildings,” said Patrick Nora, Presid...
Vismo has expanded its satellite-based offerings for customer employee safety with the Garmin inReach Messenger. The compact, rugged satellite communicator provides two-way messaging and interactive SOS capabilities and thanks to the Vismo Locate & Protect App, a wider range of features to help safeguard employees in challenging and remote locations. inReach Messenger The features, enabled by integrating the Garmin device with Vismo’s back-end operations, include panic alerts, geo-f...
News
In 2025, over 100,000 online platforms in the UK must start effectively verifying the age of their users to comply with the Online Safety Act (OSA). Adult sites are the first in Ofcom’s spotlight, needing to implement age verification tools to prevent underage users from accessing their platforms in January 2025. Why is it important? The incidence of online harm has never been higher, and all stakeholders are keen to see action to protect children. The research (among 2,000 UK children) found that: Almost one in ten (9%) young people across the UK and the US have been exposed to illegal content, including Child Sexual Abuse Material (CSAM) when going online Young people regularly encounter age-restricted (18+) within 10 minutes of going online Over one in ten (11%) reported encountering age-restricted content once a week, while 10% experience it 2-3 days a week and 7% are exposed every single day they go online Only half of respondents (49%) reported encountering age verification to restrict their access to 18+ content Implementation of the OSA “The implementation of the UK’s Online Safety Act (OSA) is set to bring in dramatic changes to the online ecosystem in a bid to keep children safe online. Adult sites are the first in Ofcom’s spotlight as they will be required to effectively verify the age of every user, starting January 2025." “Many popular platforms have worked closely with Ofcom over the last two years to get ready for this change. However, there will be many still scrambling to comply and others resigned to test how serious Ofcom is about enforcement. Ofcom’s arsenal is significant - including hefty fines, cutting payment and revenue streams and blocking access for UK users. The challenge will be how swiftly and effectively they can tackle non-compliance, particularly with the majority of sites being based outside of the UK,” Lina Ghazal, Head of Regulatory Affairs and ex-Ofcom & Meta of Verifymy. Shared information's safety and privacy Ghazal added: “For consumers of adult content, new age verification hurdles will likely come as a surprise. The majority of porn viewers will be unaware of these changes until the expected barrage of awareness campaigns from various stakeholders in the sector begin. There is likely to be concern around the types of age assurance they can use, particularly those using ID or financial information, as well as the safety and privacy of any information shared.” “The industry will need to reassure users that information will not be shared with adult entertainment sites, that it is only used to confirm whether they are of the correct age, and that it will be immediately deleted by verification providers once authentication is complete.” New realities of the OSA Ghazal concluded: “We expect many sites will also opt for methods with the lowest possible friction, such as email-based age estimation. Users are sure to be put off by clunky or onerous systems and will inevitably gravitate to those with the smoothest user experience." “The conversation over the next few weeks is likely to be confused as these new measures play out, but it's crucial for both adult sites and their users that they adapt quickly to the new realities of the OSA and its impact on accessing adult content online. As encouraged recently by Technology Secretary Peter Kyle, the regulator has a key role to play in fostering a level playing field and ensuring the effective implementation of the OSA.”
Sentrycs, a technology pioneer in the Counter-Unmanned Aerial Systems (C-UAS) industry, announced its continued progress globally within the public safety market. The company recently closed agreements with two new law enforcement organisations, including one in North America. These new agreements will deliver core protocol manipulation sensor solutions across a wide variety of scenarios, from fixed sites to vehicle-mounted (mobile) operations. Drone sightings The company has seen a noticeable spike in C-UAS interest heading into 2025 The deals mark another significant milestone for the company, which has seen its business quadruple, year over year, along with continued adoption of its pioneering technology which is now deployed across sensitive facilities and strategic assets worldwide. The company has seen a noticeable spike in C-UAS interest heading into 2025, especially as, in recent weeks, concerns have grown over unexplained drone sightings throughout several East Coast states in the US. These sightings have prompted calls from both officials and citizens for swift action to identify and mitigate these mysterious flights. Risks to public safety Unregulated or malicious drone activity poses significant risks to public safety and critical infrastructure, ranging from unauthorised surveillance and smuggling to potential terrorist threats where commercially available drones can quickly and inexpensively be weaponized. Addressing these challenges requires sophisticated solutions capable of countering such threats effectively while ensuring no interference with other communication systems that rely on the same frequency bands as the drones themselves. Sentrycs' solution Sentrycs' passively detects, identifies and tracks drones, significantly reducing the possibility of false detections Sentrycs' solution is one of the few available technologies that address these challenges head-on, offering reliable and field-proven capability designed to safeguard public safety with no collateral damage. Leveraging proprietary technology, Sentrycs' passively detects, identifies and tracks drones, significantly reducing the possibility of false detections, a constant challenge encountered with other technologies. Need for kinetic engagements The platform also allows the operator to mitigate (or neutralise) the drone in seconds, directing it to a designated safe landing spot or returning the device to its original home location, avoiding the need for kinetic engagements that often cause collateral damage. "Recent events here in the US, specifically those in New Jersey really highlight the need to monitor unregulated drone activity, as it poses significant risks to public safety and critical infrastructure. Every single day our technology is supporting missions to monitor or mitigate illegal drone activity," said Jason Moore, Chief Revenue Officer at Sentrycs. Challenges of sophisticated solutions Moore added: "Our global footprint means we address a variety of threats from ISR (Intelligence, Surveillance, and Reconnaissance) to enable human trafficking and drug smuggling, to even improvised explosive devices being delivered by the drones themselves." "Addressing these challenges demands sophisticated solutions that counter such threats immediately and effectively without interfering with critical communication systems or causing collateral damage."
Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, has been recently named a pioneer in The Forrester Wave™: Public Cloud Platforms Q4 2024 report. Alibaba Cloud believes this designation recognises its depth of its cloud and AI offerings and strategy, its significant global presence, as well as the ability to provide its global customers with a wide range of products and services. This is the first time Alibaba Cloud has been recognised as a pioneer among other significant public cloud platform providers in this report. AI innovation with AI models Alibaba Cloud is named one of four pioneers among nine global vendors evaluated in Forrester’s report Alibaba Cloud is named one of four pioneers among nine global vendors evaluated in Forrester’s report, with the second highest scores in the current offering and strategy categories. The report states that Alibaba Cloud showed its capacity for AI innovation with homegrown AI models, breadth of foundation model choices and model-as-a-service (MaaS) innovation. The report also states that the core infrastructure and model-as-a-service capabilities enable Alibaba Cloud to provide a major model repository for AI across China. Cloud-native infrastructure “Alibaba has upped the ante on serverless beyond AI, packaging its powerful cloud-native infrastructure into more accessible offerings for both developers and operators, with data and analytics as a stand out,” said Forrester in the report. “Alibaba is a good fit for Chinese-based enterprises or international corporations requiring cloud scale across APAC and parts of Africa, Europe, and Latin America,” the report added. AI development services The Forrester report is a 30-criterion evaluation of the nine most significant public cloud platform providers The Forrester report is a 30-criterion evaluation of the nine most significant public cloud platform providers. Each provider is evaluated on the strengths of their current offerings, strategy and market presence. Alibaba Cloud has achieved the highest possible assessment score (5.0 out of 5.0) in 17 criteria, including database, data integration and governance services, container and Kubernetes services, serverless/FaaS services, compute, IoT, storage services as well as AI development services. AI capabilities “Expanding our cloud-native infrastructure and AI capabilities in the public cloud space to better support our clients is a top priority. We are honoured to be recognised by Forrester for our efforts in this critical area,” said Jingren Zhou, Chief Technology Officer of Alibaba Cloud Intelligence. “To address the increasing demands of AI, we are dedicated to continuously enhancing our ability to provide accessible, scalable, and reliable cloud products and AI applications to our customers.” Demands for robust AI computing Qwen, Alibaba Cloud’s large language model, has seen significant adoption since its intro in April 2023 At Apsara Conference 2024, Alibaba Cloud’s annual flagship event hosted in September, Alibaba Cloud unveiled a revamped full-stack infrastructure designed to meet the growing demands for robust AI computing. It also released over 100 of its newly-launched large language models, Qwen 2.5, to the global open-source community. Qwen, Alibaba Cloud’s proprietary large language model, has seen significant adoption since its introduction in April 2023. The Qwen models have been downloaded over 40 million times on open-source platforms such as Hugging Face and ModelScope, and have inspired the creation of more than 78,000 derivative models. AI model community As a creator of the MaaS concept and an advocate of open source, Alibaba Cloud also build ModelScope, China’s biggest AI model community. It hosts over 10,000 models and serves more than 8 million developers. On the global presence, Alibaba Cloud continues to expand its global reach, currently operating 85 data centres in 28 regions globally. In May 2024, Alibaba Cloud announced its plan to launch its first cloud region in Mexico, and to establish additional data centres in its key markets, including Malaysia, the Philippines, Thailand, and South Korea, in the next three years.
On 10 December, the Security Industry Authority demonstrated its commitment to tackling labour exploitation by inviting senior pioneers from the twenty largest private security businesses to a special summit. The event forms part of Operation EMPOWER, which is the SIA’s response to labour exploitation. EMPOWER involves a dedicated multi-disciplinary team that includes intelligence specialists and criminal investigators. Unfairness and distortion Paul Fullwood hosted the summit, which he described as “unique”, at the SIA’s offices. Paul, who leads Operation EMPOWER and is the SIA Director of Inspections and Enforcement, said: “This is the first time that we’ve held a meeting of this kind, and we hope you’ll all use this opportunity to make your voices heard. We’ve seen that there is an appetite throughout the industry, from top to bottom, to address labour exploitation." "The unfairness and distortion it brings is bad for everybody, not just the individuals who are directly affected.” Integrity of private security industry Michelle Russell, SIA Chief Executive, had previously opened the event with a welcome and an explanation of why labour exploitation matters so much: “Labour exploitation undermines the integrity of, and public trust in, the private security industry." "It undermines the good work of companies that operate lawfully and ethically, and undermines the raison d’etre of the industry, which is to protect people. It is by working together we can stop exploitation of people working in private security.” Business in the security supply chain Liam Emmerson of HMRC gave a presentation on the work that HMRC is doing in conjunction with the SIA Liam Emmerson of His Majesty’s Revenue and Customs (HMRC) gave a presentation on the work that HMRC is doing in conjunction with the SIA. He explained that HMRC ordinarily expects operatives to be employed by a business in the security supply chain to ensure that PAYE tax and national insurance are properly accounted for. Ronnie Megaughin, SIA Head of Compliance and Inspections, spoke to the group about some of the intelligence-led operational activity that his team has put into action since the launch of Operation EMPOWER. He described how the SIA has mobilised its Compliance & Inspections and Criminal Enforcement investigators across the UK, with some significant success. Benefits of security services The group then took part in an open roundtable discussion. Among the subjects under discussion were what further could be done by the government, the regulator, and the industry to tackle labour exploitation; educating buyers of security in the benefits of purchasing services on the basis of quality rather than price; and ensuring compliance and fair employment practices throughout the supplier chain. Participants put forward suggestions including improved co-operation between statutory agencies, a requirement that government contracts for security should be restricted to SIA-approved contractors, and greater transparency and effective auditing of subcontracted suppliers. The summit finished with a commitment for the group to meet again in spring 2025, and to widen participation to include more of the top businesses in the UK private security industry.
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced Gremsy, a pioneering provider of advanced gimbals and payloads, as the latest collaborator in the Thermal by FLIR® program. Gremsy integrates the Boson® radiometric thermal camera module as part of its gimbaled National Defense Authorisation Act (NDAA) compliant Vio F1 drone payload. Assembled in the USA, the Vio F1 is an advanced, lightweight electro-optical/infrared (EO/IR) payload for asset and infrastructure inspection, disaster relief, firefighting, search and rescue (SAR), and public safety missions. Industrial inspections and applications Vio F1 features a Sony 4K Block Zoom EO sensor with up to 240x zoom and a 640 x 512 NDAA-compliant The Vio F1 features a Sony 4K Block Zoom EO sensor with up to 240x zoom and a 640 x 512 radiometric NDAA-compliant and ITAR-free Boson thermal camera with up to 8x zoom. The payload also integrates a 2,400-metre laser range finder, making it an ideal option for industrial inspections and applications. With its integrated sensors, users can seamlessly engage the advanced functionalities of the payload through its diverse and intuitive viewing modes, allowing for individual and combined visible-thermal views. Thermal by FLIR program “Working with the global pioneer in thermal imaging through the Thermal by FLIR program empowered Gremsy to drive innovation and get Vio swiftly to market,” said Vinh Tran, CEO at Gremsy. “Our goal was to create a payload that is compatible with multiple platforms, including Pixhawk, CubePilot, and Skynode, and to offer an easy-to-integrate solution for any drone maker, including BLUE UAS providers.” Features of Vio’s AI AI detection offers accurate and automated tags of key objects, including humans, vehicles, and boats Vio’s Artificial Intelligence (AI) features provide advanced detection and auto zoom capabilities that are critical for public safety and SAR operations. AI detection offers accurate and automated identification of key objects, including humans, vehicles, and boats. Layered with AI Auto Zoom, the system can automatically zoom in on the selected object for the best and most useful view. The zoom level in tracking mode automatically adjusts as the object moves closer or farther away, eliminating the need for teams to adjust the zoom during flight. Advancing aerial imaging technology “Gremsy is a known innovator in advancing aerial imaging technology, making it an ideal candidate for the Thermal by FLIR program,” said Dan Walker, vice president, product development, Teledyne FLIR. “The Vio offers precision and accuracy, plus the upcoming implementation of our radiometric JPG file format will soon enable pilots to leverage the FLIR Thermal Studio Suite analysis and reporting software.” Teledyne FLIR thermal camera modules Teledyne FLIR’s Thermal by FLIR program is a cooperative product development and marketing program created to support original equipment manufacturers (OEMs). The program enables streamlined integration of Teledyne FLIR thermal camera modules into products and provides go-to-market support for resulting innovations.
Footprints Conductive Education Centre, based in Nottingham, transforms the lives of children living with mobility and communication difficulties across the East Midlands. The charity provides babies and children and their families with the tools and support they need to thrive and reach their potential. Through this partnership, Skills for Security aims to support Footprints' mission by engaging its employees in fundraising and awareness activities throughout the year. Support of Skills for Security Says Stephen Frew, Business and Charity Manager at Footprints Conductive Education Centre: "The support of Skills for Security will be invaluable to Footprints, enabling us to continue providing essential services to more children and families across the East Midlands." "This partnership and its focus on fundraising offer a unique opportunity to raise awareness of our work and enhance our ability to help children grow, thrive, and achieve their potential. We are excited to work collectively to make a lasting impact." Broader commitment Team members at Skills for Security are passionate about giving back and view this partnership as an opportunity The collaboration reflects a broader commitment to community engagement. As the UK’s largest fire and security apprenticeship provider, Skills for Security believes in breaking down barriers, fostering inclusion, and encouraging individuals to reach their full potential. Supporting Footprints allows an extension of these values, helping children and families overcome difficulties and achieve meaningful progress. Team members at Skills for Security are passionate about giving back and view this partnership as an opportunity to make a real difference - not just through financial contributions but also by getting actively involved in volunteering efforts. Footprints’ dedication David Scott, Managing Director at Skills for Security, added: "We are proud to partner with Footprints Conductive Education Centre, whose work aligns with our values of empowerment and community. Footprints’ dedication to helping children overcome difficulties is truly inspiring, and we are committed to supporting them in their mission. Together, we hope to make a significant difference for the children and families they support and work with." Through this partnership, Skills for Security is committed to helping Footprints expand its services and reach even more children and families over the coming year. It underscores a dedication to meaningful community engagement, creating positive change, and inspiring others to take action.
Expert commentary
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasises not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification programme developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The programme emphasises the importance of both physical and digital security, recognising that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardised procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardised procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centres. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasising a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Case studies
The Buffalo and Erie County Naval & Military Park, in Buffalo, N.Y., has a clear mission based on four pillars: to honour all veterans, educate the public about the sacrifices made by those who serve, inspire a sense of patriotism and appreciation for those protecting Americans’ rights and freedoms, and preserve the artifacts entrusted to the Park’s care. Buffalo Park The Park regularly hosts events and takes visitors inside America’s military history with in-depth tours of decommissioned naval vessels, exhibits, and displays. The team’s goal is to highlight its monuments and artifacts while providing a welcoming and secure environment for visitors. A key challenge was the Park’s large open and unfenced grounds, allowing the public access to the facilities at any time of the day or night. Challenge Provide a welcoming and secure environment for visitors and deter criminal activity within the park. Achieve 360° coverage across all interior and exterior areas without using cables, which would have made the project cost-prohibitive. Design a wireless surveillance system to cover the park’s large areas of open ground. Surveillance system installation “We had begun to notice an increased rate of delinquent incidents happening during the day and off hours, including graffiti placed on the artifacts and monuments,” said Paul Marzello, Sr., President & CEO, Buffalo and Erie County Naval & Military Park. The Park engaged Mario Rodriguez, president of Forseti Protection Group, and Erik Schiefer, account executive at Seibold Security, to design and install a surveillance system based on Hanwha Vision’s multi-directional and AI-equipped cameras. “When we did our research, we found that Hanwha Vision certainly was a pioneer in the industry,” said Marzello. Factors to consider From a risk and public safety perspective, the goal from the start was to maintain an open and welcoming environment “We conducted a site survey, considering the line of sight, the cameras’ capabilities, the density of groups of visitors and where they tend to gravitate, and criminal history in the Park,” said Bill Abbott, Director of Operations, Buffalo and Erie County Naval & Military Park. “Those were all factors in how we determined the layout. We wanted to make sure that we had the right coverage.” From a risk and public safety perspective, the goal from the start was maintaining an open and welcoming environment while keeping public safety top-of-mind. Solution Install a Hanwha Vision surveillance system comprising multidirectional and AI cameras. 4K multi-sensor cameras Schiefer has extensive experience with Hanwha cameras from previous projects. “Their new 4K multi-sensor cameras are first class and as far as 360° coverage, with the ability to monitor several areas, Hanwha was the first choice,” he said. The ability to view 360° coverage from one camera that essentially is divided into multiple sectors was significant. “That gives us full visibility and lets us be open and welcoming while keeping out of the public’s way without being imposing or intimidating,” Rodriguez said. Ease of playback Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area Schiefer added that one key benefit of using the Hanwha 360° cameras to cover such a large area is the ease of playing back footage and monitoring activity after the fact. “They are broken out into four sensors, so you don’t necessarily have to go back and look through a large amount of footage,” he said. “You can pick the area you're looking for, go directly to that sensor within the camera that we have in that area, and you can pull footage much easier that way.” Cable cost and distance One challenge the team encountered during the design phase was running a cable for a project of this scale. “The cost to run buried cable at such long distances with switches would have rendered this project almost completely impossible,” Schiefer said. “We incorporated wireless network cards into the poles around the park and all the cameras feed directly back to the Hanwha NVR without using any sort of cabling.” NDAA compliant solutions The Park’s priorities included the use of National Defense Authorization Act (NDAA) compliant solutions and having more streamlined communication with law enforcement. “We wanted to make sure that the cameras themselves were secure,” said Abbott. “The cameras also needed to be used to positively identify someone who had done something, either damage or acts of violence. In the past, we could not effectively supply law enforcement with usable information to identify a suspect." Use of AI in cameras The Hanwha cameras’ use of AI plays a key role in delivering those capabilities "We've now changed that with the quality of cameras that we're using. We can share footage and data to produce an outcome that's satisfying to everybody as far as finding a culprit and holding them accountable." The Hanwha cameras’ use of AI plays a key role in delivering those capabilities. “You can use key identifiers, whether it's the colour of someone's shirt, if they're wearing a backpack, or there's some physical feature that we can then go through and locate that person through the system,” Abbott said. Sense of security “We absolutely would see an increase in the value and number of cameras that we use,” said Abbott. Marzello added, “From an operations standpoint, we feel a greater sense of security knowing the cameras are there and will help us identify activities that we can hopefully prevent. This system meets our needs today and will also be able to grow with us.” Results Ability to effectively monitor all park areas and more effective forensic searches. Reduction in on-premise incidents. Streamlined collaboration with law enforcement agencies.
The City of Centennial, Colorado, operates a state-of-the-art Traffic Management Centre (TMC) to monitor regional traffic conditions. Serving a population of over 108,000, Centennial’s TMC ensures smooth traffic flow, supports city operations such as snow management, and engages the public with initiatives like Centennial 101, which provides residents with a behind-the-scenes look at city departments. In August 2023, Centennial installed RGB Spectrum’s Galileo® video wall processor to address its operational needs. The city sought a solution that would enable operators to monitor live feeds from 60 CCTV cameras, improve situational awareness, and facilitate content management for real-time operations and training purposes. The challenge The Momentum Group provided exceptional service and support throughout the project Centennial’s Traffic Management Centre required a reliable, flexible system capable of displaying numerous video streams simultaneously. Operators needed the ability to monitor critical intersections and road conditions in real-time. Beyond daily operations, the TMC needed a tool to support public presentations and internal reviews, offering intuitive control of the video wall through a desktop interface. Planning for the new operational centre began in 2021. After evaluating various options, Centennial chose to follow the example of neighbouring Douglas County, which had successfully implemented RGB Spectrum’s Galileo system in its TMC. This decision was influenced by positive feedback on Galileo’s reliability, flexibility, and performance. The city collaborated with the Momentum Group, a nationally recognised and award-winning manufacturer’s representative firm in the Rocky Mountain region. The Momentum Group provided exceptional service and support throughout the project. “We’ve been very happy with the system reliability and functionality. The Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform,” Libby Nordeen, Traffic Management Centre Operator, City of Centennial. Why RGB Spectrum RGB Spectrum’s Galileo video wall processor met Centennial’s needs on multiple fronts. It offered a seamless solution for monitoring multiple video streams in real-time and allowed operators to move content effortlessly between a desktop interface and the video wall. The city appreciated Galileo’s robust design, which ensures 24/7 reliability, and its scalability to accommodate future operational growth. Libby Nordeen, Traffic Management Centre Operator, described the decision: “We really liked that Douglas County uses Galileo and has been happy with it. It made sense for us to go with RGB Spectrum to align with our region and ensure seamless communication with other jurisdictions.” How the City of Centennial uses RGB Spectrum The Galileo processor also supports Centennial’s broader goals of public engagement and education At the heart of Centennial’s TMC is RGB Spectrum’s Galileo processor, which powers a Planar display that showcases live video feeds from 60 CCTV cameras. Operators, including Nordeen and her team, use the system daily to monitor traffic conditions and enhance citywide situational awareness. This capability has been especially beneficial during inclement weather, allowing snow crews to assess road conditions and prioritise their efforts using live video feeds. The Galileo processor also supports Centennial’s broader goals of public engagement and education. During events like Centennial 101, a program designed to familiarise residents with city operations, the TMC uses the video wall to demonstrate how the department monitors traffic and supports real-time operations. The ability to move content from the desktop to the video wall enables operators to create dynamic and engaging presentations for visitors and city officials alike. Looking ahead, Centennial plans to expand the TMC’s capabilities to include enhanced incident management and greater system-to-system communication with neighbouring jurisdictions such as Englewood, Greenwood Village, and Littleton, all of which use the same traffic signal platform. Results and benefits Since installing RGB Spectrum’s Galileo video wall processor, the City of Centennial has seen significant improvements in traffic monitoring operations. Operators now benefit from enhanced situational awareness and streamlined decision-making. Galileo’s seamless integration with desktop control has simplified workflows, enabling more efficient management of daily monitoring and presentations. Libby Nordeen highlighted the system’s impact: “We’ve been very happy with the system reliability and functionality. Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform.” The TMC’s enhanced operations provide a solid foundation for future growth. As Centennial expands its capabilities to include incident management and regional collaboration, the Galileo processor will continue to be a cornerstone of efficient traffic monitoring and control.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
In 2024, Hualien, Taiwan experienced devastating earthquakes and typhoons, necessitating rebuilding efforts and tourism revitalisation. VIVOTEK (3454-TW), the global pioneer security solution provider, has stepped in to support the local economy by organising the 4th "Safety Map" sustainability event. This year, the event was held in the historically significant Dachen New Village in Hualien, home to over 400 households. Model safe-tourism destination With 2025 marking the 75th anniversary of the migration of Dachen Island residents from Zhejiang, China, to Taiwan, the area is promoting tourism despite challenges like an aging population and increasing environmental risks. VIVOTEK’s team devised diverse solutions to address safety concerns, aiming to combine smart security with local revitalisation efforts. Their goal is to transform Dachen New Village, the largest settlement of Dachen residents in Taiwan, into a model safe-tourism destination that attracts visitors to experience its unique culture. Caring is the core Expanding Social Impact Through a "Safety Map" “VIVOTEK is dedicated to becoming the most trusted security brand in society. We aim to use our expertise to improve safety and forge a unique path of corporate sustainability. In its fourth year, the scale of our ‘Safety Map’ initiative continues to grow,” stated Alex Liao, VIVOTEK’s President. "This time, our work in Dachen New Village benefits over 1,500 residents and ensures that visiting tourists can explore without safety concerns. Additionally, having our team directly observe and address safety issues helps refine our product design to meet users' needs better." Local revitalisation and tourism Boosting the Tourism Economy Through Immersive Experiences The VIVOTEK team also had an immersive theatrical experience created by Lamb Social Innovation Studio The VIVOTEK security team also had an immersive theatrical experience created by Lamb Social Innovation Studio that delved into Dachen’s history. By understanding the area’s unique needs, they developed tailored safety solutions. “VIVOTEK incorporates “concern for others’ cares” as a core value in our sustainability efforts,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the Global Marketing Division. Enhancing safety "Over the years, our ‘Safety Map’ events have spanned neighborhoods, mental retardation training institutions, and schools, fostering a friendlier environment and expanding social impact." "After the natural disasters that recently struck Hualien, leaving behind numerous safety hazards and declining tourist numbers, we hope to use our security expertise to collaborate with residents in enhancing safety and revitalising Hualien’s tourism industry for a win-win outcome." Safety awareness “This is the first in-depth collaboration between Dachen New Village and a corporation. The VIVOTEK security team genuinely considered the needs of the community’s residents." "The event was a co-creation process where everyone brainstormed together, raising safety awareness among residents and inspiring optimism for the community's future transformation,” said Chao Hsiao-Yen, Social Innovation Lamb studio founder. Customised security solutions with AI Building a Safer Dachen New Village At the Ruan Bi Zhenjun Temple, the team explored ways to protect temple assets and visitor donations VIVOTEK’s security team, in collaboration with the local revitalisation group Social Innovation Lamb Studio, worked with residents and elders to identify areas where safety could be enhanced. At the iconic tourist hotspot Ruan Bi Zhenjun Temple, the team explored ways to protect temple assets and visitor donations better while enhancing environmental friendliness, allowing elderly or mobility-impaired individuals to enter and exit freely. Preserving nostalgic charm In the local park, they aimed to reduce disturbances caused by stray animals, improving the overall environment for residents. In the narrow alleys that showcase the history of Dachen’s settlers, the goal was to preserve the nostalgic charm of the village while optimising the environment to make landmarks more recognisable for visitors. For family members living away from home, the community explored innovative technological solutions to enable remote monitoring of loved ones, strengthening familial bonds and care. Various security solutions To address these challenges, VIVOTEK proposed a variety of security solutions. They included installing accessible spaces at the temple to accommodate visitors with mobility challenges, implementing smart lighting systems to enhance nighttime safety, and utilising AI cameras for real-time image analysis and stranger identification. Security solutions included installing accessible spaces at the temple to accommodate visitors The team also designed shared activity spaces to promote intergenerational interactions between the youth and seniors, fostering a sense of community. Emphasising the importance of safety education, the team worked to raise awareness among residents. Generative AI tools Additionally, the project incorporated cutting-edge generative AI tools from the Taiwan Design Research Institute, which visualised proposed solutions quickly and effectively. This approach made it easier for residents to understand and implement the ideas, to transform Dachen New Village into a safer, more livable community, fully prepared to welcome tourists.
Modernising a town's transport hub requires a careful balance of effective security, useful functionality, and sleek design. Jacksons Fencing successfully completed a fencing solution for the Newbury Bus Station redevelopment - an innovative, secure, and sustainable fencing solution that enhances both safety and aesthetics at this key transportation spot. Modern redesign Jacksons Fencing was specified to deliver a key that not only met rigid security ideals As part of West Berkshire Council's ambitious project to upgrade public transport infrastructure, Jacksons Fencing was specified to deliver a solution that not only met stringent security standards, but also blended seamlessly with the station's modern redesign. The result; a smart, sturdy, and sustainable boundary that helps keep the station running smoothly, without compromising on visual appeal. Modern gateway for the community Newbury Bus Station is a central part of West Berkshire's revitalisation plan. Located in a historically rich area, it replaced an old coach parking lot and was designed to offer an "impressive sense of arrival" for both visitors and locals. As a key part of the town’s efforts to create a modern, vibrant, and accessible gateway, the station plays a crucial role in improving the local transport network. To complete the transformation, the station needed a fencing solution that would secure the perimeter, safeguard passengers, and maintain an appealing appearance. Expertly engineered Jacksons Fencing installed 90 metres of Sentry® vertical bar fencing, modern vertical bar railing system Jacksons Fencing installed 90 metres of Sentry® vertical bar fencing, a robust and modern vertical bar railing system designed for high-traffic public spaces. Constructed from hot-dip galvanised tubular steel, the Sentry fencing system is lightweight, yet incredibly strong, capable of withstanding the daily wear and tear of a busy bus station. The sleek, industrial design fits perfectly with the station’s contemporary look, blending seamlessly into the surroundings without being intrusive or creating a hostile environment. Structure for enhanced security The system features a welded pale-through-rail construction, which provides a tamper-resistant structure for enhanced security. Concealed fixings ensure a clean, vandal-resistant finish, while the flat-top construction and non-protruding pales give the fence a non-threatening appearance—ideal for a public space. Additionally, the fence is built to last, backed by a 25-year Service Life Guarantee that reduces maintenance needs and guarantees long-term durability. Combining sustainability with security In extra to its sustainability benefits, the fencing provides a high level of security One of the biggest wins for this project was its alignment with West Berkshire Council’s sustainability goals. The Sentry fencing system is not just tough and reliable; it’s also designed with environmental impact in mind. The durable materials and extended lifespan promise long-lasting performance with minimal need for replacement or maintenance, cutting down on lifetime costs and reducing its environmental footprint. In addition to its sustainability benefits, the fencing provides a high level of security. Its strong, tamper-resistant construction safeguards passengers while preventing unauthorised access without compromising the station’s modern look. Cohesive and secure infrastructure Peter Jackson, Managing Director of Jacksons Fencing, commented: "Contributing to the Newbury Bus Station redevelopment demonstrates our commitment to delivering tailored solutions for local authorities like West Berkshire Council that combine functionality, sustainability, and design." "The success of this project builds on our earlier work at Newbury Train Station in 2022, where we installed 160 metres of Bow Top fencing. Together, these two projects enhance the town’s transport hubs, delivering cohesive and secure infrastructure that supports a vibrant and accessible community.”
Comelit-PAC has partnered with Harrold Jones Services Limited to deliver a stylish and secure access control solution at Warmstry Court, resolving security concerns and ensuring residents' safety and independence. Situated near Worcester’s city centre and next to the River Severn, Warmstry Court is an esteemed housing development, offering high-quality living for older residents while providing peace of mind through secure and comfortable surroundings. Unique security challenges The complex includes several general needs properties rented by Sanctuary Housing The complex includes several general needs properties rented by Sanctuary Housing. Its central location has posed unique security challenges, particularly regarding access control for the building’s car park and residential areas. Sanctuary Housing sought the expertise of Harrold Jones Services to address issues with their existing access control system. After a detailed risk assessment of the site’s needs, Harrold Jones Services collaborated with Comelit-PAC to design and install a tailored access control solution. The new system incorporates Comelit-PAC’s New Housing Central Product combined with High-Security Anti-Cloning Credentials, enabling site managers to monitor and control access from any PC or smart device, regardless of their location. Integrated with Comelit-PAC’s 512 series controllers Says Sanctuary Housing Scheme Manager Kim Tolnai: “The upgraded access control system has completely transformed how we manage the site. Residents now feel much more secure, and we have full control over who can enter the building and use the car park. The ability to monitor the system remotely has also been embraced by our management team. It gives us peace of mind, knowing we can monitor the site wherever we are.” The installation included high-frequency vandal-resistant readers on both the car park barrier and main entry points, integrated with Comelit-PAC’s 512 series controllers and the Housing Central Gateway. This combination delivers total security and reliability, ensuring only authorised residents can access the property and its parking facilities. Comelit-PAC solution A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents Says Danny Wallis, Director of Harrold Jones Services: “We worked closely with the team at Warmstry Court from early specification to ensure the access control system met the bespoke security requirements of the site. The Comelit-PAC solution has been instrumental in providing a comprehensive, future-proof system that seamlessly blends with surroundings with no impact on the aesthetics of the site. The result not only meets but exceeds the expectations of the residents and management team.” A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents. These secure tokens ensure that only authorised individuals can gain access, putting an end to the cloning issues that had previously plagued the site. Installation of the Comelit-PAC access control system Lloyd Palmer, Comelit-PAC’s Regional Sales Manager, provided on-site support to assist with the system’s setup and programming. He also ensured the management team at Warmstry Court was fully trained on the system’s features. Lloyd concluded: “The installation of the Comelit-PAC access control system has transformed security management at Warmstry Court. Sanctuary Housing now benefits from a robust system that ensures only authorised individuals have access to the building and its facilities. The advanced anti-cloning technology and the ability to manage the system remotely provide the ultimate in convenience, security and peace of mind for both residents and management.”
Round table discussion
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might be suspicious, but the situation is different if they are yelling for help. Furthermore, audio enables operators to talk remotely to people on site, which can deter crime, de-escalate situations, or gather information. And yet, optimising audio is often an overlooked aspect of physical security system design. We asked this week's Expert Panel Roundtable: What is the expanding role of audio in today's physical security systems?
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost management, and a skills gap can make adopting the Cloud seem onerous. But the benefits are there, aren't they? We asked this week's Expert Panel Roundtable: Will the impact of the Cloud on physical security integrators be net-positive or net-negative?
Products
Videos
Public sector security: Manufacturers & Suppliers
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download