Radio frequency Identification
Gunnebo Entrance Control is set to unveil its latest advancements in airport security at Passenger Terminal Expo 2025, including showcasing advanced entrance control technology from Cominfo, a Gunnebo Entrance Control company. On booth 1314, as a pioneer in entrance control solutions, visitors will be able to see AFL as the latest addition to Gunnebo Entrance Control airport gates portfolio. Highest security standards Gunnebo Entrance Control will present Cominfo’s AirGate e-Gate for au...
With new life-saving drugs being created every day, the pharmaceutical industry is directly involved in saving human lives across the world. With how important the work of this sector is, it becomes more important to leverage physical access control for the pharmaceutical sector. This helps to protect intellectual property and physical as well as human assets. Top concerns about security The top concerns about security in pharmaceutical industries include the safety of materials The top conc...
Corelight, the fastest growing provider of network detection and response (NDR) solutions, announced that Carrefour, one of the world’s largest retail groups, has renewed its confidence in Corelight’s security solutions to enhance network visibility, detect threats more effectively and accelerate incident response across its global operations. As Carrefour continues its digital transformation, securing its vast and complex network infrastructure has become a top prio...
Sentinel Photonics, a pioneering UK-based designer and manufacturer of advanced laser detection and protection systems, announces European expansion with two new strategic partnerships in Romania and the Benelux region. The collaborations strengthen the company’s presence in key European defence and security markets. LASERD® detection systems Sentinel Photonics has appointed StarC4SYS as its official sales partner in Romania Sentinel Photonics has appointed StarC4SYS ...
Suprema, a pioneer in AI-powered biometric and security solutions, has been named ‘Strategic Partner of the Year’ at the SmartTech Asia Innovation Awards 2025, held in Mumbai, India on 13th Feb. The prestigious award, "Strategic Partner of the Year" highlights Suprema's excellence in Innovation & Impact, Strategic Leadership, Industry Influence, and Sustainability & Ethics. Advanced AI-driven solutions With over 20 years of experience in biometric authentication, Suprema d...
Accessia, the open cloud platform for smarter physical security and safety, announces it is to show its world-first ultra-wideband access control for enterprises at ISC West 2025. “With ultra-wideband, Accessia delivers the future of access control, enabling hands-free instant door unlock so users can walk straight through with no need to tap or swipe. ISC West is the perfect place to showcase this game-changing technology,” Mark Loney, Accessia CEO. Integrated visitor management...
News
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., has unveiled ROAMEO™ Generation 4 (Gen 4), believed to be the most advanced commercial autonomous security patrol mobile robot ever created. Built to outmatch traditional security guard patrols in every way, ROAMEO Gen 4 combines AI-powered intelligence, engagement by SARA™, 360-degree situational awareness, advanced safety features and real-time threat detection to eliminate blind spots, reduce costs, and deliver a new era of proactive security. Delivering unmatched performance “The days of inefficient, unreliable, and costly security patrols are over,” said Steve Reinharz, CEO/CTO of AITX and RAD. “ROAMEO Gen 4 is not just an improvement, it is a complete reimagination of how security patrols operate. The intelligence packed into this unit now offers features such as ‘escort me’ and ‘find my car’ to ensure it can outperform legacy solutions in almost every way. This is the security solution of the future, delivering unmatched performance and cost savings today.” ROAMEO (Rugged Observation Assistance Mobile Electronic Officer) Gen 4 is more than an upgrade, it is a transformation. Key features and advantages include: Full AI-Driven Autonomy – Operates 24/7 without breaks, distractions, or fatigue, continuously patrolling for up to 16 hours per charge. Customer Engagement Features – ROAMEO Gen 4 goes beyond security by offering interactive services such as ‘Escort Me’ and ‘Find My Car,’ ensuring a safer and more user-friendly experience for employees, visitors, and customers. Advanced Threat Detection – Uses AI-powered monitoring with LiDAR and visual analytics to detect, track, and analyse potential threats in real-time. Unmatched Navigation & Safety – Equipped with GPS-denied navigation, five solid-state 3D LiDARs, obstacle avoidance, emergency stop features, and predictive path planning. Web-Based Command & Control – Security teams can direct ROAMEO Gen 4 remotely via an intuitive interface, instantly adjusting patrol routes and receiving live alerts. Cost-Effective Security Solution – Eliminates expenses associated with wages, overtime, benefits, and liability insurance while providing a more effective security presence. Robust AI-driven detection system ROAMEO Gen 4 ensures no security gap is left unmonitored With a top patrol speed of 10mph, a 30-mile range per charge, and a robust AI-driven detection system, ROAMEO Gen 4 ensures no security gap is left unmonitored. “The numbers tell a clear story,” added Reinharz. “Tens of thousands of security guards are performing patrol functions that can be enhanced or replaced by ROAMEO Gen 4. The industry is facing increasing demands for coverage, yet labor costs and workforce shortages remain persistent challenges. ROAMEO offers an autonomous, scalable alternative that improves efficiency while reallocating human resources to more strategic roles. As demand for security continues to rise, AI-driven solutions like ROAMEO will redefine the future of patrol and surveillance.” Key deployment areas Organisations across multiple sectors are lining up to integrate ROAMEO Gen 4 into their operations. Key deployment areas include: Industrial Facilities & Warehouses – AI-driven perimeter security and real-time threat deterrence. University & Corporate Campuses – Strengthens security presence and deters vandalism. Automotive Storage & Dealership Lots – Protects valuable inventory from theft and tampering. Healthcare Campuses & Parking Structures – Creates safer environments for employees and visitors. Corporate Headquarters & Data Centers – Provides unmatched surveillance for critical infrastructure. Large-scale deployments “ROAMEO is central to our strategy to redefine security through intelligent automation,” concluded Reinharz. “Beyond innovation, it will be a revenue driver and a category leader in autonomous security. Market demand confirms the need for large-scale deployments, and each ROAMEO unit represents long-term recurring revenue for the Company. Even with 25 deployments, the financial impact will be significant. At 100 units, projected by the end of 2026, ROAMEO will be a major force in our growth and profitability. As we scale into the hundreds, it will reinforce our market leadership and accelerate our path to sustained success.” Outdated security models “This is more than just an advancement, it’s an industry shift,” said Mark Folmer, CPP, PSP, President of RAD. "We are on a mission to redefine security by delivering AI-powered, autonomous solutions that enhance safety, improve efficiency, and drive cost savings. ROAMEO Gen 4 is not waiting for the future, it is the future.” Pre-orders are now open with production ramping up starting in the summer, and live demonstrations are being scheduled. ROAMEO Gen 4 will be on display at ISC West in Las Vegas from March 31 through April 4 in RAD’s booth #21131. Security professionals and facility managers must decide: Will you lead with innovation, or stay behind with outdated security models? Mobile robotic solutions Each Fortune 500 client has the potential of making numerous reorders over time AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry[ii] through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
Genetec Inc., the pioneer in enterprise physical security software, announces the addition of intrusion management to Security Center SaaS, the company’s unified physical security solution that can be deployed in the cloud or as a hybrid solution. By unifying intrusion detection with video surveillance, access control, identity, and visitor management, Security Center SaaS now delivers a fully unified, open, cloud-managed platform supported by the Genetec Cloudlink line of appliances. Security Center SaaS will support a wide range of intrusion devices from multiple vendors, starting with Bosch intrusion panels. Unified intrusion management Automated intrusion management eliminates reliance on manual processes, reducing errors and ensuring systems are automatically armed when needed. Companies can focus on their core operations while maintaining a secure environment Operators can configure automated schedules, enforce badge-based activation, and apply first-in, last-out logic to keep facilities protected 24/7 without adding operational complexity. By integrating intrusion with business workflows, companies can focus on their core operations while maintaining a secure environment. Real-time threat verification and response Security Center SaaS intrusion management helps security teams act quickly by validating alarms in real time with video verification, which eliminates uncertainty and reduces unnecessary disruptions. When a real threat is detected, automated workflows can immediately lock doors, activate deterrents, and notify the appropriate personnel based on predefined escalation paths. By minimising false alarms and focusing on real threats, end-users can enhance their security posture while reducing the impact on daily operations, ensuring faster decision-making and more effective responses. Proactive security measures In addition to real-time detection, Security Center SaaS intrusion management provides automated reporting and dynamic system alerts to help organisations identify vulnerabilities before they become critical issues. With comprehensive event logging, organisations can ensure compliance and maintain a solid foundation for auditing. Security Center SaaS intrusion management provides automated reporting and dynamic system alerts An open approach to intrusion panel support in Security Center SaaS not only enhances security but also improves operational efficiency. By centralising intrusion event data on intuitive dashboards, teams gain real-time visibility that empowers faster, more informed decisions. This immediate access to critical information feeds into automated reporting, which tracks trends in alarms and response times, enabling teams to uncover valuable insights for continuous improvement. “Security Center SaaS continues to push the boundaries of what's possible. With the introduction of intrusion management, we are delivering on our vision of a fully unified, open, and cloud-managed platform. This empowers organisations to detect, verify, and respond to threats with greater speed and confidence," said Christian Morin, Vice President of Product Engineering at Genetec Inc. Availability and hardware support The intrusion panel feature for Security Center SaaS will be available globally in mid-2025 through the Genetec network of accredited channel partners. Built on an open architecture and supported by the Genetec Cloudlink line of multi-workload cloud-managed appliances, Security Center SaaS will support Bosch intrusion panels at launch, with plans to expand compatibility through additional technology partnerships. This open approach enables customers to choose the hardware that best fits their needs or retain their existing panels, providing a cost-effective and flexible path to modernising their physical security operations.
Integrated Access Control and Security manufacturer TDSi announces the appointment of Robert Bullen as its Distribution Sales Manager South. With a proven track record of successful business development roles in the UK security industry, Robert is bringing his expertise and experience to support TDSi’s Distribution Partners and customers across the southern region of the UK and beyond. Developing strategic partnerships Commenting on Robert’s appointment, Alex Rumsey, Sales Director UK for TDSi stated, “We were highly impressed with Robert's extensive experience across the Security market.” “Having had roles ranging from managing key accounts to developing strategic partnerships, he has great insights and a firm understanding of what security partners need in an evolving market, making him the perfect choice to deliver all the necessary support for TDSi's partners and customers.” Reliable security solutions Reflecting on the reasons for choosing his new role, Robert also commented, “I love working with the UK Distributors - and the opportunity to do this within TDSi is incredibly exciting! TDSi's reputation for innovation, along with a flexible product range and its market presence aligns perfectly with my personal career goals.” He added, “TDSi's success lies in its commitment to delivering high quality, reliable security solutions that meet the ever-evolving needs of the market. Its focus on innovation, customer service, and building strong partnerships has set it apart from the competition. Additionally, TDSi's ability to adapt to market trends and provide tailored solutions has been key to its ongoing success.” Collaborative growth focus TDSi offers a compelling Partner Programme proposition that delivers competitive pricing Although based primarily in the Southern region, Robert's role will see him travelling across different regions to meet customers and partners and to assist with project planning. This hands-on approach will enable him to maintain close support links with TDSi's partners and customers, ensuring the company has close contact with the unique needs of all parties. TDSi offers a compelling Partner Programme proposition that delivers competitive pricing, robust technical support, and free high-calibre training. With a strong brand and collaborative growth focus, TDSi is ideal for distributors looking to expand and increase their market share. Exploring new collaborations Robert has a clear vision for developing his role and further enhancing TDSi’s relationships with its distribution partners. “We are looking to further increase TDSi's market presence by deepening relationships with existing distributors and exploring new collaborations. We will leverage data insights to target new partners, expand our product range, and invest in marketing and training initiatives. I’m excited to join TDSi as the industry rapidly evolves, aiming to drive growth through strong partnerships and innovation to drive sales. I am committed to upholding TDSi's values, supporting partners, and exceeding customer expectations.”
Schlage, a pioneer in home security solutions for over a century, introduces Advanced Rekey™, an innovative rekeying solution that offers builders and their professional partners efficient key management and a simple way for homeowners to maintain security as their homes evolve. Debuting at the 2025 International Builders' Show (IBS) in Las Vegas, Advanced Rekey is designed for ease of use, giving users greater control over home security with a seamless, do-it-yourself feature that makes rekeying fast, convenient and cost-effective. Innovative rekeying solution "Schlage's Advanced Rekey solution puts the power of quickly rekeying directly into builders', their partners' and homeowners' hands," said David Perozzi, General Manager, Allegion Home. "We are excited to add this feature across all of our residential keyed mechanical and electronic products, bringing our trade professional partners additional time savings, convenience and peace of mind, while ensuring that homeowners' security can evolve as their needs change." Traditional rekeying services Advanced Rekey empowers builders and homeowners with enhanced convenience and security Backed by Schlage's limited lifetime mechanical warranty, Advanced Rekey empowers builders and homeowners with enhanced convenience and security they can control. With just one simple tool and the current working key, users can quickly and effortlessly rekey their locks without removing them from the door – eliminating the hassle and expense of traditional rekeying services and offering a new level of control over home security. Key management systems Key benefits of Schlage's Advanced Rekey Solution: Increased Efficiency: Advanced Rekey provides time savings to builders and their partners by reducing time spent on key management systems and delivering an easy handoff process from the builder to homeowner. Quick and Effortless: Advanced Rekey is designed to be user-friendly for anyone, regardless of their experience with locks. Users can easily rekey their locks in just a few simple steps, no professional skills required. This solution is ideal for lost or stolen keys, changes in homeownership or updating the whole home to be keyed alike. Enhanced Security: Maintain control of who has access to the home. Rekeying with Advanced Rekey adds an extra layer of safety with bump resistant security features. After completing the rekey process, the old key will no longer work, providing an immediate security upgrade and eliminating concerns of unauthorised access. Versatile Solution: Builders can exchange a conventional SC1 keyway cylinder on existing Schlage door locks to an Advanced Rekey cylinder. With 100,000 possible keying combinations, Advanced Rekey helps reduce the likelihood that the same keying combination is duplicated. Schlage's Advanced Rekey solution will be available to builders through their dealers and wholesale partners in late 2025. To experience Advanced Rekey firsthand, visit Booth #C2125 at the 2025 International Builders' Show in Las Vegas. Schlage is an Allegion brand.
With its latest update, Regula Document Reader SDK, a comprehensive software solution for identity document verification, ensures 100% support for the new ISO/IEC 39794-5 standard regulating the methods of facial data storage and verification in e-passport chips. According to the ICAO guidelines, all document readers and verification systems must be compatible with the new standard by 2026, with passport issuers required to fully adopt the new format by 2030. ISO/IEC 19794-5:2005 standard The ISO/IEC 39794-5 standard introduces an enhanced framework for facial image data, significantly improving interoperability, processing speed, and recognition accuracy across different identity verification (IDV) systems worldwide. Unlike the previous ISO/IEC 19794-5:2005 standard, which primarily stored a basic facial image, the new format records additional metadata, including detailed facial landmarks, precise eye and hair colour, and other biometric attributes. Why this matters The richer set of pre-stored reference points eliminates the need for separate face detection The richer set of pre-stored reference points eliminates the need for separate face detection and feature extraction during verification. Instead of calculating key facial points from scratch, IDV systems can use the pre-recorded metadata, accelerating processing times and ensuring consistent, high-quality recognition results—regardless of the local algorithm used for comparison. This standardisation guarantees that a person’s face in their passport will be consistently and accurately verified across different countries, improving global interoperability. Framework for future extensions Apart from that, the ISO/IEC 39794-5 standard implements a flexible framework for future extensions. This means that as new attributes or enhancements are introduced in the future, all systems supporting this standard will remain fully functional without requiring urgent updates—unlike the current situation, where all IDV systems would need to be updated to accommodate new data formats. Regula’s long-standing expertise Regula’s expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation Although the current ISO/IEC 19794-5:2005 will remain valid, the industry has started the transition period, and businesses worldwide should be ready to process the new format data before 2026. Regula’s long-standing expertise in secure RFID chip reading and trustworthy data verification ensured smooth adaptation to the new standard even prior to its coming into force. Identity verification systems The company’s participation in the recent testing event in Australia demonstrated its ability to correctly extract, interpret, and verify biometric facial data encoded according to ISO/IEC 39794-5. This means that identity verification systems using Regula’s software are future-proofed against compatibility issues that could arise as countries transition to the new format. Transition to the new standard Regula's IDV software is compatible with document readers on the market and can be easily used In addition, the new standard will require organisations from banks to border control to update their passport readers with software that fits this standard. Regula's IDV software is compatible with most document readers on the market and can be easily used with any device model. This implies a seamless transition to the new standard without replacing existing hardware, ensuring a cost-effective and hassle-free upgrade. Efficiency in biometric verification “The shift to ISO/IEC 39794-5 is a major step forward in improving compatibility and efficiency in biometric verification. With more detailed metadata now embedded in e-passports, identity verification systems can achieve faster processing and more accurate recognition results." "Our expertise in RFID chip processing ensures that Regula’s technology is already fully equipped to support this transition, providing organisations with seamless, future-proof solutions that help them stay in line with regulatory changes,” says Ihar Kliashchou, Chief Technology Officer at Regula.
LifeSafety Power’s B150 Intelligent Step-Down Converter provides economical remote power management, monitoring and control of enterprise power solutions. The B150 dual-voltage conversion modules offer an additional voltage in a FlexPower Unified Power Solution® by converting a higher input voltage to a lower output. LifeSafety Power NetLink® Now, every part of LifeSafety Power’s FlexPower series yields managed power capabilities in a single enclosure with RS485 communications and when paired with LifeSafety Power NetLink® technology. The B150 is jumper selectable for a fixed 12VDC or an adjustable, user-defined range between 3-18VDC at 6 amps maximum current. An on-board LED display provides status updates on output voltage, current and input power. Remote power cycling and programming Combined with NetLink-managed power technology, users receive notifications of power fault or voltage drops and can also perform remote power cycling and programming. The B150 allows for quick, onsite power adjustments for system components with unique needs, such as access control readers, security cameras, lighting, wireless and IT devices and components.


Expert commentary
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialised skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organised theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilised the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilise security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasising the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organisations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualisation, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organisations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organisations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialised knowledge in data visualisation and metrics analysis will ensure that this technology is utilised effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analysing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralised view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organisation. When security can proactively provide solutions and effectively address risks that arise in all corners of the organisation, it becomes the cornerstone of overall organisational safety. Modern security approaches This collaborative environment will empower the organisation to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organisation to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organisations in an ever-shifting environment.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
Video wall systems installed by Ultimate Visual Solutions (UVS) at a major transport and security hub in the Midlands are approaching 50,000 hours of continuous 24/7 operation. UVS supplied and installed all equipment via its systems integrator partner TIS, which specialises in driving digital transformation and integration across the life safety, security and communications industry. Driving digital transformation The Transport for West Midlands Regional Transport Coordination Centre (RTCC) in Birmingham uses live data feeds and CCTV to monitor the transport network. It helps manage disruptions and is a hub for Transport for West Midlands, transport operators, emergency services and local authorities and played a key role in monitoring traffic and keeping people safe during the 2022 Commonwealth Games in Birmingham. Additional data sources In 2019, UVS installed 6x3 and 4x2 screen LCD video walls in the RTCC In 2019, UVS installed 6x3 and 4x2 screen LCD video walls in the RTCC. Both were supplied with a UVS Lucidity WBC video wall controller to allow the display of multiple IP CCTV feeds from around the region, in addition to multiple workstation inputs and web pages as additional data sources. UVS included a 65-inch interactive touch table integrated to RTCC sources and to the Lucidity video wall solutions, allowing data from the touch table to be displayed on the video wall. It also allows people to collaborate around the table and share data from various sources, in addition to controlling the video wall whilst there. Disaster recovery site UVS also included a desk mounted touch screen controller that allows fast launching of preset video wall layouts when needed for specific urgent incidents. In 2022 UVS added a third 4x2 video wall at the RTCC site, fed from one of the existing Lucidity controllers, which was expanded to deal with the additional outputs and inputs. Control of this remote video wall was provided via a Lucidity controller connected back to the RTCC At the same time, an identical 4x2 video wall was installed at a disaster recovery site approximately 15 miles from the RTCC site. This remote video wall is connected to the same outputs as the one at the RTCC, via HDMI-IP encoders. Control of this remote video wall was provided via a Lucidity controller connected back to the RTCC. Annual support contracts UVS Managing Director Steve Murphy said: “We are fortunate to have a great relationship with TIS which has enabled us to work together and with the client to provide a solution which has met their exact requirements and which is now on the verge of reaching 50,000 hours of continuous use in an environment where reliable 24/7 operation is vital.” “From the outset of the initial planning stages for the project, the client, TIS and UVS were also committed to system lifetime support. This consisted of annual support contracts for all technology by the TIS support team, with UVS providing a support contract for the complete video wall systems and accessories.” Complete video wall systems “This has ensured maximum operational uptime and efficiency and reassurance that all firmware and software updates and upgrades are provided on a regular basis, with priority support provided for any reported issues.” UVS, based in the Burnley First – Burnley Business Centre, is led by four senior colleagues who, between them, have more than 90 years’ combined Audio Visual, Control Room and Visual Solutions experience.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation, announces that the Northeastern School District (NESD) in York County, Pennsylvania has adopted ZeroEyes' AI gun detection and intelligent situational analysis solution. This proactive step will help protect students, staff, and visitors from gun-related threats. The cutting-edge security system identifies firearms in real-time and delivers actionable intelligence to first responders. Extensive security cameras Gun-related violence continues to be a pressing issue in the United States. Data from the ZeroEyes Gun Violence Research Center shows that 35.9% of shootings analysed in Pennsylvania occurred on K-12 school campuses. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts NESD’s existing security measures include two full-time school resource officers and extensive security cameras. Additionally, the district is transitioning to electronic key card access for all doors, replacing traditional hard keys, and is reviewing remote lockdown capabilities and mass internal notification systems. ZeroEyes’ technology will serve as a key additional layer of security to enhance these efforts. Mass internal notification systems "A colleague introduced us to ZeroEyes, and we were immediately impressed by the potential of their AI gun detection technology," said Dr. Jason Bottiglieri, Superintendent of NESD. "When we learned about the Pennsylvania Commission on Crime and Delinquency (PCCD) grant, which focuses on enhancing school safety in Central Pennsylvania, we saw an opportunity to bring this critical solution to our district.” NESD is a midsized, suburban public school district located in the South Central region of Pennsylvania. NESD comprises eight buildings, including four elementary schools, two intermediate schools, one middle school, and one high school. The district serves over 4,000 students and employs approximately 300 teachers and 500-600 staff members. Law enforcement veterans If these experts determine the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. Cutting-edge technology "It’s inspiring to see schools like NESD take decisive action to enhance campus security,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thrilled to support their mission to protect students, faculty, and staff. Our collaboration reflects a shared commitment to leveraging cutting-edge technology to help mitigate potential tragedies and save lives."
Victoria University City Tower is the largest vertical campus in Australia, consolidating all of the University’s operations and campuses in the CBD into one location. The 32-level building brings together select universities and TAFE courses located in the CBD. Courses include business, education and English, but also trades such as health and beauty. EQUANS were engaged as the audio-visual integrator for this construction project, supplying and installing multiple audio-visual systems throughout the campus. Video conference equipment EQUANS worked closely with Victoria University to deliver the audio-visual systems throughout the educational high rise. Meeting rooms, open area presentations, council rooms, teaching and learning rooms, simulation labs, spa, salon and hairdressing rooms and staff areas deployed Crestron video conference equipment as specified by the client. Utilising Crestron allowed EQUANS to deliver Fusion server integration, a smart system to communicate all communication and data requests and their status to the building manager in real time. This enables live updates on system performance, allowing the client and EQUANS to easily troubleshoot, remotely access the information and monitor equipment energy usage and adjust accordingly. Pre-commissioning field equipment To increase the efficiency of the build onsite, much of the work was done offsite In addition, the rollout of the unified Crestron video conferencing systems throughout the buildings provides a premium user experience for educators and students, ensuring they have a familiar user experience throughout the whole building. EQUANS forecasted COVID-19-related delays, mainly due to site restrictions and industry-wide equipment shortages. To increase the efficiency of the build onsite, much of the work was done offsite. This included scheduling equipment prior to build to ensure availability, pre-commissioning field equipment, and offsite system recommissioning including rack builds. Unified audio-visual systems Not only enabled these measures the project to be on time, but also within budget. Zero defects were found during the witness test after installation onsite, allowing EQUANS to confidently hand over the systems to Victoria University. Victoria University now boosts the latest audio visual systems, integrated into their state-of-the art educational facility. EQUANS is proud to be Victoria University’s long-standing audio-visual partner, delivering diverse audio-visual systems throughout the facility, catering to the unique requirements of each room type. Victoria University City Tower is now ready to welcome students and educators to learn and collaborate via unified audio-visual systems.
The Ballarat GovHub is a new, unique multi-use government building housing up to 1,000 employees from various departments across five storeys of high-quality office space in the heart of Ballarat. The development aims to support the revitalisation of the Ballarat Central Business District by generating growth and to attract private sector investment. EQUANS were engaged to deliver audio visual technology solutions to meet a performance-based specification. The Ballarat GovHub includes over 50 spaces consisting of meeting rooms, training rooms, collaboration spaces and multi-function rooms. Enhancing user productivity EQUANS were engaged to finalise the system designs and work with the builder and stakeholders to ensure the multiple spaces were fit for purpose. This ensured that the multiple divisions that used the spaces were able to easily connect, share and collaborate on their projects. The deployed technology includes Sennheiser Speechline wireless systems, Hitachi and Crestron video conferencing capabilities to enhance user productivity and support hybrid work. Wireless presentation systems The solution includes user friendly plug and play technology, simplifying operation of the different stakeholders As the Ballarat GovHub houses many different government departments, the audio visual system needed to cater and support Bring-Your-Own-Device (BYOD) applications for different teams and departments. The solution includes user friendly plug and play technology, simplifying operation of the different stakeholders, and creating a basic know-how on how to operate the equipment. The installed technology features wireless presentation systems, interactivity and Crestron Flex video conferencing capabilities for easy, reliable and effective collaboration. To reduce power consumption, motion sensors were installed to ensure shut down of the systems when not in use. In addition, the design and equipment were carefully chosen and standardised to ensure a familiar and consistent user experience across multiple levels of the building and across multiple government sites. Featuring seamless audio visual Delivering an aesthetically pleasing and functional fit-out, EQUANS are proud to have been the chosen integrator for the audio visual solution to the Ballarat GovHub, the building that bridges a gap between the local community and government activity. The rare multi-storey mass timber structure, which is the largest timber-built office building in Victoria, now features seamless audio visual throughout the $100m building. EQUANS were instrumental in delivering technology to achieve the vision of creating an engaging and collaborative environment for the local precinct.
The Woodside Building for Technology and Design is the first landmark building under the ‘Better Teaching, Better Learning’ program at Monash University, Clayton. The design makes it one of the most efficient and innovative teaching buildings of its type in the world, with an abundance of natural light and solar energy as its primary energy source. The 5-storey building houses more than 30 learning spaces, including interactive, tiered collaborative spaces, accommodating up to 360 people. EQUANS was engaged to deliver an efficient, effective AV solution that maximised learning, while delivering a low energy footprint. Primary energy source They chose world-class, 4k resolution SiliconCore LED screens for the seven lecture theatres because they are bright enough to deliver exceptional clarity in the open and light-flooded spaces. All the technology has a power-saving setup that automatically shuts it down when not in use It was a feat of engineering to hang the 6m x 3.6m screens from the ceiling at the optimal learning angle of 5 degrees and the result is both effective and impressive. They also installed state-of-the-art adaptive pillar speakers for crystal clear sound in the vast spaces and Cisco video conference systems to support online learning. All the technology has a power-saving setup that automatically shuts it down when not in use. Low-carbon educational facilities Delivering state-of-the-art, low-carbon educational facilities is a vision that EQUANS is proud to help Monash University bring to life. Research has shown that learning is 30% better in natural light, but traditional projectors do not perform under those conditions. The dual 4K LED screens are perfect for sharing detailed visuals like high resolution CAD diagrams and electronic circuits to a room full of engineering students. They’re proud to have delivered state of the art audio visual technology for an educational facility, enabling an interdisciplinary, interactive learning environment that allows students to collaborate, design and learn.
The Four Seasons Hotel Sydney Energy Efficiency Upgrade (BOOT Scheme) comprised the upgrade of the hotel’s mechanical plant room that dated back to 1981 – when the landmark hotel was built – with modern, energy-efficient equipment and systems delivered via a ‘Build, Own, Operate and Transfer’ (BOOT) scheme. EQUANS designed, built, and now own the upgraded plant room, which they will operate and maintain for 12 years. At the end of the term, the client will obtain ownership of a well-maintained, optimised plant room. Guaranteed energy savings The solution comprises the design and delivery of a facility upgrade, ongoing operation with full equipment warranty, delivering 100% operational availability and guaranteed energy savings to the client. 2 x 900kW Quantum Chillers utilising magnetic bearing, oil-free Turbocor compressors Heat recovery from the chillers via the condenser water loop 2 x Rendamax fully condensing boilers for Heating Hot Water and Domestic Hot Water, controlled at independent set points for maximum efficiency Kamstrup Ultrasonic Thermal Energy Metres to monitor, control and measure the hotel’s secondary energy demand and consumption Existing fibreglass cooling towers were refurbished with all-new fill and fans Side stream filtration was installed on the condenser water system to minimise the amount of chemicals required The entire building BMS was upgraded including central plant optimisation and energy management system Energy management system The two chillers were reportedly the world’s first magnetic bearing screw chillers of this capacity and length to be loaded via a goods lift, saving a huge cost for cranage in Sydney’s CBD. The innovative chiller design allowed the evaporator and condenser vessels to be transported in the lift, without the need for split vessels, removing the risk of costly repairs for leaking gaskets during the life of the chillers. Results indicate a saving of 23% in electricity within the first two months of operation, which is expected to increase to 26% per annum once system optimisation is complete.


Products


Round table discussion
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages of AI and machine learning (ML) also include automating repetitive tasks, analysing vast amounts of data, and minimising human error. But how do these benefits apply to the physical security industry, and is there a downside? We asked this week’s Expert Panel Roundtable: What are the benefits, and drawbacks, of using artificial intelligence (AI) in physical security?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
White papers

A guide to specifying RFID readers
Download
Attention OEMs: 5 ways RFID readers can secure your markets
Download
5 reasons to integrate mobile technology into your security solution
Download
Automatic vehicle identification: State of the industry 2020
Download
11 considerations for embedded system RFID readers
Download
RFID and smartphone readers in physical access control
Download
Is your access control as effective as you think?
Download
What are the security technology needs of the hotel sector?
Download
9 Opportunities To Upgrade Your Access Control Technology
Download

Videos
Radio frequency Identification: Manufacturers & Suppliers
- CIVINTEC Radio frequency Identification
- Anviz Radio frequency Identification
- ASSA ABLOY - Aperio® Radio frequency Identification
- HID Radio frequency Identification
- MOBOTIX Radio frequency Identification
- ASSA ABLOY Radio frequency Identification
- Suprema Radio frequency Identification
- SALTO Radio frequency Identification
- Climax Technology Radio frequency Identification
- ELATEC Radio frequency Identification
- Codelocks Radio frequency Identification
- Brivo Systems Radio frequency Identification
- Dahua Technology Radio frequency Identification
- Bosch Radio frequency Identification
- Paxton Access Radio frequency Identification

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download