Remote security
Camden Door Controls has announced a number of enhancements to its popular CX-DE1200 Series EXIT WATCH™ delayed egress magnetic locks. These include a louder 75 dB voice annunciation, packaging the lock with a 90 dB remote sounder, and adding the option for a cost-effective kit that includes the maglock, remote sounder, and a remote reset key switch. Camden EXIT WATCH™ series Camden EXIT WATCH™ series delayed egress magnetic locks feature a 1200 lb. holding force, rugged al...
Award-winning security manufacturer, Gallagher Security, is reflecting on the success of this year’s The Security Event 2025 held at Birmingham’s NEC from 8-10 April. Among a full-strength Gallagher Europe team, and attending his first TSE event, Gallagher Security, Executive Vice President – Europe, Spencer Marshall says, “TSE was a spectacular event, and provided the perfect platform to engage with Channel Partners, End Users, and members of the wider security in...
Elite Interactive Solutions, a remote video guarding pioneer using patented intelligence and integration to achieve proven crime prevention, recently gathered law enforcement officials to its headquarters for a special invitational lunch-and-learn event. The function exemplifies Elite’s multifaceted mission to strengthen private-public partnerships by educating officers on how remote guarding directly prevents crime and protects properties in real-time, eliminates false alarms, boosts law...
Reconeyez, a pioneering provider of AI-powered perimeter security solutions, is pleased to announce the launch of the Reconeyez SIM, a seamless and hands-off SIM service designed to enhance connectivity and simplify deployment for Reconeyez systems. Alongside this launch, the company has appointed Guy Combrinck as Head of Sales for the UK and Ireland, marking a significant step in its expansion strategy. Introducing Reconeyez SIM The new Reconeyez SIM is a robust and flexible connectivity sol...
dormakaba Access Solutions Ltd. has signed an agreement on 3 April 2025 to form a joint venture with Guangdong Kinlong Precision Products Co., Ltd. A subsidiary of Guangdong Kinlong Hardware Products Co., Ltd. Kinlong is the pioneer Chinese construction and architectural hardware company. Through this joint venture, dormakaba enhances its go-to-market in the strongly growing hospitality vertical. Market expansion With the joint venture, dormakaba and Kinlong combine their strengths to enhance...
The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with ISC West, recognising innovative security products, services, and solutions. Top among the winners, who were recognised April 2 during an award ceremony at the Bridge Stage on the ISC West show floor, was Vaidio, receiving the 2025 Best New Product Award. SIA NPS product and service categories SIA NPS has been the...
News
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the introduction of PowerG +, the next generation of trusted PowerG technology. PowerG + adds new, in-demand features atop PowerG's strong foundational capabilities to power the next generation of security and home automation. Modern security protocols “PowerG + uplevels our proprietary wireless technology, helping us meet the evolving needs of dealers and end users while raising the bar for modern security protocols,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “The feedback loop we’ve established with our customers builds trust and enables us to deliver the most impactful features they need to scale and improve their businesses.” Next generation of PowerG + Power G + builds upon that strong foundation, launching immediately on 11 devices Power G is known for its vast ecosystem and trusted reputation, and Power G + builds upon that strong foundation, launching immediately on 11 devices. New devices included in the next generation of PowerG + include Indoor PIR Cam and Indoor Motion PIR, Door/Window Contact with Auxiliary Input, Vanishing Door/Window Contact, Wireless Repeater, Glass Break Detector, Water Tile with Freeze Detection, Smoke/Heat Detector, and PGP-IO, a device enabling the remote control of wired devices. Key product features of PowerG + sensors PowerG + sensors will enrol on all 4th Generation IQ Panels and the new features will be standard on all new devices as well as accessible on other systems through future releases. Key product features include: Enhanced functionality: With real-time battery life reporting, dealers can proactively check the exact battery percentage of all devices, not just low-battery notifications, to increase the efficiency of service calls and maximise their time. More control: Sensor lockdown is now accessible to every dealer, providing takeover prevention at the device level. Equipped with temperature sensing and other multi-sensing technologies, PowerG + devices are integrating more environmental data to become smarter than ever. Secure, future-proof technology: PowerG + sensors can be upgraded with over-the-air updates or promptly resolve any issues with devices remotely. Equipped with encryption against cyber threats, PowerG + devices also feature two-factor authentication during enrolment for added security. A modern design: PowerG + devices and packaging have been refreshed for a modern look and feel. Matte-finish shells in multiple colours can be fitted to the select PowerG + devices, offering flexibility to blend hardware seamlessly into any environment. Wireless connectivity of PowerG + PowerG + is now open for purchase globally, with select PowerG + devices available to purchase Johnson Controls will also preview the launch of IQ Panel 5. With trailblazing capabilities, future-ready updates and the pioneering wireless connectivity of PowerG +, the IQ Panel 5 offers the advanced security and automation the end users demand while maintaining the familiarity of IQ Panel 4. PowerG + will be on display at ISC West 2025 in Las Vegas from March 31 – April 4 (Booth #18033) for attendees to experience first-hand. PowerG + is currently available for purchase globally, with select PowerG + devices available to purchase at ISC West 2025. Next era for commercial buildings Johnson Controls proudly celebrates its 140th anniversary in 2025, marking a legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. The company continues to redefine building performance, driving the next era for commercial buildings, transforming industries and powering its customers’ missions.
HID, a pioneer in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader at ISC West, an ultra-compact and cable-free RFID reader for mobile use cases. This reader is a game-changer for organisations looking for seamless and secure authentication using a single credential across physical and digital environments. USB-C interface and MFA for security Designed with convenience and security in mind, it fits in a pocket or bag and is ideal for remote workers and field workforces to securely access business systems, applications and networks. OMNIKEY SE Plug offers multi-device compatibility—working with laptops, tablets and smartphones using a USB-C interface and multi-factor authentication (MFA) for enhanced security against phishing and credential theft. Securely access databases Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments —from healthcare facilities providing passwordless authentication anywhere, anytime, to electronic health records, to law enforcement agencies enabling officers in the field to securely access databases or criminal records while on patrol. “With OMNIKEY SE Plug we are taking convenience and security to the next level in today’s connected workplaces,” explains Thierry Roz, managing director, Extended Access Technologies RFID Business Unit at HID. “With hybrid work becoming the norm and mobile devices expanding, organisations need seamless, secure, and scalable authentication solutions to help their mobile employees perform their tasks onsite or on the go.” HID OMNIKEY SE Plug Benefits Superior Security and Compliance: The OMNIKEY SE Plug supports FIDO2, multi-factor authentication (MFA), and various credential formats, ensuring a highly secure, passwordless authentication experience. Additionally, it meets stringent cybersecurity regulations and high-security standards, making it ideal for organisations that require enhanced data protection and regulatory compliance. Seamless Integration Across Systems: With desktop and embedded models, organisations can effortlessly connect authentication to their existing infrastructure—delivering a fully integrated security ecosystem. Plug-and-Play Simplicity: Designed for ease of deployment, this solution requires no additional drivers. Employees can instantly authenticate across multiple devices without complex setup, ensuring a frictionless user experience. Mobility-Friendly Reader: Its compact, USB-C-key design is the ideal companion for remote, mobile, and hybrid employees. Whether accessing secure databases from home, logging into a corporate shared workstation, or authenticating at a POS terminal, users benefit from a portable, hassle-free authentication tool that travels with them. The new OMNIKEY SE Plug Reader is debuting at ISC West 2025, booth #8053.
HID, a pioneer in trusted identity and access control solutions, debuts its latest innovations at ISC West 2025. As the industry accelerates its shift toward mobile-first and seamless security integrations, HID has been working on solutions to create smoother and more secure access across touchpoints—from entryways to internal systems—optimising workflows and minimising disruptions. Integrated security ecosystems “HID is at the forefront of driving a world of seamless security, combining our deep expertise with continuous innovation to meet the evolving needs of modern access control and identification,” said Ramesh Songukrishnasamy, senior vice president and chief technology officer at HID. “As organisations embrace mobile-first solutions and integrated security ecosystems, HID remains committed to delivering cutting-edge technologies that streamline access, enhance user experiences, and reinforce security and secure identity at every touchpoint.” Future of secure identity and access control Visit HID at booth #8053 and Mercury™ at booth #27109, where attendees will have the opportunity to experience this shift firsthand, and see the future of secure identity and access control in action: HID Signo™ Readers: Versatile, Secure, and Future-Ready Reader, a multi-factor authentication key meeting FIPS-201 compliance and NIST 800-116 guidelines The flagship HID Signo Readers offer unparalleled versatility, supporting a broad range of credential technologies—including cards, fobs, digital wallets, and government-issued credentials like PIV, CAC, and TWIC. Designed for modern workplaces and high-security environments, the portfolio now includes the new HID Signo PIV Contact Reader, a multi-factor authentication solution meeting FIPS-201 compliance and NIST 800-116 guidelines. When integrated with Mercury MP4502 controllers, it delivers high-assurance security for U.S. Federal Government entities and organisations managing single facilities or global networks. New! Mercury Embedded Application Environment: Scalable, Interoperable, and Empowering The Mercury embedded application environment is an open platform that enables OEMs and technology partners to develop and deploy custom applications directly on Mercury MP Controllers. Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge, reducing latency, increasing availability and enhancing system redundancy. New! HID Integration Service: Streamlined Connectivity and Enhanced Interoperability This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators, and software vendors to seamlessly and rapidly integrate essential physical security solutions, solving the industry-wide struggle with managing third-party integrations. New! OMNIKEY SE Plug Reader OMNIKEY SE Plug supports passkeys and other MFA methods for enhanced security Revolutionise logical access with a cable-free reader that provides secure, passwordless authentication for mobile professionals. Ideal for hybrid workplaces (like healthcare, retail, law enforcement and other enterprise environments), it ensures your workforce has seamless access to corporate resources from any location – whether in the field, while working remote or when travelling. This versatile reader offers multi-device compatibility — working effortlessly with smartphones, tablets and laptops using a USB-C interface. OMNIKEY SE Plug supports passkeys and other multi-factor authentication (MFA) methods for enhanced security against phishing and credential theft. HID Mobile Access: The Future of Secure, Contactless Authentication HID Mobile Access solutions leverage smartphones and wearables for secure, convenient and touchless authentication, making them ideal for any environment where access control is needed, including workplaces, universities, commercial real estate, financial institutions and more. Streamline management with the HID Origo™ portal, centralising user management and integrating seamlessly with access control systems. Reduce the need for physical encoding, printing, and returns, and embrace a future where access control is simple and efficient. HID Linq™: Smart Device Management and Real-Time Insights HID Linq tool provides real-time device state reporting and remote configuration HID will demonstrate the powerful HID Linq tool platform, designed for seamless device management through Mercury controllers and HID Signo readers. The HID Linq tool provides real-time device state reporting, remote configuration and adjustments capability, as well as seamless firmware updates. HID FARGO HPD5000e printer: High-quality, Personalised Retransfer Technology Making its ISC West debut, the printer was engineered for universities, medium-to-large businesses, healthcare facilities and government agencies who need retransfer printing technology to effectively personalise contactless cards and for any organisation looking to switch from a higher-end, direct-to-card printer to a retransfer printing solution for improved image quality. HID four speaking sessions Additionally, HID will showcase its industry leadership through participation in four speaking sessions, highlighting the expertise of its thought pioneers: The Impact of Identity on the Physical and Digital Access Landscape – April 1, 10 a.m. PST Security Women Actively Supporting Women – How to Develop and Enhance Employee Resource Groups Focused on Women – April 2, 2:15 p.m. PST Retrospective/Future: What Does the Security Experience for Today’s Younger Generation Mean for the Future? April 2, 11:15 a.m. PST Optimising the Future of Workplace Experience – April 1, 1 p.m. PST
A rapidly growing European team, exciting new product releases and new look stand are the hallmarks of what looks set to be a calendar highlight for Gallagher Security at this year’s, The Security Event (TSE) in Birmingham next week. In what will be his first major trade show with Gallagher Security, Executive Vice President – Europe, Spencer Marshall says, “TSE is set to be a standout event for Gallagher Europe, with a full strength team in attendance, a number of exciting new product showcases and, as always, a rich opportunity to connect with the wider security industry, we’re looking forward to a really successful event.” Latest innovation in product suite Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch The Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch. QuickSwitch gives businesses a streamlined, simplified pathway to migrate from legacy systems to Gallagher’s world-class security solution. True to its name, installation is fast, reducing labour costs and minimising disruptions typical of a complex migration process. Most importantly, QuickSwitch helps businesses mitigate risks associated with legacy systems, creating peace of mind through a platform that unlocks greater value. With three variants each covering multiple boards, businesses are empowered to make the switch from a multitude of systems. Other powerful enhancements and integrations Also expected to be a major talking point on the Gallagher stand, and available with the upcoming Command Centre v9.30 release, a game-changing solution that redefines remote security. This groundbreaking release makes securing even the most remote assets easier and more cost-effective, while also delivering superior oversight, insight, and control. Launching with a suite of other powerful enhancements and integrations, v9.30 is one of the most advanced, feature-rich releases to date. Cyber advancements and features Gallagher will also be showcasing its multi-award-winning C7000 product range Gallagher will also be showcasing its multi-award-winning Controller 7000 (C7000) product range, including the recently released C7000 Enhanced, tipped as the controller designed with user confidence in mind. Building on the cyber advancements and features of the multi-award-winning C7000 Standard variant released in November 2023, the C7000 Enhanced offers increased reliability, redundancy, and resilience for customers. Gallagher’s award-winning site management platform Visitors to the Gallagher stand will also get to experience the employee badge in Apple Wallet. Released in May 2024, the employee badge in Apple Wallet is fully integrated with Gallagher’s award-winning site management platform, Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Rounding out Gallagher’s innovative solution showcase will be the global manufacturer’s perimeter fence solution, providing a powerful first line of defense for critical sites. Able to detect, delay, and deter intruders, Gallagher’s innovative pulse fencing systems ensure maximum security and compliance. Full strength of the Gallagher Europe team Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April A full-strength Gallagher Europe team will be in attendance, with Gordon Swallow, Sales Manager – UK South and European Technical Manager, Matt Wills taking part in panel discussions during the event. Matt Wills will be joining a discussion hosted by Lee Odess addressing; "Securing Europe's Foundations: Trends and Opportunities in Critical Infrastructure Protection." Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April discussing, "Technologies Shaping the Future of Security Systems: Cloud and AI Technologies," Chaired by Kieran Byrne AXIS Communications. Current and emerging needs of the industry Gallagher Security, Regional Marketing Manager – Europe, Bethan Thompson says, “These events are vitally important to ensure we best understand the current and emerging needs of our industry. The opportunity to come together with Channel Partners, End Users and members of the wider security industry helps us to shape our strategy and cements our commitment to innovating with people at the heart of everything we do.” She adds, “We’re looking forward to another successful event, unlocking greater value for our users, and the wider security industry through the power of our people and our industry-pioneering, innovation solutions suite.” Visit Gallagher Security at TSE, 8-10 April at stand 5/F90.
FLIR, pioneer in high-performance marine thermal-imaging systems, announced the launch of the new FLIR JCU-4 remote control, offering precision camera control and an elevated, yet simplified user experience. Providing confident control of FLIR marine thermal and visible cameras, the FLIR JCU-4 remote control is designed for FLIR marine cameras and is compatible with the M232, M300, M400/M400XR and M500 series, as well as legacy models. It offers pan, tilt, and zoom capabilities, and control of all additional camera functions with an ergonomic keypad and responsive joystick control. Camera operation and easy access The JCU-4 is a meaningful upgrade for those who actively navigate using thermal technology Designed by mariners, for mariners, the JCU-4 is a meaningful upgrade for those who actively navigate using thermal technology and require dependable and intuitive control of their FLIR camera. The rugged, low-profile three-axis joystick is mounted with a 2.9-inch colour LCD and keypad, to simplify camera operation and offer easy access to the joystick setup menus. A dimmable colour LCD and back-lit keypad preserves the operator’s vision during nighttime operations. User-defined camera functions The JCU-4 can be easily configured with intuitive pairing between FLIR marine cameras and marine monitors or chartplotters. Three custom keys can be pre-programmed for quick access to the most used user-defined camera functions. The FLIR JCU-4 is available for $1,699 USD.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the launch of IQ Panel 5. Powered by a Qualcomm® DrangonWing™ processor, the IQ Panel 5 preserves the features of the IQ Panel 4 that end users know and love while delivering a new powerful platform of the future. The IQ Panel 5 will be on display at ISC West 2025 in Las Vegas, Nevada, from March 31-April 4 (Booth 18033) for attendees to experience firsthand. Intuitive IQ Panel 5 packs “Dealers and installers have trusted Johnson Controls for over 15 years to be accessible as their needs change and to refine products in direct response to their feedback,” said Faisal Pandit, president, Controls and Security Systems at Johnson Controls. “The intuitive IQ Panel 5 packs all of their most requested enhancements into one secure, next-generation panel that will ultimately drive faster and more accurate installations, more scalable businesses and improved overall security.” Innovation in hardware and software components The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE “Ongoing collaborations with true industry movers like Johnson Controls are a powerful forcing function for innovation in the underlying hardware and software components that power these platforms,” said Erick Hong, senior director, business development and head of smart home at Qualcomm Technologies, Inc. “We are proud to collaborate once again to deliver a cutting-edge panel powered by Qualcomm Technologies’ solutions.” New functionalities of IQ Panel 5 The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE. The IQ Panel 5’s software will be regularly updated over time to introduce new functionalities such as AI features and smart device integrations following a software release roadmap informed by Voice of the Customer insights. Further improvements include: Foundations for the future: PowerG +, the next generation of trusted PowerG wireless technology, is embedded into every IQ Panel 5. Together, these provide the most powerful frontline in residential and commercial security now and tightly integrate with the larger home automation ecosystem. Upgrades with impact: The IQ Panel 5 offers a game-changing “modular design,” simplifying the process for technicians to complete new installations and takeovers. They only need to stock one panel and carry select daughter card modules for different frequencies (S-Line 319.5, 345 and 433), significantly limiting their SKUs, and in turn, reducing their costs. Refined style: With an elegant touchscreen, new 13-megapixel PortraitView camera (an evolution from the 8MP FlexTilt camera of the IQ Panel 4), improved mounting options, glass-break detector and an adjustable desk stand design, the IQ Panel 5 is aesthetic and functional in any space. Seamless installation and scalability: With a refreshed industrial design, IQ Panel 5 includes a logical redesign of the power supply, tamper and backplate for smoother installations and improved performance. Future enhancements to the panel’s UI such as a search feature will make it even more convenient and customisable, allowing users to easily manage and discover its wide range of features.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the introduction of PowerG +, the next generation of trusted PowerG technology. PowerG + adds new, in-demand features atop PowerG's strong foundational capabilities to power the next generation of security and home automation. Modern security protocols “PowerG + uplevels our proprietary wireless technology, helping us meet the evolving needs of dealers and end users while raising the bar for modern security protocols,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “The feedback loop we’ve established with our customers builds trust and enables us to deliver the most impactful features they need to scale and improve their businesses.” Next generation of PowerG + Power G + builds upon that strong foundation, launching immediately on 11 devices Power G is known for its vast ecosystem and trusted reputation, and Power G + builds upon that strong foundation, launching immediately on 11 devices. New devices included in the next generation of PowerG + include Indoor PIR Cam and Indoor Motion PIR, Door/Window Contact with Auxiliary Input, Vanishing Door/Window Contact, Wireless Repeater, Glass Break Detector, Water Tile with Freeze Detection, Smoke/Heat Detector, and PGP-IO, a device enabling the remote control of wired devices. Key product features of PowerG + sensors PowerG + sensors will enrol on all 4th Generation IQ Panels and the new features will be standard on all new devices as well as accessible on other systems through future releases. Key product features include: Enhanced functionality: With real-time battery life reporting, dealers can proactively check the exact battery percentage of all devices, not just low-battery notifications, to increase the efficiency of service calls and maximise their time. More control: Sensor lockdown is now accessible to every dealer, providing takeover prevention at the device level. Equipped with temperature sensing and other multi-sensing technologies, PowerG + devices are integrating more environmental data to become smarter than ever. Secure, future-proof technology: PowerG + sensors can be upgraded with over-the-air updates or promptly resolve any issues with devices remotely. Equipped with encryption against cyber threats, PowerG + devices also feature two-factor authentication during enrolment for added security. A modern design: PowerG + devices and packaging have been refreshed for a modern look and feel. Matte-finish shells in multiple colours can be fitted to the select PowerG + devices, offering flexibility to blend hardware seamlessly into any environment. Wireless connectivity of PowerG + PowerG + is now open for purchase globally, with select PowerG + devices available to purchase Johnson Controls will also preview the launch of IQ Panel 5. With trailblazing capabilities, future-ready updates and the pioneering wireless connectivity of PowerG +, the IQ Panel 5 offers the advanced security and automation the end users demand while maintaining the familiarity of IQ Panel 4. PowerG + will be on display at ISC West 2025 in Las Vegas from March 31 – April 4 (Booth #18033) for attendees to experience first-hand. PowerG + is currently available for purchase globally, with select PowerG + devices available to purchase at ISC West 2025. Next era for commercial buildings Johnson Controls proudly celebrates its 140th anniversary in 2025, marking a legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. The company continues to redefine building performance, driving the next era for commercial buildings, transforming industries and powering its customers’ missions.
HID, a pioneer in trusted identity and access control solutions, is proud to introduce the new OMNIKEY SE Plug reader at ISC West, an ultra-compact and cable-free RFID reader for mobile use cases. This reader is a game-changer for organisations looking for seamless and secure authentication using a single credential across physical and digital environments. USB-C interface and MFA for security Designed with convenience and security in mind, it fits in a pocket or bag and is ideal for remote workers and field workforces to securely access business systems, applications and networks. OMNIKEY SE Plug offers multi-device compatibility—working with laptops, tablets and smartphones using a USB-C interface and multi-factor authentication (MFA) for enhanced security against phishing and credential theft. Securely access databases Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments Ideal for modern, hybrid workplaces, the OMNIKEY SE Plug is engineered for diverse environments —from healthcare facilities providing passwordless authentication anywhere, anytime, to electronic health records, to law enforcement agencies enabling officers in the field to securely access databases or criminal records while on patrol. “With OMNIKEY SE Plug we are taking convenience and security to the next level in today’s connected workplaces,” explains Thierry Roz, managing director, Extended Access Technologies RFID Business Unit at HID. “With hybrid work becoming the norm and mobile devices expanding, organisations need seamless, secure, and scalable authentication solutions to help their mobile employees perform their tasks onsite or on the go.” HID OMNIKEY SE Plug Benefits Superior Security and Compliance: The OMNIKEY SE Plug supports FIDO2, multi-factor authentication (MFA), and various credential formats, ensuring a highly secure, passwordless authentication experience. Additionally, it meets stringent cybersecurity regulations and high-security standards, making it ideal for organisations that require enhanced data protection and regulatory compliance. Seamless Integration Across Systems: With desktop and embedded models, organisations can effortlessly connect authentication to their existing infrastructure—delivering a fully integrated security ecosystem. Plug-and-Play Simplicity: Designed for ease of deployment, this solution requires no additional drivers. Employees can instantly authenticate across multiple devices without complex setup, ensuring a frictionless user experience. Mobility-Friendly Reader: Its compact, USB-C-key design is the ideal companion for remote, mobile, and hybrid employees. Whether accessing secure databases from home, logging into a corporate shared workstation, or authenticating at a POS terminal, users benefit from a portable, hassle-free authentication tool that travels with them. The new OMNIKEY SE Plug Reader is debuting at ISC West 2025, booth #8053.
HID, a pioneer in trusted identity and access control solutions, debuts its latest innovations at ISC West 2025. As the industry accelerates its shift toward mobile-first and seamless security integrations, HID has been working on solutions to create smoother and more secure access across touchpoints—from entryways to internal systems—optimising workflows and minimising disruptions. Integrated security ecosystems “HID is at the forefront of driving a world of seamless security, combining our deep expertise with continuous innovation to meet the evolving needs of modern access control and identification,” said Ramesh Songukrishnasamy, senior vice president and chief technology officer at HID. “As organisations embrace mobile-first solutions and integrated security ecosystems, HID remains committed to delivering cutting-edge technologies that streamline access, enhance user experiences, and reinforce security and secure identity at every touchpoint.” Future of secure identity and access control Visit HID at booth #8053 and Mercury™ at booth #27109, where attendees will have the opportunity to experience this shift firsthand, and see the future of secure identity and access control in action: HID Signo™ Readers: Versatile, Secure, and Future-Ready Reader, a multi-factor authentication key meeting FIPS-201 compliance and NIST 800-116 guidelines The flagship HID Signo Readers offer unparalleled versatility, supporting a broad range of credential technologies—including cards, fobs, digital wallets, and government-issued credentials like PIV, CAC, and TWIC. Designed for modern workplaces and high-security environments, the portfolio now includes the new HID Signo PIV Contact Reader, a multi-factor authentication solution meeting FIPS-201 compliance and NIST 800-116 guidelines. When integrated with Mercury MP4502 controllers, it delivers high-assurance security for U.S. Federal Government entities and organisations managing single facilities or global networks. New! Mercury Embedded Application Environment: Scalable, Interoperable, and Empowering The Mercury embedded application environment is an open platform that enables OEMs and technology partners to develop and deploy custom applications directly on Mercury MP Controllers. Unlike traditional access controllers that rely on server-based logic and are limited in upstream system connections, this platform brings real-time logic processing to the edge, reducing latency, increasing availability and enhancing system redundancy. New! HID Integration Service: Streamlined Connectivity and Enhanced Interoperability This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators, and software vendors to seamlessly and rapidly integrate essential physical security solutions, solving the industry-wide struggle with managing third-party integrations. New! OMNIKEY SE Plug Reader OMNIKEY SE Plug supports passkeys and other MFA methods for enhanced security Revolutionise logical access with a cable-free reader that provides secure, passwordless authentication for mobile professionals. Ideal for hybrid workplaces (like healthcare, retail, law enforcement and other enterprise environments), it ensures your workforce has seamless access to corporate resources from any location – whether in the field, while working remote or when travelling. This versatile reader offers multi-device compatibility — working effortlessly with smartphones, tablets and laptops using a USB-C interface. OMNIKEY SE Plug supports passkeys and other multi-factor authentication (MFA) methods for enhanced security against phishing and credential theft. HID Mobile Access: The Future of Secure, Contactless Authentication HID Mobile Access solutions leverage smartphones and wearables for secure, convenient and touchless authentication, making them ideal for any environment where access control is needed, including workplaces, universities, commercial real estate, financial institutions and more. Streamline management with the HID Origo™ portal, centralising user management and integrating seamlessly with access control systems. Reduce the need for physical encoding, printing, and returns, and embrace a future where access control is simple and efficient. HID Linq™: Smart Device Management and Real-Time Insights HID Linq tool provides real-time device state reporting and remote configuration HID will demonstrate the powerful HID Linq tool platform, designed for seamless device management through Mercury controllers and HID Signo readers. The HID Linq tool provides real-time device state reporting, remote configuration and adjustments capability, as well as seamless firmware updates. HID FARGO HPD5000e printer: High-quality, Personalised Retransfer Technology Making its ISC West debut, the printer was engineered for universities, medium-to-large businesses, healthcare facilities and government agencies who need retransfer printing technology to effectively personalise contactless cards and for any organisation looking to switch from a higher-end, direct-to-card printer to a retransfer printing solution for improved image quality. HID four speaking sessions Additionally, HID will showcase its industry leadership through participation in four speaking sessions, highlighting the expertise of its thought pioneers: The Impact of Identity on the Physical and Digital Access Landscape – April 1, 10 a.m. PST Security Women Actively Supporting Women – How to Develop and Enhance Employee Resource Groups Focused on Women – April 2, 2:15 p.m. PST Retrospective/Future: What Does the Security Experience for Today’s Younger Generation Mean for the Future? April 2, 11:15 a.m. PST Optimising the Future of Workplace Experience – April 1, 1 p.m. PST
A rapidly growing European team, exciting new product releases and new look stand are the hallmarks of what looks set to be a calendar highlight for Gallagher Security at this year’s, The Security Event (TSE) in Birmingham next week. In what will be his first major trade show with Gallagher Security, Executive Vice President – Europe, Spencer Marshall says, “TSE is set to be a standout event for Gallagher Europe, with a full strength team in attendance, a number of exciting new product showcases and, as always, a rich opportunity to connect with the wider security industry, we’re looking forward to a really successful event.” Latest innovation in product suite Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch The Gallagher team will be proudly showcasing the latest innovation in their product suite, QuickSwitch. QuickSwitch gives businesses a streamlined, simplified pathway to migrate from legacy systems to Gallagher’s world-class security solution. True to its name, installation is fast, reducing labour costs and minimising disruptions typical of a complex migration process. Most importantly, QuickSwitch helps businesses mitigate risks associated with legacy systems, creating peace of mind through a platform that unlocks greater value. With three variants each covering multiple boards, businesses are empowered to make the switch from a multitude of systems. Other powerful enhancements and integrations Also expected to be a major talking point on the Gallagher stand, and available with the upcoming Command Centre v9.30 release, a game-changing solution that redefines remote security. This groundbreaking release makes securing even the most remote assets easier and more cost-effective, while also delivering superior oversight, insight, and control. Launching with a suite of other powerful enhancements and integrations, v9.30 is one of the most advanced, feature-rich releases to date. Cyber advancements and features Gallagher will also be showcasing its multi-award-winning C7000 product range Gallagher will also be showcasing its multi-award-winning Controller 7000 (C7000) product range, including the recently released C7000 Enhanced, tipped as the controller designed with user confidence in mind. Building on the cyber advancements and features of the multi-award-winning C7000 Standard variant released in November 2023, the C7000 Enhanced offers increased reliability, redundancy, and resilience for customers. Gallagher’s award-winning site management platform Visitors to the Gallagher stand will also get to experience the employee badge in Apple Wallet. Released in May 2024, the employee badge in Apple Wallet is fully integrated with Gallagher’s award-winning site management platform, Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Rounding out Gallagher’s innovative solution showcase will be the global manufacturer’s perimeter fence solution, providing a powerful first line of defense for critical sites. Able to detect, delay, and deter intruders, Gallagher’s innovative pulse fencing systems ensure maximum security and compliance. Full strength of the Gallagher Europe team Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April A full-strength Gallagher Europe team will be in attendance, with Gordon Swallow, Sales Manager – UK South and European Technical Manager, Matt Wills taking part in panel discussions during the event. Matt Wills will be joining a discussion hosted by Lee Odess addressing; "Securing Europe's Foundations: Trends and Opportunities in Critical Infrastructure Protection." Gordon Swallow will be joining a panel in the ASIS Networking Lounge on 9 April discussing, "Technologies Shaping the Future of Security Systems: Cloud and AI Technologies," Chaired by Kieran Byrne AXIS Communications. Current and emerging needs of the industry Gallagher Security, Regional Marketing Manager – Europe, Bethan Thompson says, “These events are vitally important to ensure we best understand the current and emerging needs of our industry. The opportunity to come together with Channel Partners, End Users and members of the wider security industry helps us to shape our strategy and cements our commitment to innovating with people at the heart of everything we do.” She adds, “We’re looking forward to another successful event, unlocking greater value for our users, and the wider security industry through the power of our people and our industry-pioneering, innovation solutions suite.” Visit Gallagher Security at TSE, 8-10 April at stand 5/F90.
FLIR, pioneer in high-performance marine thermal-imaging systems, announced the launch of the new FLIR JCU-4 remote control, offering precision camera control and an elevated, yet simplified user experience. Providing confident control of FLIR marine thermal and visible cameras, the FLIR JCU-4 remote control is designed for FLIR marine cameras and is compatible with the M232, M300, M400/M400XR and M500 series, as well as legacy models. It offers pan, tilt, and zoom capabilities, and control of all additional camera functions with an ergonomic keypad and responsive joystick control. Camera operation and easy access The JCU-4 is a meaningful upgrade for those who actively navigate using thermal technology Designed by mariners, for mariners, the JCU-4 is a meaningful upgrade for those who actively navigate using thermal technology and require dependable and intuitive control of their FLIR camera. The rugged, low-profile three-axis joystick is mounted with a 2.9-inch colour LCD and keypad, to simplify camera operation and offer easy access to the joystick setup menus. A dimmable colour LCD and back-lit keypad preserves the operator’s vision during nighttime operations. User-defined camera functions The JCU-4 can be easily configured with intuitive pairing between FLIR marine cameras and marine monitors or chartplotters. Three custom keys can be pre-programmed for quick access to the most used user-defined camera functions. The FLIR JCU-4 is available for $1,699 USD.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the launch of IQ Panel 5. Powered by a Qualcomm® DrangonWing™ processor, the IQ Panel 5 preserves the features of the IQ Panel 4 that end users know and love while delivering a new powerful platform of the future. The IQ Panel 5 will be on display at ISC West 2025 in Las Vegas, Nevada, from March 31-April 4 (Booth 18033) for attendees to experience firsthand. Intuitive IQ Panel 5 packs “Dealers and installers have trusted Johnson Controls for over 15 years to be accessible as their needs change and to refine products in direct response to their feedback,” said Faisal Pandit, president, Controls and Security Systems at Johnson Controls. “The intuitive IQ Panel 5 packs all of their most requested enhancements into one secure, next-generation panel that will ultimately drive faster and more accurate installations, more scalable businesses and improved overall security.” Innovation in hardware and software components The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE “Ongoing collaborations with true industry movers like Johnson Controls are a powerful forcing function for innovation in the underlying hardware and software components that power these platforms,” said Erick Hong, senior director, business development and head of smart home at Qualcomm Technologies, Inc. “We are proud to collaborate once again to deliver a cutting-edge panel powered by Qualcomm Technologies’ solutions.” New functionalities of IQ Panel 5 The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE. The IQ Panel 5’s software will be regularly updated over time to introduce new functionalities such as AI features and smart device integrations following a software release roadmap informed by Voice of the Customer insights. Further improvements include: Foundations for the future: PowerG +, the next generation of trusted PowerG wireless technology, is embedded into every IQ Panel 5. Together, these provide the most powerful frontline in residential and commercial security now and tightly integrate with the larger home automation ecosystem. Upgrades with impact: The IQ Panel 5 offers a game-changing “modular design,” simplifying the process for technicians to complete new installations and takeovers. They only need to stock one panel and carry select daughter card modules for different frequencies (S-Line 319.5, 345 and 433), significantly limiting their SKUs, and in turn, reducing their costs. Refined style: With an elegant touchscreen, new 13-megapixel PortraitView camera (an evolution from the 8MP FlexTilt camera of the IQ Panel 4), improved mounting options, glass-break detector and an adjustable desk stand design, the IQ Panel 5 is aesthetic and functional in any space. Seamless installation and scalability: With a refreshed industrial design, IQ Panel 5 includes a logical redesign of the power supply, tamper and backplate for smoother installations and improved performance. Future enhancements to the panel’s UI such as a search feature will make it even more convenient and customisable, allowing users to easily manage and discover its wide range of features.


Expert commentary
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Case studies
Type of Site: Apartment Building Location: Chodkiewicza 10, Warszawa, Poland The situation This housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. One entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution highlights Easy Intercom Retrofitting with Existing Cables. Remote Access with App-based Features. Good Scalability for Easy Addition of New Units or Expansion. Installed products S615 4.3” Facial Recognition Android Door Station 290-S8 7” Linux Indoor Monitor (2-wire Version) Solution benefits Future-proofing: With DNAKE 2-wire IP intercom solution, residents can enjoy high-quality audio and video communication, multiple access options including remote access, and integration with surveillance systems, providing a more versatile and secure living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
VIVOTEK successfully partnered with CMS, a pioneering provider of solar radiation measuring and analysis solutions, to implement an innovative Cloud Detection and All Sky Measurement system. The project aimed at delivering accurate and reliable data for applications such as weather and cloud observations, atmospheric and climate research, solar irradiance monitoring, and irradiance nowcasting for photovoltaic plants. Challenge CMS faced the challenge of developing a robust Cloud Detection and All Sky Measurement system with wide temperature and weather range and capabilities for varied harsh environmental conditions. It has to include a high-quality camera, but also a variety of internal and external environment sensors and actors. Solution Focusing on giving precise data for applications ranging from remote sensing to atmospheric study The project, focusing on delivering precise data for applications ranging from remote sensing to atmospheric research, encountered a significant hurdle in the form of the camera's mounting position–facing upward toward the sky. This orientation exposed the system to direct sunlight, snow and ice, demanding unparalleled reliability. The VIVOTEK 360 Fisheye camera, FE9382-EHV-v2, was chosen for its high-quality imaging, reliability, and durability, particularly in extreme conditions. The system All Sky Imager, featuring this VIVOTEK 360 Fisheye camera, emerged as a pivotal component in mitigating the impact of environmental extremes. Automatic Full Sky Imaging: ASI-16 provided a 360° field of sky view, automated and scheduled capturing of high-resolution images, transmission of data and images to one or two SFTP server(s), backup of data to internal memory in case of server/network problems, and video life streams. Environmental Monitoring: Temperature, humidity, and solar irradiance data were captured by high-precision external sensors and are stored in datalogger-like files as well as within the jpg images. Rugged Design: Double shielding, forced ventilation, strong air heating, and a coated quartz glass dome ensured reliable operation in harsh environments. Heating is controlled by external temperature and dew point. Extended Temperature Range: Successfully tested under an extended temperature range of −40°C to +70 °C, with a tolerance of ±3°C. Amongst others, the system is installed on two icebreaker research vessels, one operated by Australia in Antarctic, and one operated by Canada in the Arctic. VADP Integration for Bespoke UI: CMS utilised VIVOTEK Application Development Platform (VADP) to craft a bespoke user interface–a seamless, user-friendly design offering a clean and intuitive experience. References: Solution is embraced by Institutes, Universities, Scientific Research, and the Energy Sector, including maritime and Icebreaker Deployment. Conclusion The collaborative efforts between CMS Ing. Dr. Schreder GmbH and VIVOTEK have resulted in an innovative Cloud Detection and All Sky Measurement system that effectively addresses the challenges of environmental extremes. This enhanced solution not only ensures reliability in demanding conditions but also contributes significantly to scientific research and environmental monitoring. Gerhard Papst, Head of Development at CMS, is highly impressed and deeply satisfied with the performance of VIVOTEK's cameras. The scale of this collaborative project now spans over 300 sites and continues to expand.
Ibstock Place School, a private London co-educational day school nestled in beautiful grounds with a mix of historic and contemporary architecture, faced several challenges. They needed to expand CCTV coverage, ensure guaranteed video retention periods for specific areas at certain times, enhance remote access and event alerting capabilities, and prepare for future analytics integration. The challenge Ibstock Place School identified several challenges with their existing system: Coverage expansion: They needed to expand security coverage across their site. Retention guarantees: Specific areas required guaranteed video retention periods at certain times. Remote access and alerts: The system needed enhanced capabilities for remote monitoring and event alerts. Future-proofing: Requirements included an open platform system with automatic updates and easy integration with third-party technologies. The solution To execute a phased migration to a cloud-based security system, SES Technologies partnered with Eagle Eye Networks to implement a comprehensive cloud solution: Advanced camera integration: New Axis four-megapixel cameras with day/night and IR capabilities were seamlessly integrated into the existing infrastructure. Cloud Video Management System: The cameras were connected to the Eagle Eye Cloud VMS for instant access to live and recorded footage. Phased transition: A carefully planned migration ensured continuity of service during the shift from on-premise to cloud-based systems. The results The implementation delivered a true cloud experience for Ibstock Place School, enabling reliable, secure monitoring of their site while meeting regulatory licencing requirements. Key outcomes included: Significant cost savings: Leveraging existing cameras helped the school achieve a 25% reduction in total cost of ownership. Optimised efficiency: Features like Eagle Eye Smart Video Search, and flexible retention times enhanced operational workflows. Compliance and security: The cloud system provided robust security measures to meet compliance standards. By transitioning to the Eagle Eye Cloud VMS with the expertise of SES Technologies, Ibstock Place School improved its security infrastructure, reduced costs, and enhanced operational efficiency all while positioning itself for future growth and technology integration. Flexible retention time Paul Doran, Facilities Manager at Ibstock Place School, said, "SES Technologies and Eagle Eye Networks have seamlessly integrated our infrastructure with advanced cloud solutions, ensuring effortless regulatory compliance." He adds, "Features like Eagle Eye Smart Video Search, and flexible retention times have enhanced operational efficiency and safety for our school community."
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."
Type of Site: Apartment Building Location: Chodkiewicza 10, Warszawa, Poland The situation This housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. One entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution highlights Easy Intercom Retrofitting with Existing Cables. Remote Access with App-based Features. Good Scalability for Easy Addition of New Units or Expansion. Installed products S615 4.3” Facial Recognition Android Door Station 290-S8 7” Linux Indoor Monitor (2-wire Version) Solution benefits Future-proofing: With DNAKE 2-wire IP intercom solution, residents can enjoy high-quality audio and video communication, multiple access options including remote access, and integration with surveillance systems, providing a more versatile and secure living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
VIVOTEK successfully partnered with CMS, a pioneering provider of solar radiation measuring and analysis solutions, to implement an innovative Cloud Detection and All Sky Measurement system. The project aimed at delivering accurate and reliable data for applications such as weather and cloud observations, atmospheric and climate research, solar irradiance monitoring, and irradiance nowcasting for photovoltaic plants. Challenge CMS faced the challenge of developing a robust Cloud Detection and All Sky Measurement system with wide temperature and weather range and capabilities for varied harsh environmental conditions. It has to include a high-quality camera, but also a variety of internal and external environment sensors and actors. Solution Focusing on giving precise data for applications ranging from remote sensing to atmospheric study The project, focusing on delivering precise data for applications ranging from remote sensing to atmospheric research, encountered a significant hurdle in the form of the camera's mounting position–facing upward toward the sky. This orientation exposed the system to direct sunlight, snow and ice, demanding unparalleled reliability. The VIVOTEK 360 Fisheye camera, FE9382-EHV-v2, was chosen for its high-quality imaging, reliability, and durability, particularly in extreme conditions. The system All Sky Imager, featuring this VIVOTEK 360 Fisheye camera, emerged as a pivotal component in mitigating the impact of environmental extremes. Automatic Full Sky Imaging: ASI-16 provided a 360° field of sky view, automated and scheduled capturing of high-resolution images, transmission of data and images to one or two SFTP server(s), backup of data to internal memory in case of server/network problems, and video life streams. Environmental Monitoring: Temperature, humidity, and solar irradiance data were captured by high-precision external sensors and are stored in datalogger-like files as well as within the jpg images. Rugged Design: Double shielding, forced ventilation, strong air heating, and a coated quartz glass dome ensured reliable operation in harsh environments. Heating is controlled by external temperature and dew point. Extended Temperature Range: Successfully tested under an extended temperature range of −40°C to +70 °C, with a tolerance of ±3°C. Amongst others, the system is installed on two icebreaker research vessels, one operated by Australia in Antarctic, and one operated by Canada in the Arctic. VADP Integration for Bespoke UI: CMS utilised VIVOTEK Application Development Platform (VADP) to craft a bespoke user interface–a seamless, user-friendly design offering a clean and intuitive experience. References: Solution is embraced by Institutes, Universities, Scientific Research, and the Energy Sector, including maritime and Icebreaker Deployment. Conclusion The collaborative efforts between CMS Ing. Dr. Schreder GmbH and VIVOTEK have resulted in an innovative Cloud Detection and All Sky Measurement system that effectively addresses the challenges of environmental extremes. This enhanced solution not only ensures reliability in demanding conditions but also contributes significantly to scientific research and environmental monitoring. Gerhard Papst, Head of Development at CMS, is highly impressed and deeply satisfied with the performance of VIVOTEK's cameras. The scale of this collaborative project now spans over 300 sites and continues to expand.
Ibstock Place School, a private London co-educational day school nestled in beautiful grounds with a mix of historic and contemporary architecture, faced several challenges. They needed to expand CCTV coverage, ensure guaranteed video retention periods for specific areas at certain times, enhance remote access and event alerting capabilities, and prepare for future analytics integration. The challenge Ibstock Place School identified several challenges with their existing system: Coverage expansion: They needed to expand security coverage across their site. Retention guarantees: Specific areas required guaranteed video retention periods at certain times. Remote access and alerts: The system needed enhanced capabilities for remote monitoring and event alerts. Future-proofing: Requirements included an open platform system with automatic updates and easy integration with third-party technologies. The solution To execute a phased migration to a cloud-based security system, SES Technologies partnered with Eagle Eye Networks to implement a comprehensive cloud solution: Advanced camera integration: New Axis four-megapixel cameras with day/night and IR capabilities were seamlessly integrated into the existing infrastructure. Cloud Video Management System: The cameras were connected to the Eagle Eye Cloud VMS for instant access to live and recorded footage. Phased transition: A carefully planned migration ensured continuity of service during the shift from on-premise to cloud-based systems. The results The implementation delivered a true cloud experience for Ibstock Place School, enabling reliable, secure monitoring of their site while meeting regulatory licencing requirements. Key outcomes included: Significant cost savings: Leveraging existing cameras helped the school achieve a 25% reduction in total cost of ownership. Optimised efficiency: Features like Eagle Eye Smart Video Search, and flexible retention times enhanced operational workflows. Compliance and security: The cloud system provided robust security measures to meet compliance standards. By transitioning to the Eagle Eye Cloud VMS with the expertise of SES Technologies, Ibstock Place School improved its security infrastructure, reduced costs, and enhanced operational efficiency all while positioning itself for future growth and technology integration. Flexible retention time Paul Doran, Facilities Manager at Ibstock Place School, said, "SES Technologies and Eagle Eye Networks have seamlessly integrated our infrastructure with advanced cloud solutions, ensuring effortless regulatory compliance." He adds, "Features like Eagle Eye Smart Video Search, and flexible retention times have enhanced operational efficiency and safety for our school community."
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."


Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Products


White papers

Four areas to consider in frictionless access control
Download
Security investments retailers should consider for their 2021 budget
Download
Optimise your business with analytics and AI
Download
The healthy market for video surveillance at medical facilities
Download
Physical access control
Download
Integrating control access and security
Download
The benefits of Edge AI + Cloud for security systems
Download
Integrated access control: reap the benefits of connected security
Download
Four areas to consider in frictionless access control
Download
Security investments retailers should consider for their 2021 budget
Download
Optimise your business with analytics and AI
Download
The healthy market for video surveillance at medical facilities
Download
Physical access control
Download
Integrating control access and security
Download
The benefits of Edge AI + Cloud for security systems
Download
Integrated access control: reap the benefits of connected security
Download

Videos
Remote security: Manufacturers & Suppliers
- ADPRO Remote security
- Climax Technology Remote security
- Software House Remote security
- Video Storage Solutions Remote security
- Verkada Remote security
- Bosch Remote security
- AMAG Remote security
- Dahua Technology Remote security
- Senstar Remote security
- March Networks Remote security
- Hikvision Remote security
- CLIQ - ASSA ABLOY Remote security
- Vanderbilt Remote security

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download