Remote surveillance
Camden Door Controls has announced a number of enhancements to its popular CX-DE1200 Series EXIT WATCH™ delayed egress magnetic locks. These include a louder 75 dB voice annunciation, packaging the lock with a 90 dB remote sounder, and adding the option for a cost-effective kit that includes the maglock, remote sounder, and a remote reset key switch. Camden EXIT WATCH™ series Camden EXIT WATCH™ series delayed egress magnetic locks feature a 1200 lb. holding force, rugged al...
Untether AI®, a pioneer in energy-centric AI inference acceleration, is teaming up with AI Platform Alliance members Ampere® Computing, NETINT, ZoneMinder, AVC Group, and ASA Computers to introduce the Intelligent Video Recording (IVR) solution at ISC West 2025, the premier security industry tradeshow. This groundbreaking AI-powered system sets a new benchmark in video surveillance, delivering up to 8x better AI camera efficiency while operating in an eco-friendly server cons...
Omada by TP-Link and VIGI by TP-Link, TP-Link Systems Inc.’s exclusive business solutions brands, are set to make waves at ISC West 2025 with the debut of their groundbreaking unified networking and surveillance solutions. At the event, the brands will showcase a seamless integration of VIGI’s cutting-edge surveillance solutions, Omada’s comprehensive networking systems, and the Omada Central platform—a revolutionary cloud-based solution that unifies the management of ne...
Eagle Eye Networks, the global pioneer in cloud video surveillance, launched Eagle Eye Automations. A flexible and extensible rules engine for automating tasks that empowers businesses to proactively and economically improve security, safety and business operations. Simplifying security management “Today’s security systems are complex, increasingly incorporating video surveillance, AI, analytics, sensors, and other third-party devices and technologies. Eagle Eye Automations enable...
Cozaint, a pioneer in innovative physical security and video surveillance solutions, announced a strategic partnership with Insurgo, a specialist in secure data erasure and LTO tape management. This collaboration aims to provide unparalleled long-term video surveillance storage solutions, leveraging the efficiency and cost-effectiveness of Linear Tape-Open (LTO) technology, enhanced by Cozaint’s MARCIA middleware and Insurgo’s Investigo tape tracking system. Seamless data integrati...
Konica Minolta has announced the sale of its entire 65% stake in MOBOTIX AG, along with all associated shareholder loans, to CERTINA Software Investments AG, a 100% subsidiary of the Munich-based family equity investor CERTINA Group. The CERTINA Software Division of CERTINA Group specialises in the development and expansion of technology-driven businesses worldwide. CERTINA expands portfolio KONICA MINOLTA's medium plan to divest non-focus business and concentrate on core business areas globa...
News
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the company has produced a new series of educational videos. Consisting of five segments ranging from just over four minutes to a little more than seven, the series is designed to provide a synopsis of remote guarding along with more detail on some of the key aspects in a straightforward and easily digestible way. Panel of subject matter experts The series was created from curated sections of a popular session during the 2024 Global Security Expo The series was created from curated sections of a popular session during the 2024 Global Security Expo (GSX) in Orlando, Fla., titled, “Remote Guarding Has Made Real-Time Crime and Catastrophe Prevention a Reality.” The presentation featured a panel of pioneering subject matter experts in Elite Vice President of Security Solutions Scott Blakeman (moderator), law enforcement executives Tom Stone and Justin Feffer, who is also an attorney focused on cybersecurity, and Canyon Partners Senior Vice President and Director of Security Allen Azran. Remote video guarding “Due to its remarkable and documented success in preventing crime in real-time and increasing customer awareness and demand, remote video guarding has been capturing the attention of security providers and end users alike,” says Blakeman. “However, few yet fully grasp the crucial elements and the interconnectedness essential to fully realise the solution. This presentation and videos bring needed clarity to the market.” Five key remote video guarding areas Appropriate for the layperson and security professionals investigating this fast-growing opportunity, the series focuses on five key remote video guarding areas. They are: Part 1: Overview & Basics Part 2: System Design Part 3: Benefits & ROI Part 4: Partner to Law Enforcement Part 5: Future & Technology Elite’s LEAB In extra, segments can be accessed from Elite’s YouTube channel and those unable to watch may opt to listen Each video contains convenient links to the other series parts. In addition, segments can be accessed from Elite’s YouTube channel and those unable to watch may opt to listen just as they would an audio podcast. Stone and Feffer belong to Elite’s Law Enforcement Advisory Board (LEAB), which reviews all police calls for dispatch originating from Elite’s Security Operations Command Centre to ensure optimal procedures, communications and outcomes, and interacts with responding agencies across the country to build and nurture strong private-public crime prevention relationships. As the only provider with a LEAB, and having achieved complete elimination of false alarms, Elite is among the few companies whose calls receive priority police. Advantages of remote guarding “Due to diminishing resources among law enforcement agencies and rising crime, the capabilities and advantages offered through remote guarding are invaluable,” says Stone. “Remote guarding can not only directly prevent crime but when police are called in, they know it is a true crime in progress and operators can stay on the line as a live eyewitness with critical information that helps them respond more safety, and effectively where apprehensions are concerned. This video series will be an eye-opener for many.”
At ISC East 2024, Hanwha Vision (Booth 607) is redefining the role of surveillance technology as a total business solution. The company is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence tools delivering new data-driven business insights. AI in Hanwha Vision’s IP cameras Attendees will see new applications of AI in Hanwha Vision’s IP cameras and new cloud capabilities enabling on-premise and remote surveillance management, giving security professionals the highest level of flexibility for managing their surveillance resources. “We need to continually think differently and adapt to the changing needs of our customers and the industry,” said Tom Cook, Executive Vice President of Sales and Marketing, at Hanwha Vision America. Comprehensive, intelligent technologies “What worked as recently as two years ago won’t work today, and certainly not for tomorrow. Surveillance is no longer viewed only as devices that monitor and protect." "These comprehensive, intelligent technologies are now regarded as 360-degree, total business transformation solutions, and that’s what Hanwha Vision is bringing to ISC East.” Hanwha Vision highlights at ISC East 2024 Hanwha Vision has partnered with NVIDIA to design an entirely new camera, the 4-channel AI Multi-sensor Camera Hanwha Vision has partnered with NVIDIA to design an entirely new camera, the 4-channel AI Multi-sensor Camera with WAVE VMS Powered by the NVIDIA Jetson™ Platform. The new camera’s integration with the NVIDIA Jetson module provides Hanwha AI multi-sensor camera devices with up to an additional 100 Tera Operations Per Second (TOPS), plus immediate access to the NVIDIA AI app ecosystem. Customers can use this processing power to leverage existing and custom-developed applications for the NVIDIA chipset to seamlessly enable new analytics and capabilities unavailable on competitive cameras. AI Multi-sensor camera The new AI Multi-sensor camera (PNM-C32084RQZ-8XE4T-W) is the first Hanwha Vision model to use the power of the NVIDIA Jetson™ platform, delivering an unprecedented combination of reliable serverless recording, on-board storage, and intelligent camera performance through an embedded instance of Wisenet WAVE VMS. The new camera can record up to 16 camera streams to 4TB of onboard storage (2 x 2TB SSD). Newly added Boolean Logic rules give users more precise control over setting up event actions. The camera’s WiseNRII and Preferred Shutter Speed features eliminate noise and motion blur for clear imagery in all conditions, while AI technology monitors people and vehicles with loitering and line-crossing analytics. AI Box (AIB-800) The AI Box supports real-time AI video analytics across up to eight channels, detecting and classifying people The AI Box (AIB-800) further expands the scope of Hanwha Vision’s partnership with NVIDIA, allowing the easy addition of AI functionalities to standard security cameras without built-in AI. The device’s integration with the NVIDIA Jetson Orin module enables the use of the latest edge AI analytics, with additional processing power provided by NVIDIA’s newest system-on-a-chip technology. The AI Box supports real-time AI video analytics across up to eight channels, detecting and classifying people, vehicles faces, and license plates, while distinguishing between monitoring objects and environmental factors like trees, shadows, and animals to reduce false alarms. PTRZ models At ISC East, Hanwha Vision is featuring its diverse range of AI-based security cameras, including dome and Pan-Tilt-Rotate-Zoom (PTRZ) models. One highlight is Hanwha Vision’s 4-channel multi-directional camera (PNM-C16013RVQ), boasting a 360-degree wide-angle view. The most compact 4-channel model available with AI and built-in IR, its versatile design ensures seamless integration in various indoor and outdoor environments. The camera is equipped with WiseStream III, a video compression technology that supports AI analytics while reducing bandwidth and storage requirements. Integrated with IR LEDs, it delivers clear images even in low-light conditions. Cloud-based devices and apps Both DMPro and SightMind enable more intuitive and efficient management of video surveillance systems Hanwha Vision is also showcasing its growing ecosystem of cloud-based devices and apps designed to enable on-premise and remote surveillance capabilities. On display at ISC East are DMPro, which offers device maintenance and health monitoring, and SightMind, which provides AI-powered data analytics with visualised insights. Both DMPro and SightMind enable more intuitive and efficient management of video surveillance systems and support effective data-driven decision-making. OnCloud OnCloud is Hanwha Vision’s new direct-to-cloud video management system providing low-latency access to live and recorded video, searchable clips, event notifications, and more. It’s a fully cloud-based solution for monitoring an organisation's locations and assets, whether it’s across a single facility or multiple sites. The Hanwha Vision products and solutions on display at ISC East 2024 clearly illustrate the company’s goal of accelerating its transition to becoming a platform-centric solution provider delivering business-driven innovations.
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a flexible, rapidly deployable CCTV town centre network extension for Plymouth City Council. Designed to cover hot spots of activity, both criminal and anti-social, the extension was required to tackle areas of rising anti-social behaviour and surfacing security issues at disparate areas around Plymouth. Invictus Hybrid camera “We had considered a hard-wired permanent extension to the existing camera network to cover the required areas but were put off by the cost of this option,” says Stuart Venn, CCTV & Street Lighting Engineer, Street Services, Plymouth City Council. “Plus, many of the reports of criminal or anti-social activity in the areas concerned had yet to be confirmed, so a permanent extension was a big commitment without any guarantee of making a significant impact and benefit to each area." “We already had a long-term technical relationship with 360 Vision, as they had assisted us to transition from an analogue camera network to an IP one, via the use of their clever Invictus Hybrid camera.” An alternative solution Plymouth City Council turned to 360 Vision, for advice on an alternative solution to extending the existing CCTV Capitalising on this long-term technical partnership, and the successes it had brought in the past, Plymouth City Council again turned to 360 Vision, for advice on an alternative solution to extending the existing CCTV network with costly permanent cameras, to cover the emerging hotspots. “Once we had our Community Team involved, it was clear from the reports we were receiving about the requirement for coverage, that a network of redeployable cameras would yield the best coverage and return on investment, to provide the communities involved with the best protection,” says Stuart. Simple and rapid deployment “Using re-deployable and rapidly deployed cameras would allow us to assess and confirm the problem at each location without committing to a permanent camera installation." "Our close technical relationship with 360 Vision paid off here, with the team suggesting a network of Invictus PTZ cameras similar to the Invictus Hybrid camera we had purchased to extend the network previously, but this time, equipped with innovative 360 Vision TX technology, to enable simple and rapid deployment utilising video transmission over mobile phone networks.” Saves time 360 Vision Technology’s TX wireless video camera transmission technology delivers camera video & PTZ control from just 6 Kbps, full 1080p HD edge recording, and remote retrieval on demand. It also saves the council time and money on fixed camera video transmission infrastructure costs and ongoing cost of ownership. Wireless transmission These cameras use highly efficient optimised video compression, with unique minimal latency Delivering high-quality camera video over low bandwidth, 360 Vision Technology’s 3G/4G LTE/5G TX wireless CCTV camera range provides a reliable wireless video transmission solution, even within difficult wireless video transmission environments. Additionally, these cameras use highly efficient optimised video compression, with unique minimal latency that is fully encrypted and secure. Low costs “The Invictus TX complies with all our network security requirements, so we can always be confident of the results when adding Invictus TX units to our camera network,” says Stuart. Keeping running costs down to a minimum, the Invictus TX Range of 3G/4G LTE/5G TX wireless CCTV cameras operates without the need for expensive airtime contracts. Low and high-bandwidth video streams With complete control of the bandwidth used, Plymouth City Council can choose the resolution and frame rate to transmit, to suit the bandwidth available. Additionally, operators can switch dynamically between low and high-bandwidth video streams, depending on network capability, adjusting CCTV camera video quality to suit. Rapid installation “With our network of 19 Invictus TX cameras, we can rapidly install a unit at the site of a complaint, sometimes within hours of the complaint arising,” continues Stuart. “Once installed, we can assess the real-world requirement for surveillance at the site, and the effect a CCTV camera impacts on the area." Using resources economically “If the camera is not required or has helped to tackle the issue, we can then remove it, usually after 3 months and the unit either goes back into storage or because of demand, goes straight back out to another site awaiting surveillance." "Being able to set up cameras where they are most needed ensures we are using our resources most economically and extracting the maximum return on our camera investments.” Varied applications In use, the deployable network of wireless TX cameras has been installed at many disparate locations In use, the deployable network of wireless TX cameras has been installed at many disparate locations and covered an array of applications, from tackling anti-social behaviour on suburban estates to securing crime hot spots across the city. Such has been the success of the cameras that are even being used within Plymouth’s traffic camera network, where they are deployed to cover large highway construction projects, health and safety, and traffic flow monitoring while work is being carried out. Genetec Omnicast video management system Linked directly to the combined public safety and traffic control centre via innovative 360 Vision TX technology, the cameras are seamlessly integrated into the control room’s Genetec Omnicast video management system and can be locally powered via the street furniture they are mounted to, such as street lighting. “Fixing the TX cameras on street lighting gives us access to any number of surveillance locations, a convenient and easy site to install them at, and local power to connect to,” continues Stuart. “As we drive towards a greener street lighting network, thanks to the low-power consumption certification of the Invictus TX camera, each unit can be connected to the audited street power network without a problem." High-definition images “The cameras are providing high-definition images of places that were previously inaccessible with traditional camera deployment and are in such demand that we rarely have any TX cameras in stock awaiting deployment, as they are usually all out at sites. Once they have done their job, they are simply moved from one site to the next." “With the benefits of these units demonstrated, we are looking to further increase the Invictus TX network, with plans to deploy cameras to tackle the council’s fly-tipping issues, and to assist the Event Team to cover large events and organised gatherings across the city.” ‘Always On’ and ‘Rugged at the Roadside’ IK10 certification Jason Wyatt, National Account Manager at 360 Vision Technology says, “Unlike standard or off-the-shelf wireless video transmission systems, the Invictus TX has been specifically designed to suit low bandwidth or unreliable network conditions, such as the cellular networks used here." "Along with ‘Always On’ and ‘Rugged at the Roadside’ IK10 certification, our Invictus TX cameras include built-in cyber security, local point-to-point Wi-Fi access, easy Plug & Play set-up, require no fixed cable infrastructure, and can be easily integrated into existing VMS control systems – attributes the forward-looking Plymouth City Council are taking full advantage of."
At GSX 2024, Hanwha Vision (Booth #1701) is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence delivering new data-driven business insights. GSX attendees will see new applications of AI in Hanwha Vision’s IP cameras enabling precise detection, robust search, elevated data analysis, and enhanced image quality. Intelligent software solutions With the new OnCloud VMS and the full ecosystem of cloud-based apps, Hanwha is demonstrating how cloud capabilities enable on-premise and remote surveillance management, giving security professionals the highest level of flexibility for managing their surveillance resources. Hanwha is showing how cloud capabilities enable on-premise and remote surveillance management “The convergence of hardware devices and intelligent software solutions is accelerating, creating new requirements for effective security and surveillance,” said Miguel Lazatin, senior director of marketing, Hanwha Vision America. “The data our cameras capture keeps everyone safe, but it’s also an invaluable source of meaningful and actionable insights to drive informed business decisions about staffing, sales, customer service and any number of business-related functions. That’s the new definition of surveillance as a total business solution.” Overview of Hanwha Vision solutions To navigate constantly changing business landscapes, organisations need new types of security and surveillance capabilities. Hanwha Vision is developing solutions to help organisations protect their operations today and propel them toward future success. An overview of the Hanwha Vision solutions to be featured at GSX booth #1701 include: OnCloud direct-to-cloud VMS OnCloud uses Natural Language Processing to make forensic review faster and more accurate OnCloud is Hanwha Vision’s new direct-to-cloud video management system providing low-latency access to live and recorded video, searchable clips, event notifications, and more. It’s a fully cloud-based solution for monitoring an organisation's surveillance resources, whether it’s across a single facility or multiple sites. OnCloud uses Natural Language Processing to make forensic review faster and more accurate. Searching is instant and intuitive and search results can also be filtered by object classification and attributes. OnCloud users can invite integrators to share a dashboard view of customer sites to proactively identify potential issues before they arise. During an investigation, collaborators can securely upload documents, images and video files from their phones or other sources to share complete incident details. AIB-800–8 channel AI Box The AIB-800 eight-channel AI Box converts any camera supporting ONVIF/SUNAPI protocol into an AI-enabled device, avoiding the additional costs of replacing an entire system. The device detects and classifies people, vehicles, faces and licence plates and more in real time, greatly enhancing operator efficiency and the accuracy of video analytics. Wisenet AI algorithms can detect people and vehicles as distinct objects separate from their surroundings such as waving trees, shadows, or animals, significantly reducing false alarms and reducing storage and bandwidth. The AIB-800 seamlessly integrates with video management software from Milestone, Genetec, and Wisenet Wave. Operators can search AI events according to various attributes from AI cameras. PNM-C32084RQZ AI PTRZ Powered by Jetson The camera complies with Secure boot standards and uses signed and encrypted firmware Hanwha Vision’s PNM-C32084RQZ 8MP x 4-channel AI PTRZ multi-directional camera delivers AI object classification and detection capabilities unmatched by competitive models. Support for NVIDIA Jetson Orin NX 16GB/8GB and Orin Nano 8GB/4GB modules, plus access to the NVIDIA AI apps ecosystem, produces enhanced imaging quality and camera flexibility. Newly added Boolean Logic rules give users new possibilities when setting up event actions. The camera’s WiseNRII and Preferred Shutter Speed features eliminate noise and motion blur for clear imagery in all conditions, while AI technology monitors humans and vehicles with loitering and line-crossing analytics. The camera complies with Secure boot standards and uses signed and encrypted firmware. PNM-C16013RVQ - 4MP x 4 AI IR Mini Multi-directional Dome Hanwha Vision’s PNM-C16013RVQ four-channel, mini multi-directional dome camera combines a field of view of up to 360° and AI analytics with WiseStream III video compression for bandwidth and storage reduction. The new camera, the most compact 4-channel model available with AI and built-in IR, can seamlessly blend into environments where inconspicuous aesthetics and image quality are required. Its multi-directional capabilities enable discreet monitoring with no blind spots and its compact size makes it suitable for both indoor and outdoor installations. AI-based object detection and classification help generate metadata including object type (Person, Face, Vehicle, Licence Plate), reducing false alarms and enhancing forensic search efficiency. AI analytics monitor for loitering and line-crossing. Four built-in IR LEDs ensure crisp and clear video footage, even in low-light conditions.
March Networks®, a pioneer in intelligent video surveillance, recently participated in the 33rd Forum of Aditel (Association of Interbank Remote Surveillance Users) in Marseille, France. Aditel is a French association that focuses on improving security and surveillance systems across the banking sector in France. Peter Strom, CEO of March Networks, along with March Networks' team in France engaged with leaders from France's top banks and discussed the latest security trends shaping the French financial sector. Advanced video technology As a surveillance solutions provider for France's banking industry, March Networks contributed to several discussions on how financial institutions can step up their security, efficiency and client experience using advanced video technology like AI, real-time alerts, and data analytics. The event also provided the opportunity to connect with Didier Moreau, President of Aditel, and key customers and contacts in the banking industry including Groupe BPCE (a cooperative group for banking and insurance). Video surveillance systems The team demonstrated some of March Networks financial sector solutions such as: Integrated video surveillance with ATM and teller transactions Proactive alerts for fraud High quality ATM cameras and notifications for ATM attacks Advanced loitering detection for ATM vestibules and other public areas Remote access and centralised management of video feeds across branches March Networks looks forward to continued partnerships with the French banking industry, helping financial institutions do more with their video surveillance systems.
Waterfall Security is delighted to announce the launch of HERA™-Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organisations to reap the operational and economical value of remotely accessing and controlling OT devices and workstations, without introducing the risks that come with external connectivity. Remote access is one of the weakest links when it comes to OT cybersecurity. For cyber-physical systems and OT environments, "opening up" the OT network to external internet connectivity to enable remote access, is below the bar required to keep operations safe and secure. Waterfall's new HERA solution HERA physically maintains network segmentation, keeping OT environments safe and secured With Waterfall's new HERA solution, enterprise-grade remote access capabilities are enabled and secured with engineering-grade security. Leveraging Waterfall's battle-tested hardware platform, HERA physically maintains network segmentation, keeping OT environments safe and secured. "HERA represents a giant leap in how the industry approaches remote access into OT environments," explains Lior Frenkel, CEO and Co-founder of Waterfall Security. "By applying physical cybersecurity over cyber-physical systems, Waterfall Security's solutions enable zero compromise between industrial cybersecurity and functionality." HERA's patented technology Frenkel added: "Together with our market-pioneering Unidirectional Gateway technology, Waterfall Security provides a holistic solution for customers with OT environments and cyber-physical assets." HERA's patented technology has been designed from the ground up with OT cybersecurity in mind. It harnesses decades of know-how, expertise, and field-tested technology to deliver the safest solution to remotely access OT networks.


Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and healthcare uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate, retail and healthcare environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
EQUANS were engaged by JLL to create a Digital Artwork Display using LED to showcase immersive content and create a high tech but nature-driven aesthetic at one of Melbourne’s premier business addresses. Digital Artwork Display The Digital Artwork Display had to encompass functional requirements, including LED video wall display, a display interface unit for image processing, LED time module control and remote monitoring, a digital playback server capable of displaying the artwork’s intense digital content, and a control interface accessible via web browser and mobile tablet device. The display’s aspect ratio of 32:9 presented a unique and challenging canvas for content creation. To ensure the highest aesthetic standards, any content had to be able to be displayed in its native aspect without stretching or compressing. The Solution This project is a real-time artwork with interactive waves, tides and currents from an island cluster This project is a real-time artwork with interactive waves, tides and currents from an island cluster in Australia. The PC that the artwork is generated from reads the tidal information in real time and converts it into the artwork. As the wind blows, waves ripple across the screen and during high tide the islands are covered with water. A digital set-top box allows display of commercial TV channels for breaking news and events, if relevant to the building occupants. The LED cabinets are mounted onto a custom aluminum-extruded mounting frame to ensure sub-millimetre accuracy required for an extremely flat image without visible cabinet lines. Sound system with 25 speakers installed To support the video art, a sound system with 25 speakers across three separate zones and 8 audio channels allows for optimal tuning and configuration. The audio resides on a QSC digital sound processor platform supporting network audio. This enables visitors to listen to highest quality sound from a range of audio sources. Control of the video wall takes place via a Crestron control system with a wireless touch panel that technicians can access from the foyer. All head-end equipment is powered by a 2KVA uninterrupted power supply, allowing soft power downs in case of power outages, helping extend the life of the system. The Benefit EQUANS have implemented ground-breaking technology at Freshwater Place’s newly refurbished foyer. The publicly accessible digital artwork provides an opportunity for all building occupants to engage with interactive, situational and customised technology. The 11x3m Silicon Core LED screen and audio system was a successful installation from EQUANS ANZ. Overview Key facts: 25 speakers across three separate zones & 8 audio channels Unique display aspect ratio 32:9
360 Vision Technology, the UK manufacturer of ruggedised HD, radar and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Invictus TX cameras for STC car parks Daniel Chappell, Technical Account Manager at North takes up the story: “Historically, South Shields had an existing public safety CCTV system, which was mainly street focused. However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate to a new surveillance solution, to cover its twelve town centre car parks.” He adds, “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirement and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation.” Low-cost video transmission Daniel Chappell continues, “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibre optic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive.” He further states, “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling.” Securing the best 4G network supplier The new Invictus PTZ TX cameras are now securing STC car parks with video streaming Daniel Chappell adds, “Taking-up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross referenced with network operators to provide the best quality of signal at each specific camera location.” Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are now securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. Control room monitoring In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said: “This investment forms part of wider improvements to our CCTV provision, which is a vital tool in helping to keep our residents and visitors safe.” Reliable video system for monitoring the cameras He adds, “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security and management of the car parks. Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real time more quickly and effectively.” Councillor Jim Foreman continues, “The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness and surveillance.” Close-up imaging and enhanced night-time vision The 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens Featuring continuous rotation pan, unobstructed 360-degree view and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. Daniel Chappell explains, “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available.” Advanced functionality Daniel Chappell adds, “This advanced functionality offers peace-of-mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras are now providing comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Integrated LED white light technology Adrian Kirk, Business Development Director at 360 Vision Technology, commented: “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks.” Adrian Kirk adds, “For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper and more defined colour images, even at night-time. We are proud to have delivered a practical Invictus TX based camera solution as part of the STC CCTV network upgrade.”
VIVOTEK successfully partnered with CMS, a pioneering provider of solar radiation measuring and analysis solutions, to implement an innovative Cloud Detection and All Sky Measurement system. The project aimed at delivering accurate and reliable data for applications such as weather and cloud observations, atmospheric and climate research, solar irradiance monitoring, and irradiance nowcasting for photovoltaic plants. Challenge CMS faced the challenge of developing a robust Cloud Detection and All Sky Measurement system with wide temperature and weather range and capabilities for varied harsh environmental conditions. It has to include a high-quality camera, but also a variety of internal and external environment sensors and actors. Solution Focusing on giving precise data for applications ranging from remote sensing to atmospheric study The project, focusing on delivering precise data for applications ranging from remote sensing to atmospheric research, encountered a significant hurdle in the form of the camera's mounting position–facing upward toward the sky. This orientation exposed the system to direct sunlight, snow and ice, demanding unparalleled reliability. The VIVOTEK 360 Fisheye camera, FE9382-EHV-v2, was chosen for its high-quality imaging, reliability, and durability, particularly in extreme conditions. The system All Sky Imager, featuring this VIVOTEK 360 Fisheye camera, emerged as a pivotal component in mitigating the impact of environmental extremes. Automatic Full Sky Imaging: ASI-16 provided a 360° field of sky view, automated and scheduled capturing of high-resolution images, transmission of data and images to one or two SFTP server(s), backup of data to internal memory in case of server/network problems, and video life streams. Environmental Monitoring: Temperature, humidity, and solar irradiance data were captured by high-precision external sensors and are stored in datalogger-like files as well as within the jpg images. Rugged Design: Double shielding, forced ventilation, strong air heating, and a coated quartz glass dome ensured reliable operation in harsh environments. Heating is controlled by external temperature and dew point. Extended Temperature Range: Successfully tested under an extended temperature range of −40°C to +70 °C, with a tolerance of ±3°C. Amongst others, the system is installed on two icebreaker research vessels, one operated by Australia in Antarctic, and one operated by Canada in the Arctic. VADP Integration for Bespoke UI: CMS utilised VIVOTEK Application Development Platform (VADP) to craft a bespoke user interface–a seamless, user-friendly design offering a clean and intuitive experience. References: Solution is embraced by Institutes, Universities, Scientific Research, and the Energy Sector, including maritime and Icebreaker Deployment. Conclusion The collaborative efforts between CMS Ing. Dr. Schreder GmbH and VIVOTEK have resulted in an innovative Cloud Detection and All Sky Measurement system that effectively addresses the challenges of environmental extremes. This enhanced solution not only ensures reliability in demanding conditions but also contributes significantly to scientific research and environmental monitoring. Gerhard Papst, Head of Development at CMS, is highly impressed and deeply satisfied with the performance of VIVOTEK's cameras. The scale of this collaborative project now spans over 300 sites and continues to expand.
In response to the growing demand for enhanced security at renewable energy sites, Jacksons Fencing has recently completed the installation of 443 meters of EuroGuard® Flatform twin wire mesh fencing at a battery storage facility in the UK. As the UK accelerates its shift towards a sustainable energy grid, securing battery energy storage systems (BESS) is essential for ensuring energy security. This project represents a crucial step in protecting the infrastructure needed for a renewable future. Addressing the demand BESS plays a pivotal role in the UK’s renewable energy strategy by storing excess energy generated from wind and solar sources to balance supply and demand. As these facilities become more common, they face a heightened risk of theft, vandalism, and operational disruptions, making robust security solutions essential. Jackson Fencing delivered a tailored security solution, combining cost efficiency, scalability, and high-level protection. Tailored security solutions for a critical site The security needs of the battery storage facility included preventing unauthorised access, deterring vandalism, maintaining high visibility for security patrols and surveillance, accommodating future expansions cost-effectively, and facilitating smooth delivery and maintenance of large battery units. Jacksons Fencing addressed these needs by installing its EuroGuard® Flatform twin wire mesh fencing system around the site’s perimeter. This solution provides advanced security features with clear sightlines, ensuring effective monitoring while maintaining a budget-friendly approach. The unobtrusive design also preserves the surrounding rural landscape, contributing to a positive work environment. Vandal-resistant and anti-theft design EuroGuard® Flatform prevents breaches and fence panel theft, leading to gaps in the perimeter The EuroGuard® Flatform system’s twin wire mesh panels incorporate anti-tamper fixings placed on the secure side of the fence, ensuring the installation is highly resistant to vandalism and tampering. This feature is crucial for protecting the sensitive and valuable battery storage equipment housed on-site. By keeping the carefully designed fixings out of reach, EuroGuard® Flatform prevents breaches and fence panel theft, leading to gaps in the perimeter. With a 25-year guarantee, the fence provides comprehensive long-term protection for this vital infrastructure. High visibility and safety The mesh design of the EuroGuard® Flatform system allows high visibility for security personnel and surveillance systems, facilitating the early detection of potential threats. This high-visibility design also ensures that the fence blends into the rural landscape, preserving countryside views and fostering a pleasant environment for workers. Cost, space efficiency, and scalability For large-scale energy storage facilities, cost efficiency is a critical consideration. EuroGuard® Flatform system provides a secure yet budget-friendly solution without compromising on quality. Its modular design allows for easy scalability, enabling the facility to expand its security perimeter as it grows. By using a mesh clip installation system, the fencing can be extended to accommodate additional battery units while maintaining a high level of security. To further enhance operational efficiency, Jacksons Fencing installed a 6-meter wide mesh gate to streamline battery unit deliveries, reducing access points and enhancing security. Perimeter Intrusion Detection System (PIDS) PIDS ensures that any intrusion attempts are swiftly identified and addressed, even in isolated areas Given the facility’s remote location, Jacksons Fencing also integrated a Microphonic Perimeter Intrusion Detection System (PIDS) into the fence. This system is designed to detect any attempts to cut or breach the fence, providing an additional layer of security. The PIDS ensures that any intrusion attempts are swiftly identified and addressed, even in isolated areas. High-quality, scalable security solutions Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success, "Securing energy storage is crucial as the UK aims for a sustainable future, especially to double onshore wind to 30GW by 2030." "Installing EuroGuard® Flatform fencing at this battery storage facility shows our commitment to delivering high-quality, scalable security solutions that protect vital assets and support the UK's energy stability."
The client, a highly esteemed law enforcement agency, is responsible for maintaining order and ensuring the safety of its citizens. This national force operates across the entire country, with numerous establishments that require technologically advanced systems for effective operation. Their mission focuses on safeguarding the public, preventing, and detecting crime, and maintaining law and order. Upgrade the surveillance systems They had previously partnered with a globally recognised technology company for their technological requirements. However, a recent initiative to upgrade the surveillance systems in all major barracks across the country set forth a new challenge, requiring the introduction of a new, equally reliable technology partner. The challenge The objective was to modernise the video surveillance installations across their numerous establishments The national law enforcement agency sought to enhance its surveillance capabilities. Their objective was to modernise the video surveillance installations across numerous establishments throughout the country. This upgrade required both indoor and outdoor switches to connect the cameras being deployed. The sheer scale and complexity of the project demanded a reliable and efficient solution that could guarantee seamless connectivity and high performance. The solution The acre security expert team acknowledged that the client was already partnered with a renowned technology company, but their new requirements required the incorporation of another brand. Its comprehensive range of both indoor and outdoor switches offered the solution they needed. Acre proposed the integration of ComNet switches, ensuring uniformity across all locations. Recognising the importance of both technical specifications and after-sales support, they engaged in in-depth discussions with the project leaders. Our team's expertise and commitment to delivering high-quality solutions eventually convinced the client to introduce ComNet into their infrastructure. The result The installation of the new switches is still underway, but the early feedback has been extremely positive. The upgraded infrastructure is performing flawlessly, meeting the client's high expectations and requirements. The client has expressed satisfaction with the solution, reinforcing confidence in the tailored technological solutions.
Renowned as a significant entity in the power industry, the Indian Power Giant stands as a key player in India's public sector power utility domain. Under the auspices of the Ministry of Power, Government of India, it specialises in hydroelectric power generation and associated endeavours. With a steadfast commitment to providing clean, sustainable, and cost-effective energy, the Power Giant has successfully executed numerous large-scale hydroelectric projects, making substantial contributions to India's energy landscape. Business challenge The Indian Power Giant encountered a formidable obstacle with its existing video surveillance infrastructure, comprising 128 IP cameras and NVRs of disparate makes and models dispersed across its facility. Lack of video management software capable of seamlessly merging with third-party IP cameras This diversity in camera types presented a significant hurdle to centralised surveillance efforts, resulting in delayed detection of security incidents, prolonged response times, and an overall compromised security stance. Moreover, the lack of video management software capable of seamlessly integrating with various third-party IP cameras and NVRs compounded the issue. Key challenges Absence of a centralised video management solution for over 100 IP cameras and NVRs deployed at multiple locations within the facility. Difficulty in finding a Video Management Software (VMS) compatible with diverse third-party IP cameras and NVRs. Varied user interfaces of IP cameras and NVRs from different brands causing user confusion. Inability to integrate the Automatic Number Plate Recognition (ANPR) system with the existing VMS, missing out on enhanced access control and vehicle tracking opportunities. The Power Giant faced issues related to manual monitoring and tracking of vehicles entering or leaving their premises. Solution Remote surveillance became feasible from any location, ensuring continuous monitoring of the facility The deployment of Matrix SATATYA SAMAS-Video Management Software emerged as the solution to the Indian Power Giant’s challenges. SATATYA SAMAS seamlessly integrated all 128 third-party IP cameras and NVRs across the facility, facilitating smooth centralised video surveillance operations. The Admin Client simplified the addition of cameras and NVRs, while the Smart Client enabled effortless playback and monitoring. With the Mobile Client, remote surveillance became feasible from any location, ensuring continuous monitoring of the facility. SATATYA SAMAS effectively addressed the hurdles, providing a user-friendly video management system that significantly enhanced overall security system efficacy. Furthermore, Matrix introduced an Automatic Number Plate Recognition (ANPR) solution at 12 entry points within the power plant premises. This strategic implementation mandated vehicle authentication at the entry gates, allowing access only upon successful authentication. The ANPR solution captured licence plate data, converted it into digital format, and securely stored it in the database, bolstering security measures and establishing a robust record-keeping system for enhanced monitoring and vehicular access control. All in all, Matrix enhanced security for the Indian Power Giant. Products offered Matrix Licence Dongle 200: USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100: Licence for Adding 100 Additional Cameras SATATYA SAMAS CAM20: Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM05: Licence for Adding 5 Additional Cameras SATATYA SAMAS USER03: 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR10: Automatic Number Plate Recognition (ANPR) Licence for 10 Cameras SATATYA SAMAS ANPR01: Automatic Number Plate Recognition Licence for 1 Camera Benefits Interoperability: SATATYA SAMAS facilitated seamless integration with all third-party IP cameras and NVRs, regardless of their models or brands, ensuring a unified and interoperable video management system. Efficient Monitoring: The centralised video surveillance system enabled comprehensive monitoring from a single interface. Effortless Management and Playback: The user-friendly Admin Client simplified camera and NVR management, while the Smart Client facilitated easy playback and monitoring for prompt security responses. Remote Monitoring: The Mobile Client enabled on-the-go surveillance from any location, coupled with instant notifications and alerts for swift response. Enhanced Access Control: Matrix's ANPR solution enhanced access control by authenticating vehicles. Improved Vehicle Tracking: The ANPR solution facilitated accurate vehicle tracking and security through licence plate capture and storage.


Round table discussion
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Products


White papers

How to lower labour costs when installing video surveillance
Download
Guide for HAAS: New choice of SMB security system
Download
11 advantages of a combined system for access control and intrusion
Download
Automatic vehicle identification
Download
Cloud video and smart cities
Download
Security investments retailers should consider for their 2021 budget
Download
Sinaloa, Mexico: Connected cities are safer cities
Download
How to overcome the storage challenges of adopting surveillance AI
Download
Record locally, view centrally, manage remotely
Download

Videos
Remote surveillance: Manufacturers & Suppliers

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download