Radio frequency Identification
In the digital age, businesses are constantly looking for new methods to boost communication efficiency and productivity. As technology advances, IP telephony systems have gained popularity for their flexibility, advanced features, and cost-effectiveness. However, before deciding to invest in an IP telephony system, it's essential to understand the latest trends, the factors influencing IP telephony, and the available solutions. Let's explore these aspects to help them make a well-informed dec...
Blackline Safety Corp, a pioneer in connected safety technology, has announced that it has secured a $3.9 million contract renewal with one of the largest utility companies in the U.S. Headquartered in the Midwest and serving more than four million customers, the company became a Blackline customer in late 2021. The renewal adds two more years of monitoring by Blackline’s Safety Operations Center (SOC), as well as push-to-talk services for the utility company’s 2,200 G7 devices. The...
Allied Universal®, the security and facility services provider, announces that Carmen Randall, Vice President of Training and Development for North America, has earned the 2024 OnCon Icon ‘Top 100 Learning & Development Professional’ award. The OnCon Icon Awards are voted on by peers and presented to individuals based on accomplishments at their companies and within the talent acquisition community. Voters chose recipients who demonstrate a successful mix of achievements and...
The Monitoring Association (TMA) is pleased to announce that National Monitoring Center has renewed the prestigious ‘TMA Five Diamond Monitoring Center’ designation. This designation is granted annually to monitoring centres that satisfy all of the requirements of the ‘five points of excellence’. Commitment to ongoing job-related education and testing by having 100% of its monitoring centre operators certified using the TMA online training series on industry best pra...
The Monitoring Association (TMA), the non-profit trade association representing the professional monitoring industry, announced it has signed a multi-year managed services agreement with Mission Critical Partners (MCP) to power the growth of TMA’s Automated Secure Alarm Protocol (ASAP) Service. This award was made after a competitive procurement process. ASAP is the pioneer, standards-based service for the digital dispatch of alarm events to 911 centers. Since its introduction in 2011, AS...
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipme...
News
ELATEC Inc., a world pioneer in the development and manufacture of innovative RFID and mobile credential readers, announced that Chris Randall has joined ELATEC as senior business development outreach manager based in Scottsdale, Ariz. Chris brings a wealth of experience and a proven track record in strategic planning, brand management, and lead generation within the security and technology sectors. In his new role, Randall will spearhead the company's go-to-market strategy, focusing on developing and implementing business development strategies to achieve growth objectives within the physical and logical access control OEM hardware markets. He will be responsible for identifying and prioritising potential OEM partners, generating and qualifying leads, and pioneering the pre-sales process to secure new partnerships. Randall's extensive background Randall's extensive background includes roles as a business development manager at JCI Randall's extensive background includes roles as business development manager at Johnson Controls (JCI) Security Products, director of sales - Americas at AMAG Technologies Inc., and regional sales manager at various pioneering companies. His experience in building and maintaining strong relationships with key clients and stakeholders, coupled with his strategic thinking and effective communication skills, make him an invaluable addition to the ELATEC team. Sarah Bowling, vice president of sales, business development, and marketing at ELATEC Inc., expressed enthusiasm about the new appointment: "We are excited to have someone of Chris’ calibre pioneering our business development outreach. His extensive experience and impressive network will undoubtedly drive ELATEC's continued success."
Secure Logiq and Ivideon are pleased to announce a strategic partnership aimed at enhancing cooperation and delivering unparalleled video surveillance capabilities. Harnessing the strength of both companies, this partnership merges Secure Logiq’s advanced server technology with Ivideon's comprehensive cloud solutions, creating a hybrid approach that meets the dynamic needs of modern video surveillance. On-premises solutions With over 12 years of experience, Ivideon has emerged as a rapidly growing provider of cloud video surveillance and analytics, serving more than five million users in over 120 countries. Recently, the company introduced Ivideon Node (a local extension of Ivideon Cloud) and Ivideon Smart Bridge, designed for on-premises solutions. Ivideon Smart Bridge further enhances this synergy with AI-powered capabilities Supporting up to 300 cameras per server, Ivideon Node facilitates seamless integration into hybrid networks, ensuring high fault tolerance of local storage, while capitalising on the benefits of cloud surveillance. Ivideon Smart Bridge further enhances this synergy with AI-powered capabilities, such as Face Recognition, Visitor Counters, Footfall Traffic Analysis, ANPR, Fire & Smoke Detection, and Access Control Systems. Key features of the partnership Key features of the partnership include rapid scalability, seamless integration via API & SDK, advanced analytics and reporting tools. These solutions facilitate effortless upgrades, enabling existing CCTV setups to transition seamlessly to cloud integration without camera replacement. "We are very excited to partner with Ivideon to enrich our video surveillance offerings," said Hayley Joseph, Markets & Channel Manager of Secure Logiq. Advanced cloud-based solutions Hayley Joseph adds: "This collaboration allows us to deliver the best of both worlds - high-performance on-premises servers alongside advanced cloud-based solutions." "With a truly hybrid solution catering to diverse needs, we anticipate this partnership to deliver reliability, intelligence and scalability to our clients," noted Iliya Ilchishin, Head of International Sales of Ivideon, adding "We’re eager to see what the future holds with Secure Logiq."
3DX-Ray has announced the sale of a significant quantity of Threat Scan®-LSC Systems to an unnamed military customer for use by their EOD units currently engaged in active service. The total value of the contract is more than £350k. Financial expectations 3DX-RAY LTD, CEO, Vincent Deery said, “We are delighted with this sale because, as a long-standing repeat customer operating in the harshest conditions, it represents faith in our company, products, and service." He went on to say, “But also from a business perspective, the contract ensures we maintain our recent successes and are on track to meet our financial expectations.” LS1 and LS3 panel The 3DX-RAY Threat Scan®-LSC is a portable x-ray inspection system that includes two panels: the large format LS1 panel and the compact LS3 panel. The LS1 panel has a large imaging area of 600mm x 460mm to scan typical bags and packages in one scan, yet it is still remarkably lightweight and incredibly thin. The LS3 panel is more compact with an imaging area of 305mm x 256mm, for use where access to suspect packages is limited or under vans, for example. This combination system is both flexible in deployment configurations and powerful with the ability to penetrate steel up to 40mm at 120kV. It also produces high-quality, sub-millimetre resolution images.
Amazon Web Services (AWS), an Amazon.com, Inc. company, and Automation Anywhere, a pioneer in AI-powered automation solutions announced an expanded collaboration with Amazon Web Services (AWS) to expedite business transformation and help customers achieve rapid cost savings by automating complex enterprise workflows with generative AI. Enterprise-wide process automation Automation Anywhere will empower customers to create enterprise-wide process automation within minutes with conversational automation, quickly turning natural language requests into powerful automated actions, by leveraging Amazon Q. This fully managed, generative AI-powered assistant can be configured to answer questions, provide summaries, generate content, and complete tasks based on enterprise data. Generative AI-powered automation "By making conversational automation available enterprise-wide with Amazon Q, we're arming every employee in companies with the potential to automate and transform their challenging process workflows to transform the way they work and reduce the time it takes from days and weeks to minutes," said Mihir Shukla, CEO, and Co-Founder. "Our customers have been experiencing massive savings with generative AI-powered automation, and many continue to be amazed at how fast these cost savings and productivity gains can be realized." AI-powered services "We're excited to see AWS and Automation Anywhere bring in AI-powered services to enterprise process automation, blending knowledge with LLM models to automate complex workflows," said Rahul Patet, Automation Leader at Alight, a cloud-based provider of integrated digital human capital and business solutions. "We believe the power of AI-based process automation can transform how companies operate in the future." Amazon Q Business users can leverage Amazon Q to solve problems, generate content, and gain insights Business users can leverage Amazon Q to solve problems, generate content, and gain insights. Amazon Q provides immediate, relevant information and advice to employees to streamline tasks, accelerate decision-making and problem-solving, and help spark creativity. Layered within the Automation Success Platform, business users can take immediate action, freeing up time for higher-value tasks, spurring increased workplace innovation, and resulting in millions of dollars in cost savings for an enterprise. Improving customer experience Automation Anywhere's generative AI-powered automation with Amazon Q can significantly enhance the capabilities of virtual AI agents supporting business customers. This integration equips them with skillsets that mirror years of training and experience, dramatically improving the customer experience by making interactions more natural, relevant, and satisfying for the customer. AI + Automation Enterprise System Automation Anywhere announced a SCA with AWS to bring new process automation and generative AI solutions This announcement is also included as part of Automation Anywhere's new AI + Automation Enterprise System. In 2023, Automation Anywhere announced a Strategic Collaboration Agreement (SCA) with AWS to bring new process automation and generative AI solutions to the marketplace, building upon a years-long relationship between the two companies that has since evolved from core infrastructure to the application layer with AI. Software solutions Automation Anywhere continues to develop specific generative AI-powered solutions in customer experience, document processing, and contact centre intelligence using Amazon SageMaker JumpStart, Amazon Bedrock, and other AWS AI and ML services. Automation Anywhere also joined the AWS Independent Software Vendor (ISV) Accelerate Program, a co-sell programme for AWS Partners that provides software solutions that run on or integrate with AWS, further strengthening the go-to-market relationship.
DNAKE, a pioneering provider of smart intercom solutions, has announced a significant update version V1.5.1 to its cloud intercom offering. This update is designed to elevate the flexibility, scalability, and overall user experience of the company's intercom products, cloud platform, and Smart Pro APP. For installer Installer & property manager role integration On the cloud platform side, several enhancements have been made to streamline processes and improve efficiency. A new "Installer+Property Manager" role has been introduced, enabling installers to switch seamlessly between two roles. This new role consolidation streamlines workflows, reduces complexity, and eliminates the need for switching between multiple accounts on the platform. Installers can now effortlessly manage both installation tasks and property-related functions from a single, unified interface. OTA update Select the target device models for OTA updates with just one click in the platform For installers, the update brings the convenience of OTA (Over-the-Air) updates, eliminating the need for physical access to devices during software updates or remote management. Select the target device models for OTA updates with just one click in the platform, eliminating the need for tedious individual selections. It offers flexible upgrade plans, allowing instant updates or scheduled upgrades at a specific time, to minimise downtime and maximise convenience. This feature is particularly beneficial in large-scale deployments or when devices are located across multiple sites, significantly reducing the time and effort required for maintenance. Seamless device replacement Furthermore, the cloud platform now simplifies the process of replacing old intercom devices with new ones. Simply enter the MAC address of the new device on the cloud platform, and the system automatically handles the data migration. Once completed, the new device seamlessly takes over the old device's workload, eliminating the need for manual data entry or complex configuration steps. This not only saves time but also reduces the potential for errors, ensuring a smooth and seamless transition to the new devices. Self-service facial recognition for residents This allows residents to conveniently register their face ID via the Smart Pro APP at any time Installers can easily enable “Allow Residents Register Face” when creating or editing the project through the cloud platform. This allows residents to conveniently register their face ID via the Smart Pro APP at any time, anywhere, reducing the workload for installers. Importantly, the app-based recording process eliminates the need for installer involvement, significantly reducing the risk of facial image leaks. Remote access Installers can simply access the cloud platform to remotely check devices without network restrictions. With support for remote access to the devices’ web servers via the cloud, installers enjoy unlimited remote connectivity, enabling them to perform device maintenance and operations anytime, anywhere. Quick start For those eager to quickly explore the solution, the Quick Start option offers instant installer registration. With no complex distributor account setup required, users can dive right into the experience. And, with future integration planned with the payment system, the seamless acquisition of a Smart Pro APP licence through online purchases will further streamline the user journey, delivering both efficiency and convenience. For property manager Multi-project management With a single property manager account, the ability to manage multiple projects significantly boosts efficiency and productivity. By simply logging into the cloud platform, property managers can switch between projects effortlessly, allowing for quick and efficient management of different projects without the need for multiple logins. Efficient, and remote access card management Property managers can conveniently record access cards via a PC-connected card reader Manage access cards anytime, anywhere with the cloud-based solution. Property managers can conveniently record access cards via a PC-connected card reader, eliminating the need for on-site visits to the device. The streamlined recording method enables bulk entry of access cards for specific residents and supports simultaneous card recording for multiple residents, significantly enhancing efficiency and saving valuable time. Instant technical support Property managers can easily access technical support contact information on the cloud platform. With just a click, they can contact the installer for convenient technical assistance. Whenever installers update their contact info on the platform, it's immediately reflected for all associated property managers, ensuring smooth communication and up-to-date support. For residents Brand-new APP interface The Smart Pro APP has undergone a complete transformation. The sleek and modern interface provides an enhanced user experience that is both intuitive and efficient, making it easier for users to navigate through the app and access its features. The app now supports eight languages, catering to a wider global audience and eliminating language barriers. Convenient, secure face ID registration Residents can now enjoy the convenience of registering their face ID through the Smart Pro APP, without waiting for the property manager. This self-service feature not only saves time but also enhances security, as it significantly reduces the risk of facial image leaks by eliminating the need for third-party involvement. Residents can rest assured of a secure and hassle-free experience. Expanded compatibility The update expands compatibility with DNAKE's cloud service, integrating new models The update expands compatibility with DNAKE's cloud service, integrating new models like the 8” Facial Recognition Android Door Station S617 and the 1-button SIP Video Door Phone C112. Additionally, it enables seamless integration with indoor monitors, allowing S615 users to simultaneously call the indoor monitor, DNAKE Smart Pro APP, and landline (value-added function). This update significantly enhances communication flexibility in residential and commercial environments. Update for its cloud intercom solution In conclusion, DNAKE's comprehensive update for its cloud intercom solution represents a significant leap forward in terms of flexibility, scalability, and user experience. By introducing powerful new features and enhancing existing functionalities, the company has once again proven its commitment to innovation and customer satisfaction. This update is set to upgrade the way users interact with their intercom systems, paving the way for a more convenient, efficient, and secure future.
At Dahua, they view environmental protection as one of their core responsibilities. They integrate clean technology into the company's strategy and increase investment outputs in this area, particularly in R&D. In this article, they will explore how Dahua empowers its green R&D capabilities, highlighting its green product management platform, utilisation of green raw materials as well its upgraded green packaging. Utilising GPM platform Dahua embeds green principles throughout the entire product lifecycle by establishing a green product management (GPM) platform that facilitates integrated management of products’ green attributes. This platform significantly promotes standardised and process-oriented management of green R&D efforts, thereby enhancing the efficiency of green product management. Dahua embeds green principles throughout the entire product lifecycle Dahua also developed a Product Full Lifecycle Environmental Management Specification, which imposes rigorous standards and strict requirements for internal environmental management across various stages including product design and development, processes, production, logistics, sales, maintenance, and product recycling. Using green raw materials The company actively identifies and adheres to environmental regulations and standards for products Dahua places significant emphasis on managing green product attributes by integrating environmental requirements into the early stages of R&D. The company actively identifies and adheres to environmental regulations and standards for products in both domestic and international operations, encompassing key requirements such as RoHS, REACH, CA65, PAHs, among others. These requirements are internalised and integrated into Dahua's Hazardous Substance Restriction Requirements, which also extend to the company's suppliers, ensuring that the products meet stringent environmentally friendly and low-carbon standards right from the source. Dahua also strictly adheres to the Hazardous Substance Process Management System (HSPM) in accordance with the IECQ QC080000:2017. This includes enhancing environmental data control mechanisms, developing multiple material library functions, and utilising green materials to support green product development. Throughout the 2023 reporting period, the HSPM operated effectively, resulting in zero recall or customer complaints related to environmental compliance issues. During the same year, Dahua added and updated 1,718 RoHS reports, covering over 97% of production materials. It also introduced new environmental testing equipment and conducted inspections on over 1,000 types of production materials with a 100% passing rate for self-developed RoHS sampling. Additionally, all types of different materials achieved a 100% coverage rate for REACH declarations. Over 1,000 products sold in Europe completed SCIP registration declarations, and the overall recovery rate for WEEE (Waste Electrical & Electronic Equipment of the European Union) products reached 80%. Upgrading R&D techniques At present, 100% of Dahua's new product R&D has achieved simulation coverage While building a green product R&D platform and system, Dahua is dedicated to developing simulation designs. With high precision and efficiency, Dahua’s Galaxy Cloud Simulation Management Platform facilitates multidisciplinary simulation and cross-domain integration. This platform eliminates the need for actual testing or experiments in the R&D process, utilising continuous technological innovation to support green development. At present, 100% of Dahua's new product R&D has achieved simulation coverage. Dahua is dedicated to developing simulation designs In 2023, Dahua received the Excellent Organisational Award in Engineering Simulation Innovation Design at the Belt and Road Initiative and BRICS Countries Skills Development and Technological Innovation Competition. Several Dahua employees also received the Second Prize, Third Prize, and Excellent Award for Engineering Simulation Innovation Design in the same competition. Optimising R&D of green packaging Dahua actively conducts research and development on green packaging materials Dahua closely monitors the environmental impact of its product packaging. It follows the EU 2005/20/EC Packaging and Packaging Waste Directive, as well as relevant standards such as the GB/T 12123-2008 General Requirements for Packaging Design, the GB/T 8166-2011 Cushioning Packaging Design, the GB/T 6544 Corrugated Board, and the GB/T 13024 Carton Boards baseline requirements. Adhering to principles of lightweight, standardisation, and green sustainability in packaging materials, Dahua actively conducts research and development on green packaging materials, guided by the DH JS 1730 Packaging Design Technical Specification and the T/ZJAF 9-2021 Green Packaging Technical Specification for electronic security products. Using lightweight packaging Dahua is committed to utilise lightweight packaging, ensuring that its packaging effectively protects the products while minimising the use of packaging materials and reducing packaging weight wherever possible. This approach not only reduces resource consumption but also lowers carbon emissions. Dahua developed an industry-pioneering film composite packaging technology Dahua also developed an EHS ecological pallet that uses paper instead of plastic or wooden pallets Dahua developed an industry-pioneering film composite packaging technology that utilises a flat paper-film packaging structure to provide three-dimensional product protection in a flat package. This innovative design is 100% recyclable, resulting in a 40% reduction in packaging material usage and a 50% decrease in storage space requirements. The patented non-equal-length composite core production process with paper film significantly reduces the average volume of product packaging by over 15%. On average, every million sets of products can save 12.5 tons of cardboard usage. This technology has been granted 31 authorised invention patents and 42 utility patents and is continuously being applied to key products in front-end, consumption, and storage segments. Dahua also developed an EHS ecological pallet that uses paper instead of plastic or wooden pallets, reducing the weight of the pallets by 50% and lowering energy consumption and carbon emissions during product transportation. Implementing packaging standardisation Dahua implements packaging standardisation to ensure that packaging materials meet the requirements of various products while promoting uniformity in packaging. This approach enhances the reusability and space utilisation of packaging materials. Based on the standardised design of basic logistics modules, Dahua developed a modular packaging technology featuring 1 standard box specification and 22 packaging solutions, catering to the packaging needs of over 1,000 components. Dahua developed a modular packaging technology featuring 1 standard box specification This technology is characterised by high reusability and significantly enhances the space utilisation of packaged products in transport vehicles. Also, Dahua’s innovative film packaging technology not only reduces the consumption of materials but also increases the reuse rate of product packaging by 30%. Upgrading green packaging Dahua is dedicated to utilising more environmentally friendly packaging materials, aiming to reduce the plastic content in its packaging in order to lower non-renewable resource consumption, minimise environmental impact, and promote the green recycling of packaging materials. Dahua introduced green plastic-free packaging technologies to replace non-degradable plastic components in its packaging through its initial research on degradable films and cushioning foam materials, along with the development of high-strength all-paper cushioned linings, plastic-free colour printing curing technology, and novel-coating moisture-proof boxes. Dahua introduced green plastic-free packaging technologies This initiative effectively reduces plastic waste, standardises packaging materials, decreases solid waste disposal requirements, promotes recycling and reuse, and enhances the overall degradability of the upgraded packaging. As a result of these efforts, the company has achieved a 9% reduction in plastic content in product packaging, equating to an annual reduction of eight tons of single-use plastic per million units. Dahua mainly uses paper, plastic, wood and metal in its product packaging. The table below shows Dahua’s consumption of paper and plastic packaging over the years: Dahua’s consumption of paper and plastic packaging
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialised skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organised theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilised the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilise security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasising the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organisations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualisation, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organisations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organisations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialised knowledge in data visualisation and metrics analysis will ensure that this technology is utilised effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analysing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralised view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organisation. When security can proactively provide solutions and effectively address risks that arise in all corners of the organisation, it becomes the cornerstone of overall organisational safety. Modern security approaches This collaborative environment will empower the organisation to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organisation to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organisations in an ever-shifting environment.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, whilst ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working whilst still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimised image quality, processing speed and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
The university stands out as a highly esteemed institution, particularly renowned among enthusiasts of science and technology. With its effective educational approaches, the institution experienced a surge in enrolment, necessitating an upgrade from outdated communication technology within its premises. Furthermore, with plans for expansion in the upcoming academic year, there's a growing need for modern communication technology to streamline communication across various buildings and offices. To delve into their challenges: Limited Capacity System: The existing system proved to be obsolete and lacked sufficient capacity to handle the communication demands across offices within the same institution and across multiple locations. Communication Among Multi-Located Offices: As the University embarked on an expansion project, including the establishment of a new building at a distant location, there arose a need for seamless connectivity between this new site and the main building in the form of a multi-location communication solution. Need for Upgradation: The absence of modern features such as multi-party Conferencing and Unified Services for Mobility highlighted the necessity to upgrade their outdated communication system. Scalability and Redundancy: They sought a solution capable of effortlessly adapting to future requirements, ensuring smooth scalability for forthcoming applications. Furthermore, incorporating redundancy measures was deemed essential to guarantee uninterrupted operations. Solution Devised a tailored Multi-Location contact solution aimed at enhancing and raising Matrix Comsec, in collaboration with Rutvi System, meticulously examined the challenges faced by the university administration. Through collaborative efforts, they devised a tailored multi-location communication solution aimed at enhancing and expanding the existing infrastructure by leveraging Matrix Telecom Solutions. This involved the implementation of a Hybrid IP PBX and integration of a Media Gateway to streamline communication processes and ensure readiness for future demands. The Matrix solution comprises: At location 1 within the university complex, the Hybrid PBX, ETERNITY LENX, was installed. Alongside digital key phones, multiple analog phones were also connected at this site. An IP connection was established between location 1 and location 2. Utilising the ETERNITY LENX with SARVAM Gateway ENT, a PRI Gateway arrangement from location 1 facilitated an IP connection to the ETERNITY MENX at location 2. Digital key phones and multiple analog phones were integrated into location 2. The Matrix Multi-Location communication solution seamlessly interconnected both locations while incorporating a range of modern communication features. This fosters enhanced adaptability and versatility within the organisation, offering optimal advantages for contemporary communication needs. Results The implemented solution not only provided them with access to modern communication features but also facilitated smooth communication across their expanded infrastructure. The Hybrid PBX Systems, including ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered scalability for up to 2000 IP Users, ensuring future readiness. Moreover, the Hot Swappable Card feature ensured uninterrupted operation and simplified maintenance, while the redundancy feature ensured high availability and continuous communication. With the SARVAM Gateway ENT Licence, they were able to utilise SARVAM as both a Unified Communication Server and Gateway simultaneously, eliminating the need for additional investments. The EON510 - Premium Digital Key phone offered advanced call amenities such as Global Directory Integration and Advanced Call Routeing, enhancing employee productivity and efficiency. The multi-location communication solution provided by Matrix seamlessly connected multiple buildings for the University, while the incorporation of modern communication features made them more efficient and prepared for the future.
The Body Shop has installed bespoke Traka RFID locker solutions at its main distribution centre to ensure intelligent management and accountability of assets, enhance security and streamline operations. As a global pioneer in ethical and sustainable beauty products, The Body Shop recognises the importance of responsible resource management, business practices and asset security. Traka intelligent locker systems At its main distribution centre in Littlehampton, three large-scale Traka intelligent locker systems have been installed to manage different devices. The first uses Traka’s multi-bay cradle locker solution to manage 30 VoCollect voice-picking devices and Bluetooth headsets, all charged and ready to operate. Three large-scale Traka intelligent locker systems have been installed to manage different devices The second houses 40 Falcon handheld scanners, managed by Traka’s specialist Asset Master Locker range with charging and battery points located. The final system presents secure storage for a kit of equipment, specifically designed for the forklift truck drivers, with each locker compartment containing a Falcon scanner, Radio and Printer. Each intelligent locker solution is offered with RFID asset detection and specialist TrakaWEB software, to provide managers with instant audit control capability to establish exact times when physical devices are removed and returned to lockers. New standards in design Says The Shift Manager, responsible for the project: “To keep up with high demands, our distribution centre operates 24/7. It is constantly evolving, driving new standards in design and use of technology to ensure our products reach our stores to meet our loyal customer demands." “To operate at maximum capacity, we need to make it as simple and as quick as possible for authorised colleagues to not only gain access to the devices they need but also ensure they are operational and in good working order. With the introduction of Traka, we have eliminated manual control, plus we have a complete audit on all devices that we can access from anywhere. We have already noted increased accountability, traceability and fault logging, all coming together to reduce lost time and enhance operational efficiency.” Net 2 access control cards Access to other assets and tools can only be granted to authorised personnel for their job specification The three locker solutions have been installed in two separate locations around the distribution centre, to ensure staff can easily access equipment in their work area. Eliminating the need to travel to a central location and queue to access or organise equipment has led to improved productivity at the start and end of shift periods. Traka has also ensured all systems operate using existing Paxton Net 2 access control cards to minimise facility disruption during or after installation. Access to different assets and equipment can only be granted to authorised personnel for their identified job specification, with staff only able to take one device or kit at a time. Author's quote Lee Payne, Traka Business Development Manager added: “The introduction of Traka systems to a global distribution centre such as The Body Shop demonstrates how simple process enhancements can make a significant difference. From the initial brief through to implementation, we worked closely with the team to identify the exact requirements for each site and the accessibility needs for staff." “We understood the need for curfew notifications, fault logging and careful authorised access control. We planned with the team to separate out the systems into specific work areas and use the Traka orange to help the locker systems stand out, all to ensure vital time could be saved for staff and management. The result is a smoother, more efficient operation throughout the supply chain, helping The Body Shop continue its mission of delivering its best-loved ethical beauty products."
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering and Ocean Outdoor have completed five joint projects together. Follow-up appointments for the next two projects are already scheduled. "Let's see what happens," was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. “We have to. So much is changing and new technology is developing incredibly fast. You have to keep up.” He knows better than anyone how mobile the market is. “Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market leaders. But it is not necessarily that they are also at the forefront of technology.” Indoor shopping centre But the initial learnings and experience with the screen were very good before we started" Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad products, and we trust them completely on this. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Not regarding the screen, but its coincidence with the renovation of the shopping centre Very pleasant cooperation Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the renovation of the shopping centre.” “They had actually just finished. All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." We are always looking for something new and surprising Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings. On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." Trying various techniques The screen doesn't just go around the corner, it goes around the corner seamlessly" Fred adds: "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower.” “In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready. Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is really LED on LED, without a seam." Making image seamless To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in RoFerdam," Peter says. "The screen was placed against a glass elevator. When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Really fantastic." For instance, it prevents the light intensity from being too high Monitoring primary system The fifth project collaboration between Dahua, KITT Engineering and Ocean Outdoor is a LED display screen in Westfield Mall of the Netherlands. Something that can have major consequences in outdoor advertising In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
The University of New Haven offers a range of National Security and Public Service programmes, some of which were the first of their kind when launched decades ago. Having such a sturdy academic background, the university searched for the proper equipment to let the students practice and polish their knowledge. After thorough market research, the choice was made in favour of Regula 4308S, which is already being used in educational forensic research. Features of Regula 4308S Regula 4308S enables truly advanced examination of any crime evidence, from all kinds of documents, to fingerprints, blood stains, and more. The highest optical magnification (320x) and camera resolution (14 MP), over 40 light sources, and more than 20 light filters, as well as 3D visualisation capabilities and the ability to examine large objects, make Regula 4308S a powerful tool for forensic research. Device has modules for reading MRZs, RFID chips, hidden images (IPI), and 1D and 2D barcodes For the purpose of identity document examination, the device has modules for reading MRZs, RFID chips, hidden images (IPI), and 1D and 2D barcodes. Plus, Regula 4308S has a unique motorised oblique lighting system, which makes it possible to change the light source's angle of incidence, and thus gives a wide range of opportunities for examining the microrelief of a document in the visible and infrared spectrum range. Author's quote “Regula’s device provides us with wide capabilities for forensic research, so our students can be easily trained on the basics they need to use. We also liked the good balance between the device’s functionality and its price. So far, I must say that our experience of using Regula 4308S is very positive,” says Dr. Josep De Alcaraz-Fossoul, Assistant Professor of Forensic Science at the University of New Haven. “With fraud being so sophisticated these days, it’s really crucial to equip forensic experts with not only powerful tools, but what is probably more important, fundamental knowledge. We are honoured that the University of New Haven decided to rely on the capabilities of our device in their educational programmes,” comments Arif A. Mamedov, President and CEO at Regula Forensics, Inc.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages of AI and machine learning (ML) also include automating repetitive tasks, analysing vast amounts of data, and minimising human error. But how do these benefits apply to the physical security industry, and is there a downside? We asked this week’s Expert Panel Roundtable: What are the benefits, and drawbacks, of using artificial intelligence (AI) in physical security?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
White papers
![A guide to specifying RFID readers](https://www.sourcesecurity.com/img/white-papers/612/el-920.jpg)
A guide to specifying RFID readers
Download![Attention OEMs: 5 ways RFID readers can secure your markets](https://www.sourcesecurity.com/img/white-papers/612/920-rfid.jpg)
Attention OEMs: 5 ways RFID readers can secure your markets
Download![5 reasons to integrate mobile technology into your security solution](https://www.sourcesecurity.com/img/white-papers/612/gall-4.jpg)
5 reasons to integrate mobile technology into your security solution
Download![Automatic vehicle identification: State of the industry 2020](https://www.sourcesecurity.com/img/white-papers/612/nortech-automatic-vehicle-identification-920_1593085368.jpg)
Automatic vehicle identification: State of the industry 2020
Download![11 considerations for embedded system RFID readers](https://www.sourcesecurity.com/img/white-papers/612/elatec-920x533_1593110986.jpg)
11 considerations for embedded system RFID readers
Download![RFID and smartphone readers in physical access control](https://www.sourcesecurity.com/img/white-papers/612/elatec-920x533.jpg)
RFID and smartphone readers in physical access control
Download![Is your access control as effective as you think?](https://www.sourcesecurity.com/img/white-papers/612/flipped-access-control-glasses-902_1544199340.jpg)
Is your access control as effective as you think?
Download![What are the security technology needs of the hotel sector?](https://www.sourcesecurity.com/img/white-papers/612/hotel security thumb 620.jpg)
What are the security technology needs of the hotel sector?
Download![9 Opportunities To Upgrade Your Access Control Technology](https://www.sourcesecurity.com/img/white-papers/612/office-doors-620x360.jpg)
9 Opportunities To Upgrade Your Access Control Technology
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Radio frequency Identification: Manufacturers & Suppliers
- Anviz Radio frequency Identification
- ASSA ABLOY - Aperio® Radio frequency Identification
- HID Radio frequency Identification
- MOBOTIX Radio frequency Identification
- ASSA ABLOY Radio frequency Identification
- Suprema Radio frequency Identification
- SALTO Radio frequency Identification
- ELATEC Radio frequency Identification
- Climax Technology Radio frequency Identification
- Brivo Systems Radio frequency Identification
- Dahua Technology Radio frequency Identification
- Codelocks Radio frequency Identification
- Paxton Access Radio frequency Identification
- Bosch Radio frequency Identification