Remote security
TeamViewer, a renowned global provider of remote connectivity and workplace digitalisation solutions, announced the integration of its technology into Sony BRAVIA Professional Displays. This strategic implementation is designed to improve the maintenance and incident response capabilities of managed commercial displays used in complex environments, such as restaurants, shopping malls, and airports. As a result, TeamViewer and Sony customers can improve efficiency and increase sustainability in...
SailPoint Technologies, Inc., a pioneer in unified identity security for enterprises, unveiled a series of new features and capabilities in its Data Access Security and Non-Employee Risk Management offerings within SailPoint Identity Security Cloud. Updates to these add-on capabilities offer customers increased visibility and security across all varieties of identity types and their access to critical data, enabling a strong enterprise-class identity security programme. Data Access Security D...
Blackline Safety Corp., a global pioneer in connected safety technology, announced its largest contract to date – an $8.5 million deal to protect 1,025 workers at a major North American midstream company. 1,025 G7 wearable devices The contract expands the company’s original $3.5 million deal with Blackline, announced in September 2023 to protect more than 850 workers. Combined with the previous deal, Blackline devices protect all of the company’s nearly 2,000 field and site w...
Over one-third (35 percent) of Chief Information Security Officers (CISOs) admit to ignoring the National Cyber Security Centre’s (NCSC’s) cybersecurity guidance. This finding and others were revealed in a new survey and report from Absolute Security, a global pioneer in enterprise cyber resilience. Cyber Resilience Report 2024 This finding was despite 48 percent of respondents revealing that their organisation was hit by a ransomware attack over the past year. The NCSC has issued...
Elmo Motion Control, a global technology major in motion control solutions, will present its latest innovations at SPS Italia 2024, in Hall 5, Booth #F-043. SPS (Smart Production Solutions) Italia will take place from May 28 to 30, 2024, at the Parma Fairgrounds in Parma, Italy. For 12 years, SPS Italia has been a collective point of reference for the Italian manufacturing sector. Platinum line of servo drives Elmo is proudly showcasing the Platinum line of servo drives, including Full Certif...
A wider group of customers can now experience the benefits of Dicentis Hybrid Meetings with the latest rollout of this cloud-hosted end-to-end hybrid conference solution. The technology update is part of an ongoing mission of Bosch Building Technologies to meet the rapidly evolving needs of the modern professional conferencing environment. Hybrid meeting environment Dicentis Hybrid Meetings is a fully native end-to-end solution that ticks all the boxes for highly efficient, legally compliant...
News
In an industry-first, Safetrust provisions employee and visitor badges directly into Apple Wallet via an email link or text message, eliminating the need to download an application. This innovative app-free approach ensures a seamless experience for people requiring access to buildings or enterprise IT systems, whether visitors, contractors, or employees. It enables the deployment of mobile credentials in minutes rather than months. Universally compatible credentials “A major barrier to adopting mobile phones for building access has been requiring people to download multiple apps on their iPhones to enter different buildings with various hardware providers,” explained Jason Hart, CEO and Founder of Safetrust. “This app download insanity has increased complexity and costs, resulting in a poor user experience." "Safetrust addresses this challenge by enabling the direct push of physical access credentials into the Apple Wallet via text message or email links, streamlining the user experience. Safetrust’s use of universally compatible credentials across multiple hardware vendors significantly reduces adoption costs for organisations.” Operational support and InfoSec Removing the need for mobile applications eliminates the expenses associated with developing Removing the need for mobile applications eliminates the expenses associated with developing, maintaining, and certifying new applications for credential provisioning. Operational support and InfoSec become much simpler when users are not required to install additional software on their mobile devices for credential provisioning. Security and policy compliance Employee and visitor badges stored in Apple Wallet possess the same high security and policy compliance levels. This includes features such as support for biometric authentication via Face ID and Touch ID, utilisation of the Apple Secure Element even in low-power situations, remote revocation of credentials, and compatibility with external biometric-on-card solutions, among other functionalities. Safetrust’s over-the-air provisioning solution supports a range of functionalities, including full-time and time-limited credentials, visitor and contractor scheduling with start and expiry times, and enterprise login with FIDO2 credentials, ensuring flexibility and security.
Newly launched Pinnacle Systems is making its debut at The Security Event 2024, to showcase its pioneering ‘industry-first’ end-to-end, truly independent integration platform. Remote monitoring and control Sharing stand 5/H20 with intelligent video software specialist, Network Optix, Pinnacle Systems will present opportunities for open integration and its capability as an on-site and remote monitoring and control solution. Visitors to the stand will experience live demonstrations of Pinnacle Systems with installers and integrators able to see how to provide a bespoke security solution. Presenting designers with complete control over hardware choices within their security ecosystems. Centralised platform Says Ric Martin, CEO of Pinnacle Systems, “Coming new to the market, we are thrilled to be at The Security Event 2024, and introduce our ability to offer a truly independent centralised platform." "Visitors to the stand will see for themselves the extensive choice and flexibility we can provide, adapting to the ever-changing demands of our market." User-friendly interface “We are also conscious of simplifying the installation process, to enable more installers the chance to benefit from the array of fantastic smart security products available." "We can demonstrate the user-friendly interface we have created and the intuitive set-up, all ensuring a quick and efficient turnaround, allowing installers to present a positive customer experience.” Sector-specific environment solutions Central to Pinnacle Systems is a dedication to listening to integrators and end-users Pinnacle Systems’ team will be able to highlight the ability to offer both on-site and remote control and monitoring of integrated solutions, regardless of the manufacturer. Central to Pinnacle Systems is a dedication to listening to integrators and end-users. By staying attentive to market trends and advancements like AI and Machine Learning, solutions can be created that adjust to sector-specific environments. Design and specification Ric concludes, “Previously, integration was only available from a single manufacturer, so opening up the possibilities to all is a genuine game-changer for the market. At The Security Event, we can’t wait to identify new opportunities for Pinnacle Systems and have very open discussions, where we can listen intently to both our industry and wider sector requirements, being proactive to meet demands." "Coming together in design and specification, we can ensure peace of mind, and monitored security at a time when it is needed most.” Pinnacle Systems will be on stand 5/H20 at The Security Event, from 30 April to 2 May 2024 at the NEC Birmingham.
Hanwha Vision, the global vision solution provider, has appointed John Lutz Boorman to lead Product and Marketing across Europe from its regional HQ in the UK. John has vast knowledge and expertise in the security industry, with more than 30 years of experience working across business development, sales, product, and marketing for distribution and manufacturing companies. John's new responsibilities John Lutz Boorman has deep technical knowledge of security and industry best practices, including video surveillance, access control, and intruder systems. In his new role, John will lead the product, solutions, and marketing roadmap for Europe, ensuring that Hanwha Vision continues to deliver high-quality video surveillance solutions - for which it is known- to customers. Product and Marketing John will set the product and marketing direction, heading the team and activities across the region As Head of Product and Marketing and based in the UK, he will set the product and marketing direction, heading the team and activities across the region. Jeff (Chae Won) Lee, Hanwha Vision Europe’s Managing Director, said, “We are so pleased to welcome John as Head of Product and Marketing for Europe." Jeff's comment Jeff (Chae Won) Lee adds, "John has decades of experience in delivering impactful projects in the security industry, with impressive product, sales, and marketing knowledge." He continues, "As Hanwha Vision continues to accelerate across Europe, John will play an important role in ensuring we continue to go above and beyond for our customers.” Cost-effective offerings “I am thrilled to join the Hanwha Vision team as Head of Product and Marketing for Europe,” said John Lutz Boorman. He adds, “The company is highly respected and takes a truly innovative approach to product and marketing, with multi-tier and cost-effective offerings that suit a wide variety of applications and industries. I am excited to continue elevating product and marketing, connecting with our customers to deliver exceptional solutions.”
Verkada, a pioneer in cloud-based physical security solutions announced that Eric Salava has joined the company as its Chief Revenue Officer. Salava will lead Verkada's global go-to-market and revenue generation strategy as the company continues to scale rapidly. "Our growth to date has been incredible: our platform supports more than 1 million active devices for 22,000 customers across 70 countries," said Filip Kaliszan, CEO and Co-Founder of Verkada, adding "With Eric at the helm of our go-to-market strategy, we are well-positioned for the next chapter of Verkada's expansion." Eric Salava's experience Eric Salava brings decades of experience scaling global commercial operations and joins Verkada from Conga, where he served as Chief Revenue Officer, overseeing its global go-to-market strategy and sales organisation. Before Conga, Salava was Executive Vice President of North America, Asia Pacific & Japan Sales and Operations at Informatica, and also led sales and operations functions at Oracle and BEA Systems. Making safe communities "Verkada's platform helps protect millions of people across the world," said Eric Salava, adding "I can't think of a more important – or needed – organisation to scale globally today. I am thrilled to build on its already incredible momentum and make even more communities safer." Verkada's milestones Eric Salava's appointment comes on the heels of many growth milestones for the company. Most recently, Verkada: Accelerated its expansion in Asia with the opening of its ASEAN HQ, in Singapore. Launched its new connectivity solution, the GC31 Cellular Gateway, that will enable device deployment in hard-to-wire or remote locations. Announced its Federal Advisory Board, which will be integral as the company works to include more of its products in its FedRAMP offering.
Pyronix proudly announces the update of its renowned EURO 46, introducing the EURO 76 product line, marking an important progression in the company’s commitment to delivering customer-focused solutions that reliably address ever-evolving security needs. EURO 76 Laurence Kenny, Marketing Director, said, “The EURO 76 retains all the innovative features that made its predecessor a standout in the security industry." He adds, "With its hybrid capabilities, the EURO 76 seamlessly integrates both wired and wireless technologies, offering unparalleled flexibility in security system installations.” out-of-the-box capabilities Laurence Kenny continues, “We are proud of the fact that our supply chain and stock availability are industry-pioneering, working closely with our key distribution partners. We ensure that our valued installers have the product they need when they need it.” He states, “The EURO 76’s position in the market with a large zone count, superior out-of-the-box capabilities, and an extremely competitive price point, offers installers the perfect solution for their hybrid installations.” Communication devices, expanders, keypads, and readers The panel's 76 zones and 6 areas allow users extensive customisation possibilities The EURO range includes a wide variety of communications devices, expanders, keypads, and readers to suit any installation, alongside Grade 2 and Grade 3 options, which allows the EURO 76 to adapt to diverse security requirements with ease. The panel's 76 zones and 6 areas allow users extensive customisation possibilities, ensuring comprehensive coverage of large residential properties or a variety of commercial installation use cases. Wireless capabilities Coupled with the wireless capabilities of the panel, installers can easily add the award-winning Enforcer range to the system, simplifying takeovers or expanding systems on maintenance visits with additional wireless contacts, PIRs, or the award-winning CarDefender. “With InSite UDL software, installers can also save time and money with remote programming and diagnostics. This software also facilitates the remote execution of one of the compulsory annual system maintenances, using ARM (Automatic Remote Maintenance),” said Laurence Kenny. Smooth integration Pyronix apps provide a comprehensive connection for remote control, real-time monitoring, notifications The control panel's IP readiness ensures smooth integration with modern networks, delivering convenience and accessibility for users, alongside connectivity with Pyronix's range of smartphone apps, integrating cameras, smart home devices, and security systems on one platform. Pyronix apps provide a comprehensive connection for remote control, real-time monitoring, notifications, and more. Advancing security technology Laurence Kenny continues, “The introduction of the EURO 76 range underscores the dedication Pyronix has to advance security technology and exceeding customer expectations." He adds, "As a company at the forefront of innovation, Pyronix continues to provide evolving solutions that empower installers and users to protect what matters most.” The EURO 76 is available to purchase in distribution.
PACOM, a pioneering provider of access control and integrated security management solutions, will preview VIGIL CORE, its next-generation cutting-edge cloud-based platform at The Security Event 2024. This solution is a centrally controlled integrated security management platform that is intelligent, user-friendly and highly cost-effective and will prove to be a great fit for customers with single sites, hundreds of sites or large campus environments. Security integration management The culmination of a significant program of research and development, the solution has been designed to redefine what’s possible in seamless security integration management, without any legacy restrictions, utilising existing in-house and third-party products on the cloud. It also extends its functionality beyond security by acting as an interface with the Internet of Things (IoT). By accessing, storing and processing data from the smart IoT sensors found in intrusion detection, access control, audio, video and building management systems, it is able to deliver valuable business intelligence, operational insights and efficiencies. VAR community VIGIL CORE Simplicity of the platform stops the need for complex server infrastructure and specialised skills For the VAR community VIGIL CORE provides cost-effective SaaS deployment, enabling them to elevate their businesses by creating long-standing relationships with their customers and protecting their recurring monthly revenues. The simplicity of the platform eliminates the need for complex server infrastructure and specialised skills to configure on-prem servers, pioneering to cost savings in installation time and staff training. By offering more than just security, it provides complete control over the entire building services ecosystem and can scale up and down as required. It provides existing PACOM users with an opportunity to migrate to the solution quickly and easily via a sustainable upgrade path that can be implemented based on the client’s schedule. This makes it perfect for applications such as banking and finance, as well as other verticals such as logistics and warehousing, commercial, cell towers, critical infrastructure and multi-site retail locations. Impact on the security industry Users can view live and playback video from cloud cameras, bookmark cameras for quick access The cloud is having a huge impact on the security industry, with end users now able to harness the power, flexibility and functionality it facilitates. This solution is fully cloud-enabled and a fully customisable dashboard can be accessed via any internet-connected desktop PC or smartphone. Users can view live and playback video from cloud cameras, bookmark cameras for quick and easy access from the main dashboard, check camera health status, set profiles and permissions, assign credentials, set rules, export footage clips, and arm or disarm devices – anytime, anyplace, anywhere. It can also be set up as a purely on-premise solution or even in a hybrid configuration that offers the best of both worlds. Variety of building services “We’re tremendously excited about VIGIL CORE and its ability to integrate a variety of building services over one integrated security management platform,” said Richard Joslin, Senior Director, Global Sales. “PACOM is working to lead the way in the design, manufacture and installation of cutting-edge security systems and we are looking forward to welcoming visitors to our stand so we can explain more about how we are able to transform the operational effectiveness of a diverse range of built environments.”
Expert commentary
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Case studies
San Luis Obispo (SLO), the gem of California's central coast, is renowned for its picturesque vineyards, historic architecture, and vibrant community life. Quiet but lively, it is also home to the California Polytechnic State University, located halfway between San Francisco and Los Angeles. Ensuring safety and security Because of its distance from major metropolitan areas, SLO has retained its rural, small-town character, along with a bustling downtown and beautifully preserved Spanish Mission. The San Luis Obispo Police Department (SLOPD) is focused on ensuring safety and security across expansive terrains, reducing crime, and enhancing the quality of life while upholding the principles of service and integrity. The challenge The secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins For San Luis Obispo, two priorities were crime prevention and the protection of sprawling outdoor spaces popular for hiking and biking. Hidden from public view, the secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins. However, its remote nature made installing a traditional security system nearly impossible. The initial cost to secure three city parking structures was also cost-prohibitive, with quotes of over $1 million for network connectivity alone. Need for a robust and reliable solution "We've dealt with products that were essentially consumer-grade equipment repackaged as professional security solutions,” said Chad Pfarr, Administrative Lieutenant. "We needed a more robust and reliable solution. Creating our own was time-consuming and beyond our expertise, highlighting the need for a specialised, cost-effective solution.” Why Verkada A system that could operate in remote locations, areas typically beyond the reach of standard CCTV “We were drawn to the hardware and software quality. But what truly set Verkada apart was the willingness to innovate in ways that traditional security solutions did not. We can now bring Verkada devices into the wild, in the middle of nowhere, without traditional city network infrastructure." A system that could operate in remote locations, areas typically beyond the reach of standard CCTV technology was a leap forward for community safety. Use cases include: Protecting remote locations with the GC31 Cellular Gateway. Licence Plate Recognition (LPR) monitoring to streamline vehicle investigations. Protecting evidence in cold storage with Air Quality Sensors. Improving check-in and registrant compliance with Workplace solutions. "Verkada's willingness to venture into uncharted territory with us to ensure security systems could be deployed where they were most needed, regardless of existing connectivity, was what got us so excited. Beyond just adapting to what’s available, it’s continuously improving to meet our needs." Protecting remote locations with the cellular gateway In San Luis Obispo, the GC31 Cellular Gateway bridges the gap between the need for remote security and limited infrastructure. The police department protects areas previously deemed inaccessible without the high costs of traditional network installations, leading to savings of over $1 million for connectivity alone. Bridging the connectivity gap "Before Verkada, the idea of installing a security system in remote locations was a logistical nightmare. The cost of establishing connectivity alone was prohibitive, not to mention the technical hurdles of operating without power or a network." "But with the Cellular Gateway, we've been able to overcome these barriers, bringing security and peace of mind to once vulnerable areas." Licence Plate Recognition (LPR) capabilities SLOPD can install Verkada products in locations that are hard to wire or lack connectivity SLOPD can install Verkada products in locations that are hard to wire or lack connectivity, such as parking lots, construction sites, trailheads, and natural terrain. Within the city, the GC31 also protects busy intersections by supporting cameras with Licence Plate Recognition (LPR) capabilities. Streamline vehicle investigations Paired with the cellular gateway, CB62 outdoor bullet cameras are deployed on streetlight poles to monitor moving traffic, covering up to three lanes with a single camera. Using Verkada’s edge-based processing and computer vision technology, the LPR solution captures licence plates at speeds of up to 80 mph (128 kph). Flexibility and versatility The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics to each location. This includes monitoring busy intersections, remote trailheads, or railroad crossings. This flexibility is crucial in a community that values its open spaces and balances accessibility with safety. "We've not only deterred potential criminal activities but also enhanced the overall safety for residents and visitors alike. The ability to monitor these areas remotely has been a game-changer, allowing us to extend our reach without stretching our resources too thin." Protecting evidence in cold storage with air quality sensors The introduction of Verkada's air quality sensors into the SLPD’s evidence management protocol has marked a significant improvement in securing critical evidence that requires refrigeration. “Sensors protect the evidence entrusted to us." "They monitor the conditions within our cold storage facilities in real-time, ensuring that any deviation from the norm is immediately flagged. This allows us to act swiftly to address any issues before they impact the evidence.” Sensors mitigate the risk of loss and help maintain the overall integrity of the evidence, which is crucial for the judicial process. Ensuring that evidence is stored under optimal conditions preserves its validity and reliability, which can be decisive in court cases. Guest and Workplace Solutions Verkada Guest supports security and compliance as well as administrative processes At the police department, Verkada Guest supports security and compliance as well as administrative processes and community interactions. "We're not just looking at improving how we manage security systems; we're also opening up opportunities to better serve our community in every interaction they have with us. This is about making our department more accessible, efficient, and responsive to the needs of San Luis Obispo.” Automated notification "Registrants can sign in digitally, similar to the check-in process at a doctor's office. This system automatically notifies the assigned detective, who can then prepare before meeting the registrant." "It's a welcome shift from our current, more manual process, and we're excited about the potential to make our operations more efficient while improving the experience for everyone involved.” Digitisation of visitor check-in The registration of certain types of visitors is a legal requirement that, until now, has placed a burden The registration of certain types of visitors is a legal requirement that, until now, has placed a burden on the department's space and resources. By digitising the initial check-in and form completion process, the department can handle sensitive registrations with greater discretion and efficiency. "We can integrate specific forms and requirements into the Guest system." Minimising congestion "This customisation ensures that we can maintain legal compliance while respecting the needs of our community and the constraints we operate under." "Guest reduces wait times, frees up essential space in the lobby, and minimises the congestion that can occur during peak registration periods.” Solar and Battery SLOPD is also exploring alternate power options to enable more deployments across San Luis Obispo, further ensuring the safety and security of their community. "Our partnership with Verkada has already improved our operations. The next step involves incorporating solar and battery backup systems for our cameras and bridge devices. This will not only expand our public safety reach but also ensure that our security measures are sustainable and resilient against power outages."
Pears Jewish Campus is a seven-story education and culture complex that covers over 80,000 square feet, in Westfälische Strasse, Berlin, Germany. The building was designed by renowned architectural firm Tchoban Voss and constructed over a five-year period. It is the largest Jewish campus in Europe, encompassing a kindergarten, primary, and secondary school, a cinema, sports and events halls, art and music studios, co-working office spaces, as well as a kosher restaurant. Paxton’s latest system Paxton10 has been installed to secure the building with sophisticated access control, remote-site management, and flexible access permissions. Requirements Security is of the utmost importance for the safety and protection of young students, teachers and professionals working within the campus, given the anti-Semitic incidents. This prompted the development of a comprehensive security concept with enhanced capabilities, including the need for full-lockdown functionality and checkpoints with weapon detection. Due to the increased level of security needed, Peter Gräf, Managing Director of GRAEF Systemtechnik GmbH, was contracted to oversee the installation and technical aspects of the new security system. Systemtechnik is a group of companies with an arm that specialises in securing high-footfall public sector buildings. Systemtechnik is a level of firms with an arm that specialises in tying high-footfall public sector buildings Peter established that this was a project far beyond the normal requirements. He explains: “Every security measure on the campus had to be designed to recognise and ward off potential threats at an early stage and create a safe yet welcoming environment. The system also needs the ability to convert into manual operation and shut down all electronic keypads from sunset on Fridays to sunset on Saturdays for Shabbat, the Jewish day of rest.” For ease of use, the campus managers need web-based remote site management software and a straightforward way to connect across multiple buildings in various locations. Peter continues: “It is a large site and running cables across it would be a challenge. Having a system that links wirelessly is the simplest and most cost-effective solution. Additionally, there are many people requiring varying levels of access permissions throughout the week. Therefore, it is especially important to be able to implement simple measures to allow access to certain areas at certain times by using electronic tokens that can be issued remotely.” All these requirements coincide with the fact that the system needs long-term scalability, and the design of the hardware used had to meet the expectations of award-winning German architect and artist Sergei Tchoban, who designed the building. Solution To achieve the enhanced security needs of the campus, Peter recommended Paxton10, access control and video management on one simple platform. This was due to multi-site functionality and flexible software configuration, and no requirement for a VPN. It works utilising cloud technology and a Paxton10 server. He explains: “Paxton 10 is easy to specify and install. The modern software is extremely customisable with easily programmable rules and can manage multiple sites remotely with the web software or the Paxton Connect app. Also, the mix of storing data on premises and in the cloud made it ideal for this high-security project.” Peter recommended Paxton10, access control and video management on one simple platform Paxton10 has been installed on 20 main doors across the campus and on turnstiles that form weapon-detecting checkpoints. The system has also been integrated with anti-terror software that locks down the site, meaning no one can enter or leave once initiated. The current setup leaves the building managers with plenty of room to scale the system up, as Paxton10 can manage 1,000 doors, and 50,000 users from a single Paxton10 server. PaxLock wireless door handles have been installed on office doors and employee wellbeing areas. Authorised users can gain access with traditional fobs or more modern smart credentials which are sent through the Paxton10 software to an end-user's smart device, and work within the free Paxton Key app. Peter continues: “Smart credentials are ideal for the vast number of students on campus. They like using their smartphones, and it means they are not losing tokens that are expensive to replace. However, having the choice to still gain access with traditional fobs has been useful as there are a substantial number of people with varying technological preferences.” Results The installation has met the advanced security requirements mapped out in the original concept, and the system can turn into manual operation at the touch of a button for ease of use when Shabbat is being recognised. Overall, the building managers are pleased with the system’s functionality and have been working with Paxton’s Support team configuring Paxton10 to suit the bespoke needs of the campus. Furthermore, the hardware installed has met architectural expectations and compliments the building's heterogenous design, particularly on the main entrances where Paxton's vandal-resistant panels and readers have been installed. Peter concludes: “The system has been configured so the campus managers can make changes at the touch of a button, and the Paxton10 hardware is excellent quality and extremely aesthetically pleasing. I believe Paxton10 is the future of access control.”
RecFaces, an international facial recognition software developer played an indispensable role in promoting and maintaining safety during the Brazilian Carnival 2024. The company's one of the best and highly accurate products, Id-Guard, was applied to secure an open-air carnival and turned out to be a great solution to the security challenges faced. Facial recognition software The cameras equipped with facial recognition software were placed at mobile control checkpoints, which enabled people to move around and take part in live processions happening at the venue. Because of its fast identification ability, smart surveillance, and immediate notification of unwarranted persons present in the audience, facial recognition technology proved to be a good alternative for securing big events and carnivals. Accurate threat detection alerts FRS minimises human error and removes proximity challenges of mobile authentication FRS minimises human error and removes proximity challenges of mobile authentication. In the present-day security landscape, FRS becomes prominent as it contributes to the overall security of big public places, by producing quick but accurate threat detection alerts. Id-Guard's performance Maria Kazhuro, Business Development Director of RecFaces in the LATAM region, expressed pride in Id-Guard's performance, stating, "We are proud to say that our solution has once again performed exceptionally well in supporting security services during a mass outdoor event even under complex conditions of low light, high traffic, masked visitors and crowd." Maria Kazhuro adds, "Confidence in the quality of our facial recognition solutions allows us to look forward to the future with optimism and meet the demands of the most discerning customers. As expected, Id-Guard was vastly praised for being the best solution that elevated the security of the event." Public safety RecFaces will remain in the lead of technological innovation, and thus, it will support and ensure the enhancement of public safety and the well-being of citizens. While Brazilian Carnival 2024 progressed, RecFaces gained a reputation as an indispensable partner ensuring visitors’ safety with its novel facial recognition technology.
Renowned as a significant entity in the power industry, the Indian Power Giant stands as a key player in India's public sector power utility domain. Under the auspices of the Ministry of Power, Government of India, it specialises in hydroelectric power generation and associated endeavours. With a steadfast commitment to providing clean, sustainable, and cost-effective energy, the Power Giant has successfully executed numerous large-scale hydroelectric projects, making substantial contributions to India's energy landscape. Business challenge The Indian Power Giant encountered a formidable obstacle with its existing video surveillance infrastructure, comprising 128 IP cameras and NVRs of disparate makes and models dispersed across its facility. Lack of video management software capable of seamlessly merging with third-party IP cameras This diversity in camera types presented a significant hurdle to centralised surveillance efforts, resulting in delayed detection of security incidents, prolonged response times, and an overall compromised security stance. Moreover, the lack of video management software capable of seamlessly integrating with various third-party IP cameras and NVRs compounded the issue. Key challenges Absence of a centralised video management solution for over 100 IP cameras and NVRs deployed at multiple locations within the facility. Difficulty in finding a Video Management Software (VMS) compatible with diverse third-party IP cameras and NVRs. Varied user interfaces of IP cameras and NVRs from different brands causing user confusion. Inability to integrate the Automatic Number Plate Recognition (ANPR) system with the existing VMS, missing out on enhanced access control and vehicle tracking opportunities. The Power Giant faced issues related to manual monitoring and tracking of vehicles entering or leaving their premises. Solution Remote surveillance became feasible from any location, ensuring continuous monitoring of the facility The deployment of Matrix SATATYA SAMAS-Video Management Software emerged as the solution to the Indian Power Giant’s challenges. SATATYA SAMAS seamlessly integrated all 128 third-party IP cameras and NVRs across the facility, facilitating smooth centralised video surveillance operations. The Admin Client simplified the addition of cameras and NVRs, while the Smart Client enabled effortless playback and monitoring. With the Mobile Client, remote surveillance became feasible from any location, ensuring continuous monitoring of the facility. SATATYA SAMAS effectively addressed the hurdles, providing a user-friendly video management system that significantly enhanced overall security system efficacy. Furthermore, Matrix introduced an Automatic Number Plate Recognition (ANPR) solution at 12 entry points within the power plant premises. This strategic implementation mandated vehicle authentication at the entry gates, allowing access only upon successful authentication. The ANPR solution captured licence plate data, converted it into digital format, and securely stored it in the database, bolstering security measures and establishing a robust record-keeping system for enhanced monitoring and vehicular access control. All in all, Matrix enhanced security for the Indian Power Giant. Products offered Matrix Licence Dongle 200: USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100: Licence for Adding 100 Additional Cameras SATATYA SAMAS CAM20: Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM05: Licence for Adding 5 Additional Cameras SATATYA SAMAS USER03: 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR10: Automatic Number Plate Recognition (ANPR) Licence for 10 Cameras SATATYA SAMAS ANPR01: Automatic Number Plate Recognition Licence for 1 Camera Benefits Interoperability: SATATYA SAMAS facilitated seamless integration with all third-party IP cameras and NVRs, regardless of their models or brands, ensuring a unified and interoperable video management system. Efficient Monitoring: The centralised video surveillance system enabled comprehensive monitoring from a single interface. Effortless Management and Playback: The user-friendly Admin Client simplified camera and NVR management, while the Smart Client facilitated easy playback and monitoring for prompt security responses. Remote Monitoring: The Mobile Client enabled on-the-go surveillance from any location, coupled with instant notifications and alerts for swift response. Enhanced Access Control: Matrix's ANPR solution enhanced access control by authenticating vehicles. Improved Vehicle Tracking: The ANPR solution facilitated accurate vehicle tracking and security through licence plate capture and storage.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced a positive detection of an illegally brandished firearm in Hobbs, New Mexico that has resulted in criminal charges. At 6:35 p.m. MDT on November 30, 2023, ZeroEyes alerted the Hobbs Police Department and Eagle I.C. dispatch centre of an illegal gun detection captured on a security camera in the parking lot of Del Norte Pool. The ZeroEyes Operations Centre (ZOC) provided intelligent situational awareness about the threat, which involved individuals shooting sporting clays dangerously close to North Grimes Street. The responding officers detained the suspects and filed criminal charges against one of them. Rapid human verification ZeroEyes' AI gun detection and intelligent situational awareness software layers over living security cameras “My team and I were highly impressed with ZeroEyes’ AI detection and rapid human verification, which helped us stop this dangerous activity before anybody was hurt,” said Hobbs police chief August Fons. “In the past, something like this would have been missed entirely. We absolutely cannot have our citizens illegally firing guns in a public area, where anybody could walk by and get injured or even killed.” ZeroEyes' AI gun detection and intelligent situational awareness software layers over existing digital security cameras. When a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Visual description If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to law enforcement in as fast as three to five seconds from detection. “It is always gratifying to learn that our system has successfully prevented a potential shooting,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thankful that Hobbs PD acted swiftly to stop this illegal behaviour, and look forward to continued success working with the department.”
A multinational corporation, headquartered in Mumbai, ranked among the Fortune 500, is sustained by an exceptional workforce exceeding 187,000 individuals from 100 different nationalities. The corporation is founded on the principles of creating value for stakeholders, with a history of over seven decades of responsible business practices. Need for a modernised solution Their enterprises have evolved into global pioneers in various sectors including metals, pulp and fiber, chemicals, textiles, carbon black, telecom, cement, financial services, fashion retail, and renewable energy. The financial services arm of this conglomerate, to expand its business, needed a well-crafted, modernised Telecom solution, thus bringing them to the forefront of Matrix. Conglomerate's challenges The Financial services arm of this multinational corporation in Mumbai was facing issues ranging from modernisation to optimisation of communication. The challenge of telecommunication without laying Telephone cables for their new office was prominent. An arrangement had also to be made for utilising existing PRI lines and modernising them to meet their demands for new establishment. To elaborate on their challenges: Adoption of modern communication with existing Infrastructure: Their investment in existing infrastructure needed protection, and a provision had to be made to modernise the communication using existing infrastructure. Scalability: They required a Telecom solution that was future-proof, that is, easily scalable to fulfill the needs of future applications. Additionally, it had to be ensured that the operations were flawless, especially during critical work hours. Requirement of modern phone features: They required advanced features like Global Abbreviated Dialing, Auto Redial, Call Pick Up, and Internal Call Restriction, to become efficient in day-to-day operations. Managing different protocols: Interface with existing and different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Stipulated Time-frame: The transition and modernisation, simultaneously, had to be completed within a stipulated time frame. Solution The solution was based on the prelude of utilising existing infrastructure and amalgamation of Matrix solutions Matrix Comsec in partnership with SMB Automation analysed the challenges of communications and crafted a Telecom solution that was the best fit. The solution offered was based on the prelude of utilising existing infrastructure and amalgamation of Matrix Telecom Solutions within a stipulated time frame. VoIP-based communication This included employing Embedded IP-PBX to empower VoIP-based communication, and simultaneously integrating VoIP-PRI Gateway that optimised the feasibility of communication and helped the firm become more efficient by terminating PRI lines. The Telecom solutions include: The Embedded IP-PBX, PRASAR UCS - SPARK200, enabled them up to 2100 IP users. Additionally, features like up to 550 Concurrent calls, Concurrent 21 Calls Tapping, etc. took them to a notch above through a uniquely crafted telecom solution. The VOIP-PRI gateway included SETU VTEP 2P, which comes with features of 125 SIP Trunks and 120 simultaneous calls. The gateway enabled them to terminate 8 Copper PRI lines and thus transition towards IP. The VARTA Extensions enabled them to access Real-time UC features like one-touch access to Extension numbers, Instant messaging, monitoring the Real-time status of employees, etc. The IP phones included SPARSH VP510E and SPARSH VP210. This came with features like an LCD Graphical display, Context-sensitive keys, Built-in 16 DSS Keys, Polyphonic ring tune, and more. Results and benefits The implemented Telecom solutions enabled them to reap the benefits of modern communication while also enabling them to make the best out of the existing infrastructure. Matrix engineered a Telecom solution with our Embedded IP - PBX, PRASAR UCS enabling them to transit towards wire-free and modern communications, addressing the challenge of telephone cabling. The VOIP-PRI gateway, SETU VTEP, provided much-needed Least-cost routing ensuring that the call is always placed on the most appropriate network resulting in the optimisation and feasibility of calls. Access to the gateway was secured through PIN Authentication, while Digest Authentication ensured verification and protection of user credentials during the authentication process. The Real-time UC features were provided in the form of soft IP extensions through the VARTA UC Client. A complete Collaboration solution was made possible through Laptop/Desktop extensions to work remotely. The IP desk phones helped provide advanced features like Call Pick up, Call Forward, Call Waiting, and Call Transfer along with an Intuitive interface, that enabled employees to become efficient while simultaneously, enhancing user experience.
Round table discussion
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
Integrating control access and security
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadIntegrated access control: reap the benefits of connected security
DownloadFour areas to consider in frictionless access control
DownloadSecurity investments retailers should consider for their 2021 budget
DownloadOptimise your business with analytics and AI
DownloadThe healthy market for video surveillance at medical facilities
DownloadVideos
Remote security: Manufacturers & Suppliers
- ADPRO Remote security
- Climax Technology Remote security
- Software House Remote security
- Verkada Remote security
- Video Storage Solutions Remote security
- Bosch Remote security
- AMAG Remote security
- Senstar Remote security
- March Networks Remote security
- Hikvision Remote security
- CLIQ - ASSA ABLOY Remote security
- Vanderbilt Remote security