Remote surveillance
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the company has produced a new series of educational videos. Consisting of five segments ranging from just over four minutes to a little more than seven, the series is designed to provide a synopsis of remote guarding along with more detail on some of the key aspects in a straightforward and easily digestible way. Panel of subject matter exp...
At ISC East 2024, Hanwha Vision (Booth 607) is redefining the role of surveillance technology as a total business solution. The company is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence tools delivering new data-driven business insights. AI in Hanwha Vision’s IP cameras Attendees will see new applications of AI in Hanwha Vision’s IP cameras and new c...
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact...
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a flexible, rapidly deployable CCTV town centre network extension for Plymouth City Council. Designed to cover hot spots of activity, both criminal and anti-social, the extension was required to tackle areas of rising anti-social behaviour and surfacing security issues at disparate areas around Plymouth. Invictus Hybrid camera &l...
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendee...
At GSX 2024, Hanwha Vision (Booth #1701) is highlighting its full range of AI-powered, cloud-connected surveillance solutions, from hardware devices offering 24/7 protection to software-based business intelligence delivering new data-driven business insights. GSX attendees will see new applications of AI in Hanwha Vision’s IP cameras enabling precise detection, robust search, elevated data analysis, and enhanced image quality. Intelligent software solutions With the new OnCloud VMS...
News
March Networks®, a pioneer in intelligent video surveillance, recently participated in the 33rd Forum of Aditel (Association of Interbank Remote Surveillance Users) in Marseille, France. Aditel is a French association that focuses on improving security and surveillance systems across the banking sector in France. Peter Strom, CEO of March Networks, along with March Networks' team in France engaged with leaders from France's top banks and discussed the latest security trends shaping the French financial sector. Advanced video technology As a surveillance solutions provider for France's banking industry, March Networks contributed to several discussions on how financial institutions can step up their security, efficiency and client experience using advanced video technology like AI, real-time alerts, and data analytics. The event also provided the opportunity to connect with Didier Moreau, President of Aditel, and key customers and contacts in the banking industry including Groupe BPCE (a cooperative group for banking and insurance). Video surveillance systems The team demonstrated some of March Networks financial sector solutions such as: Integrated video surveillance with ATM and teller transactions Proactive alerts for fraud High quality ATM cameras and notifications for ATM attacks Advanced loitering detection for ATM vestibules and other public areas Remote access and centralised management of video feeds across branches March Networks looks forward to continued partnerships with the French banking industry, helping financial institutions do more with their video surveillance systems.
Waterfall Security is delighted to announce the launch of HERA™-Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organisations to reap the operational and economical value of remotely accessing and controlling OT devices and workstations, without introducing the risks that come with external connectivity. Remote access is one of the weakest links when it comes to OT cybersecurity. For cyber-physical systems and OT environments, "opening up" the OT network to external internet connectivity to enable remote access, is below the bar required to keep operations safe and secure. Waterfall's new HERA solution HERA physically maintains network segmentation, keeping OT environments safe and secured With Waterfall's new HERA solution, enterprise-grade remote access capabilities are enabled and secured with engineering-grade security. Leveraging Waterfall's battle-tested hardware platform, HERA physically maintains network segmentation, keeping OT environments safe and secured. "HERA represents a giant leap in how the industry approaches remote access into OT environments," explains Lior Frenkel, CEO and Co-founder of Waterfall Security. "By applying physical cybersecurity over cyber-physical systems, Waterfall Security's solutions enable zero compromise between industrial cybersecurity and functionality." HERA's patented technology Frenkel added: "Together with our market-pioneering Unidirectional Gateway technology, Waterfall Security provides a holistic solution for customers with OT environments and cyber-physical assets." HERA's patented technology has been designed from the ground up with OT cybersecurity in mind. It harnesses decades of know-how, expertise, and field-tested technology to deliver the safest solution to remotely access OT networks.
Elite Interactive Solutions (EIS), a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, has named John Valdez as the company’s new Vice President of Sales. A senior pioneer with 25 years of experience working for Fortune 500 companies and start-up ventures, Valdez’s responsibilities include heading up Elite’s sales department with oversight of business development representatives and a lead generation call centre. Sales leadership record “John Valdez brings a wealth of experience and a proven track record in sales leadership to Elite. His strategic vision, combined with his relentless drive for success, will propel our sales team to new heights,” says Elite President - Michael Zatulov. He adds, “We are thrilled to welcome him aboard and confident that, under his guidance, Elite will reach unprecedented levels of growth and success.” Valdez's experience An expert in threat assessment and active shooter response, he has participated in speaking engagements Valdez has sat on multiple executive boards, including serving as Chairman of the Board at SIMGAD Solar. He began his career at Enterprise Holdings, where he spent 19 years, ascending to the position of Executive Officer. Valdez’s 12+ years of security industry experience kicked off with Allied Universal in 2012 as a V.P. of Business Development. Other security roles include Chief Development Officer during an earlier stint at Elite, and CEO at JEV Security Consultants. An expert in threat assessment and active shooter response, he has participated in speaking engagements at several security conferences and seminars. Crime prevention solution "It is rare to come across an organisation like Elite with a disruptive innovation that positively impacts the world," says John Valdez, adding "I'm honoured to work alongside Michael Zatulov and Aria Kozak (Founder, known as ‘The Father of Remote Guarding’) as I lead our sales division to new heights." He continues, "Elite’s crime prevention solution is world-class and unparalleled in the security industry. I look forward to developing my team and exponentially growing our marketplace." Valdez's education Originally from Barstow, Calif., John Valdez grew up in the iconic neighbourhood of Tortilla Flats. He went on to earn an undergraduate degree in Business Administration from Cal State San Bernardino and is currently an MBA candidate in Business Management at Purdue University. Valdez is married to his high school sweetheart, Toni, of 31 years, and has two adult daughters (Isabelle and Eliana).
Cloudbrink, the personal SASE provider, has named Graphene Networks as a distribution partner for North America. North Carolina-based Graphene Networks, a specialist in managed WAN edge services, will supply the Cloudbrink service to technology service distributors (TSDs) as a VPN replacement and high-performance alternative to ZTNA. Traditional SD-WAN solutions Cloudbrink provides fast, secure access to SaaS, cloud, and on-prem applications. Graphene sells managed network services and supports pioneering platforms such as VMware, Palo Alto, and others with a focus on SD-WAN. Traditional SD-WAN solutions are premises-based, but users are increasingly transient posing security and manageability challenges for IT pioneers, particularly in the network last-mile. The Cloudbrink service closes this gap with ultra-low-latency connectivity, edge-native security, and end-to-end visibility for IT teams. Easy-to-manage work-from-anywhere solution Prakash Mana, CEO of Cloudbrink, said, "Graphene brings a wealth of SD-WAN experience, which will be invaluable when customers either want to extend traditional SD-WAN deployments to the edge or deploy Cloudbrink on its own as a powerful, easy-to-manage work-from-anywhere solution." Dwight Wilhelm, CEO of Graphene Networks, said, "In the hybrid work era users are demanding secure and reliable office-grade connectivity, but you can’t put SD-WAN everywhere." Software agent-based, edge-native solution Dwight Wilhelm adds, "Cloudbrink provides a software agent-based, edge-native solution that significantly enhances user experience, improves overall security, and also makes life simple for the IT team with no hardware to deploy and everything configured and managed centrally." Graphene Networks is targeting customers in industries with large populations of hybrid or mobile workers, such as healthcare where clinicians are increasingly doing remote consults over video links, and insurance, where road-bound agents need reliable access to customer-facing applications.
Educational institutions are witnessing an ever-growing technology integration, be it interactive whiteboards or online learning platforms. Technology is reshaping how we teach and how students learn. Let’s zoom in on a different branch of technology used in education - video analytics. Imagine a tool that captures video and analyses captured footage using artificial intelligence (AI). Video analytics in K-12 education Video analytics in K-12 education can gain insights and identify patterns that could help school safety, security, and operations. By utilising AI, education video analytics systems can detect anomalies, monitor campus activities, and aid in incident investigations. This technology goes beyond watching recorded footage, it’s about leveraging technology to create safer, more efficient learning environments for students. This article dives deeper into AI video analytics in school security so users can decide whether it’s right for them. Understanding AI video analytics It’s like having an intelligent security assistant who watches over the school campus 24/7 Video analytics monitors, analyses, and manages massive amounts of video using modern algorithms and machine learning (ML). It’s like having an intelligent security assistant who watches over the school campus 24/7. Let’s look at the critical components of a video analytics system. Users have cameras which are the eyes of the operation, capturing all the action. Recognise, identify and understand Then, some sensors pick up additional data, such as motion or sound. But the real magic happens with AI-powered analytical software. Video analytics is the brain behind the cameras, helping them do more than record footage. With AI in the mix, video analytics becomes even more powerful. AI adds a layer of brain power by teaching the system to recognise patterns, identify objects, and understand human behaviour. Applications in K-12 Education The use of AI in education in conjunction with video analytics can create safer learning environments where students can thrive and succeed. Here is how AI video analytics can be used in K-12 education: Enhancing school security AI video analytics constantly monitor the school’s activities to ensure the safety of its students and staff AI video analytics constantly monitor the school’s activities to ensure the safety of its students and staff. It can flag anything out of the ordinary. For instance, someone lingering in a restricted area or a sudden change in lighting. It can even recognise faces or license plates, helping to track down missing students or identify unauthorised visitors. By constantly scanning the premises, AI video analytics is a proactive measure against potential threats. This approach helps maintain a secure environment for teaching and learning. Facilitating incident investigation In the unfortunate event of an incident, such as bullying, theft, or vandalism, AI-based video analytics can expedite and streamline the investigation process. Analysing video footage can provide vital insights into events, assisting authorities in resolving conflicts and responding to situations quickly. For example, AI video analytics can provide valuable insights into a physical altercation. It can help identify the participants, trace their activities, and give critical evidence for disciplinary action or legal procedures. AI video analytics speeds up the investigative process by quickly analysing large volumes of data, ensuring a thorough and correct reaction to accidents. Supporting conflict resolution AI video analytics offers objective, evidence-based insights into interpersonal disputes or disciplinary issues. By analysing video evidence, it is possible to uncover the root causes of conflicts. Video footage can also estimate the severity of situations and support constructive solutions. AI video analytics can detect patterns of behaviour, monitor interactions, and provide useful evidence For example, in cases of bullying or harassment, AI video analytics can detect patterns of behaviour, monitor interactions, and provide useful evidence for intervention or counseling. With their ability to recognise subtle cues and behaviours, these systems help institutions efficiently manage problems. As a result, it can promote a secure and inclusive learning environment for all students. Enabling emergency response AI video analytics ensures a timely and coordinated response during crises, such as fire drills or lockdowns. Monitoring crowd behaviour and identifying potential threats or bottlenecks enables authorities to assess the situation and apply relevant safety measures. For example, during a lockdown, AI video analytics may follow individual movements, detect security breaches, and offer real-time information to first responders. AI video analytics improves the effectiveness of emergency response systems by analysing complicated circumstances and providing actionable insights. 5 benefits for educators and administrators Video analytics in K-12 education benefits students, educators, and administrators alike. Here are five advantages to remember: Enhanced safety and security AI-powered security solutions add an extra layer of protection by continuously monitoring activity and detecting potential threats in real time. These systems operate as vigilant watchdogs, identifying unauthorised individuals and detecting aberrant behaviour patterns to prevent situations from escalating. Efficient resource allocation Administrators can make better resource allocation, scheduling, and facility management decisions AI video analytics optimises resource allocation by giving helpful information on campus operations and utilisation. Administrators can make better resource allocation, scheduling, and facility management decisions based on various metrics. These metrics include student movement, facility usage, and traffic patterns. This results in more efficient resource use, better logistical planning, and increased productivity. Data-driven decision-making AI video analytics helps institutions make data-driven decisions by analysing large volumes of data quickly and accurately. For instance, these systems can help customise instructional tactics, identify growth areas, and personalise student learning experiences. This is made possible by video analytics’ actionable insights into student behaviour, academic performance, and campus dynamics. Similarly, admins can utilise data analytics to evaluate policy efficacy, monitor key performance indicators (KPIs), and promote continuous improvement throughout the school ecosystem. Proactive intervention and support Educators can help children achieve academically and emotionally. Video analytics can help monitor student behaviour patterns, spot symptoms of discomfort or disengagement, and highlight possible problems early on. This proactive approach to student support creates a positive learning environment where all students feel appreciated and encouraged to achieve their full potential. Streamlined operations and workflow AI-powered security tools can automate routine tasks like visitor access and tracking school attendance AI video analytics improves operations by automating regular tasks and optimising workflow processes. AI-powered security tools can automate routine tasks like visitor access and tracking school attendance. Automation allows educational institutions to focus on more strategic objectives. As a result, it can lead to smoother operations and higher employee morale. Challenges and considerations Implementing AI video analytics in K-12 education comes with its challenges. Here are the potential hurdles and considerations of education video analytics: Privacy concerns: Schools must establish policies and procedures for data collection, storage, and usage. They must comply with relevant regulations such as the Family Educational Rights and Privacy Act (FERPA). Also, implementing data encryption and access controls can safeguard sensitive information. Resource constraints: Limited budgets and resources can pose challenges when adopting AI video analytics. Schools can overcome this by exploring cost-effective security technology solutions. They can also leverage open-source software and seek partnerships with technology providers. Training staff and educators on using AI tools effectively may also help. Technical limitations: Schools should conduct thorough testing and pilot programmes to identify and address technical hurdles early Technical challenges may arise, such as compatibility issues and system integration complexities. Schools should conduct thorough testing and pilot programmes to identify and address technical hurdles early. Work with experienced vendors or seek expert guidance to help mitigate these technical risks. Ethical use of AI: Schools must prioritise transparency, fairness, and accountability when implementing AI video analytics. Educating stakeholders on the ethical implications of AI technology and cultivating an ethical decision-making culture are critical steps in promoting responsible AI use in education. Unlocking school’s potential with AI solutions by BCD With its capabilities, AI video analytics can transform K-12 education. Unlock the school’s potential with BCD’s AI-ready solutions tailored to the unique needs of educational institutions. Since 1999, BCD has been at the forefront of purpose-built video storage solutions. It partners with globally known security pioneers to provide AI video surveillance systems. With their security technology and commitment to customer satisfaction, schools can create safer, more engaging learning environments for their students.
Interface Systems, a renowned managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has announced the launch of an enhanced intelligent voice-down system. This updated solution now seamlessly integrates with Interface Systems’ Interactive Security Operations Centre (iSOC), allowing for immediate intervention by remote specialists to augment AI-powered automated deterrents. Voice-down system As quick-service restaurants (QSRs) and retail establishments continue to battle loitering, vandalism, and burglaries, they are looking for effective solutions to automatically detect and discourage loitering and other suspicious activity. Interface’s intelligence voice-down system can proactively detect individuals and vehicles loitering or behaving suspiciously by leveraging state-of-the-art AI-enabled cameras. Live video and audio feeds If the threat persists even after delivering automated voice-down commands, the system will escalate the issue It uses customisable audio messages, auxiliary lighting, and sirens to effectively alert potential troublemakers to the security presence and possible law enforcement response. If the threat persists even after delivering automated voice-down commands, the system will escalate the issue to remote intervention specialists at the iSOC. Using live video and audio feeds, intervention specialists can quickly assess the situation and take appropriate action, including notifying law enforcement. Proactive security measures "Interface Systems remains committed to delivering innovative solutions that enhance security, streamline operations, and provide peace of mind for businesses nationwide," said Steve Womer, SVP of Engineering at Interface Systems. He adds, "Our upgraded intelligent voice-down solution represents a significant step forward in proactive security measures for our customers." AI-detection technology Steve Womer continues, "By integrating remote intervention capabilities directly into our intelligent voice-down system, Interface is responding faster than ever to potential threats, safeguarding customer premises and ensuring the safety of their customers and staff." The enhanced voice-down solution can also be deployed for retail, restaurant, and car wash chains that are already leveraging Interface’s Virtual Security Guard services. This integration offers a comprehensive security solution that combines cutting-edge AI-detection technology with expert human oversight.


Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
EQUANS were engaged by JLL to create a Digital Artwork Display using LED to showcase immersive content and create a high tech but nature-driven aesthetic at one of Melbourne’s premier business addresses. Digital Artwork Display The Digital Artwork Display had to encompass functional requirements, including LED video wall display, a display interface unit for image processing, LED time module control and remote monitoring, a digital playback server capable of displaying the artwork’s intense digital content, and a control interface accessible via web browser and mobile tablet device. The display’s aspect ratio of 32:9 presented a unique and challenging canvas for content creation. To ensure the highest aesthetic standards, any content had to be able to be displayed in its native aspect without stretching or compressing. The Solution This project is a real-time artwork with interactive waves, tides and currents from an island cluster This project is a real-time artwork with interactive waves, tides and currents from an island cluster in Australia. The PC that the artwork is generated from reads the tidal information in real time and converts it into the artwork. As the wind blows, waves ripple across the screen and during high tide the islands are covered with water. A digital set-top box allows display of commercial TV channels for breaking news and events, if relevant to the building occupants. The LED cabinets are mounted onto a custom aluminum-extruded mounting frame to ensure sub-millimetre accuracy required for an extremely flat image without visible cabinet lines. Sound system with 25 speakers installed To support the video art, a sound system with 25 speakers across three separate zones and 8 audio channels allows for optimal tuning and configuration. The audio resides on a QSC digital sound processor platform supporting network audio. This enables visitors to listen to highest quality sound from a range of audio sources. Control of the video wall takes place via a Crestron control system with a wireless touch panel that technicians can access from the foyer. All head-end equipment is powered by a 2KVA uninterrupted power supply, allowing soft power downs in case of power outages, helping extend the life of the system. The Benefit EQUANS have implemented ground-breaking technology at Freshwater Place’s newly refurbished foyer. The publicly accessible digital artwork provides an opportunity for all building occupants to engage with interactive, situational and customised technology. The 11x3m Silicon Core LED screen and audio system was a successful installation from EQUANS ANZ. Overview Key facts: 25 speakers across three separate zones & 8 audio channels Unique display aspect ratio 32:9
360 Vision Technology, the UK manufacturer of ruggedised HD, radar and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Invictus TX cameras for STC car parks Daniel Chappell, Technical Account Manager at North takes up the story: “Historically, South Shields had an existing public safety CCTV system, which was mainly street focused. However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate to a new surveillance solution, to cover its twelve town centre car parks.” He adds, “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirement and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation.” Low-cost video transmission Daniel Chappell continues, “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibre optic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive.” He further states, “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling.” Securing the best 4G network supplier The new Invictus PTZ TX cameras are now securing STC car parks with video streaming Daniel Chappell adds, “Taking-up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross referenced with network operators to provide the best quality of signal at each specific camera location.” Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are now securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. Control room monitoring In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said: “This investment forms part of wider improvements to our CCTV provision, which is a vital tool in helping to keep our residents and visitors safe.” Reliable video system for monitoring the cameras He adds, “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security and management of the car parks. Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real time more quickly and effectively.” Councillor Jim Foreman continues, “The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness and surveillance.” Close-up imaging and enhanced night-time vision The 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens Featuring continuous rotation pan, unobstructed 360-degree view and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 30x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. Daniel Chappell explains, “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available.” Advanced functionality Daniel Chappell adds, “This advanced functionality offers peace-of-mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras are now providing comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Integrated LED white light technology Adrian Kirk, Business Development Director at 360 Vision Technology, commented: “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks.” Adrian Kirk adds, “For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper and more defined colour images, even at night-time. We are proud to have delivered a practical Invictus TX based camera solution as part of the STC CCTV network upgrade.”
VIVOTEK successfully partnered with CMS, a pioneering provider of solar radiation measuring and analysis solutions, to implement an innovative Cloud Detection and All Sky Measurement system. The project aimed at delivering accurate and reliable data for applications such as weather and cloud observations, atmospheric and climate research, solar irradiance monitoring, and irradiance nowcasting for photovoltaic plants. Challenge CMS faced the challenge of developing a robust Cloud Detection and All Sky Measurement system with wide temperature and weather range and capabilities for varied harsh environmental conditions. It has to include a high-quality camera, but also a variety of internal and external environment sensors and actors. Solution Focusing on giving precise data for applications ranging from remote sensing to atmospheric study The project, focusing on delivering precise data for applications ranging from remote sensing to atmospheric research, encountered a significant hurdle in the form of the camera's mounting position–facing upward toward the sky. This orientation exposed the system to direct sunlight, snow and ice, demanding unparalleled reliability. The VIVOTEK 360 Fisheye camera, FE9382-EHV-v2, was chosen for its high-quality imaging, reliability, and durability, particularly in extreme conditions. The system All Sky Imager, featuring this VIVOTEK 360 Fisheye camera, emerged as a pivotal component in mitigating the impact of environmental extremes. Automatic Full Sky Imaging: ASI-16 provided a 360° field of sky view, automated and scheduled capturing of high-resolution images, transmission of data and images to one or two SFTP server(s), backup of data to internal memory in case of server/network problems, and video life streams. Environmental Monitoring: Temperature, humidity, and solar irradiance data were captured by high-precision external sensors and are stored in datalogger-like files as well as within the jpg images. Rugged Design: Double shielding, forced ventilation, strong air heating, and a coated quartz glass dome ensured reliable operation in harsh environments. Heating is controlled by external temperature and dew point. Extended Temperature Range: Successfully tested under an extended temperature range of −40°C to +70 °C, with a tolerance of ±3°C. Amongst others, the system is installed on two icebreaker research vessels, one operated by Australia in Antarctic, and one operated by Canada in the Arctic. VADP Integration for Bespoke UI: CMS utilised VIVOTEK Application Development Platform (VADP) to craft a bespoke user interface–a seamless, user-friendly design offering a clean and intuitive experience. References: Solution is embraced by Institutes, Universities, Scientific Research, and the Energy Sector, including maritime and Icebreaker Deployment. Conclusion The collaborative efforts between CMS Ing. Dr. Schreder GmbH and VIVOTEK have resulted in an innovative Cloud Detection and All Sky Measurement system that effectively addresses the challenges of environmental extremes. This enhanced solution not only ensures reliability in demanding conditions but also contributes significantly to scientific research and environmental monitoring. Gerhard Papst, Head of Development at CMS, is highly impressed and deeply satisfied with the performance of VIVOTEK's cameras. The scale of this collaborative project now spans over 300 sites and continues to expand.
In response to the growing demand for enhanced security at renewable energy sites, Jacksons Fencing has recently completed the installation of 443 meters of EuroGuard® Flatform twin wire mesh fencing at a battery storage facility in the UK. As the UK accelerates its shift towards a sustainable energy grid, securing battery energy storage systems (BESS) is essential for ensuring energy security. This project represents a crucial step in protecting the infrastructure needed for a renewable future. Addressing the demand BESS plays a pivotal role in the UK’s renewable energy strategy by storing excess energy generated from wind and solar sources to balance supply and demand. As these facilities become more common, they face a heightened risk of theft, vandalism, and operational disruptions, making robust security solutions essential. Jackson Fencing delivered a tailored security solution, combining cost efficiency, scalability, and high-level protection. Tailored security solutions for a critical site The security needs of the battery storage facility included preventing unauthorised access, deterring vandalism, maintaining high visibility for security patrols and surveillance, accommodating future expansions cost-effectively, and facilitating smooth delivery and maintenance of large battery units. Jacksons Fencing addressed these needs by installing its EuroGuard® Flatform twin wire mesh fencing system around the site’s perimeter. This solution provides advanced security features with clear sightlines, ensuring effective monitoring while maintaining a budget-friendly approach. The unobtrusive design also preserves the surrounding rural landscape, contributing to a positive work environment. Vandal-resistant and anti-theft design EuroGuard® Flatform prevents breaches and fence panel theft, leading to gaps in the perimeter The EuroGuard® Flatform system’s twin wire mesh panels incorporate anti-tamper fixings placed on the secure side of the fence, ensuring the installation is highly resistant to vandalism and tampering. This feature is crucial for protecting the sensitive and valuable battery storage equipment housed on-site. By keeping the carefully designed fixings out of reach, EuroGuard® Flatform prevents breaches and fence panel theft, leading to gaps in the perimeter. With a 25-year guarantee, the fence provides comprehensive long-term protection for this vital infrastructure. High visibility and safety The mesh design of the EuroGuard® Flatform system allows high visibility for security personnel and surveillance systems, facilitating the early detection of potential threats. This high-visibility design also ensures that the fence blends into the rural landscape, preserving countryside views and fostering a pleasant environment for workers. Cost, space efficiency, and scalability For large-scale energy storage facilities, cost efficiency is a critical consideration. EuroGuard® Flatform system provides a secure yet budget-friendly solution without compromising on quality. Its modular design allows for easy scalability, enabling the facility to expand its security perimeter as it grows. By using a mesh clip installation system, the fencing can be extended to accommodate additional battery units while maintaining a high level of security. To further enhance operational efficiency, Jacksons Fencing installed a 6-meter wide mesh gate to streamline battery unit deliveries, reducing access points and enhancing security. Perimeter Intrusion Detection System (PIDS) PIDS ensures that any intrusion attempts are swiftly identified and addressed, even in isolated areas Given the facility’s remote location, Jacksons Fencing also integrated a Microphonic Perimeter Intrusion Detection System (PIDS) into the fence. This system is designed to detect any attempts to cut or breach the fence, providing an additional layer of security. The PIDS ensures that any intrusion attempts are swiftly identified and addressed, even in isolated areas. High-quality, scalable security solutions Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success, "Securing energy storage is crucial as the UK aims for a sustainable future, especially to double onshore wind to 30GW by 2030." "Installing EuroGuard® Flatform fencing at this battery storage facility shows our commitment to delivering high-quality, scalable security solutions that protect vital assets and support the UK's energy stability."
The client, a highly esteemed law enforcement agency, is responsible for maintaining order and ensuring the safety of its citizens. This national force operates across the entire country, with numerous establishments that require technologically advanced systems for effective operation. Their mission focuses on safeguarding the public, preventing, and detecting crime, and maintaining law and order. Upgrade the surveillance systems They had previously partnered with a globally recognised technology company for their technological requirements. However, a recent initiative to upgrade the surveillance systems in all major barracks across the country set forth a new challenge, requiring the introduction of a new, equally reliable technology partner. The challenge The objective was to modernise the video surveillance installations across their numerous establishments The national law enforcement agency sought to enhance its surveillance capabilities. Their objective was to modernise the video surveillance installations across numerous establishments throughout the country. This upgrade required both indoor and outdoor switches to connect the cameras being deployed. The sheer scale and complexity of the project demanded a reliable and efficient solution that could guarantee seamless connectivity and high performance. The solution The acre security expert team acknowledged that the client was already partnered with a renowned technology company, but their new requirements required the incorporation of another brand. Its comprehensive range of both indoor and outdoor switches offered the solution they needed. Acre proposed the integration of ComNet switches, ensuring uniformity across all locations. Recognising the importance of both technical specifications and after-sales support, they engaged in in-depth discussions with the project leaders. Our team's expertise and commitment to delivering high-quality solutions eventually convinced the client to introduce ComNet into their infrastructure. The result The installation of the new switches is still underway, but the early feedback has been extremely positive. The upgraded infrastructure is performing flawlessly, meeting the client's high expectations and requirements. The client has expressed satisfaction with the solution, reinforcing confidence in the tailored technological solutions.
Renowned as a significant entity in the power industry, the Indian Power Giant stands as a key player in India's public sector power utility domain. Under the auspices of the Ministry of Power, Government of India, it specialises in hydroelectric power generation and associated endeavours. With a steadfast commitment to providing clean, sustainable, and cost-effective energy, the Power Giant has successfully executed numerous large-scale hydroelectric projects, making substantial contributions to India's energy landscape. Business challenge The Indian Power Giant encountered a formidable obstacle with its existing video surveillance infrastructure, comprising 128 IP cameras and NVRs of disparate makes and models dispersed across its facility. Lack of video management software capable of seamlessly merging with third-party IP cameras This diversity in camera types presented a significant hurdle to centralised surveillance efforts, resulting in delayed detection of security incidents, prolonged response times, and an overall compromised security stance. Moreover, the lack of video management software capable of seamlessly integrating with various third-party IP cameras and NVRs compounded the issue. Key challenges Absence of a centralised video management solution for over 100 IP cameras and NVRs deployed at multiple locations within the facility. Difficulty in finding a Video Management Software (VMS) compatible with diverse third-party IP cameras and NVRs. Varied user interfaces of IP cameras and NVRs from different brands causing user confusion. Inability to integrate the Automatic Number Plate Recognition (ANPR) system with the existing VMS, missing out on enhanced access control and vehicle tracking opportunities. The Power Giant faced issues related to manual monitoring and tracking of vehicles entering or leaving their premises. Solution Remote surveillance became feasible from any location, ensuring continuous monitoring of the facility The deployment of Matrix SATATYA SAMAS-Video Management Software emerged as the solution to the Indian Power Giant’s challenges. SATATYA SAMAS seamlessly integrated all 128 third-party IP cameras and NVRs across the facility, facilitating smooth centralised video surveillance operations. The Admin Client simplified the addition of cameras and NVRs, while the Smart Client enabled effortless playback and monitoring. With the Mobile Client, remote surveillance became feasible from any location, ensuring continuous monitoring of the facility. SATATYA SAMAS effectively addressed the hurdles, providing a user-friendly video management system that significantly enhanced overall security system efficacy. Furthermore, Matrix introduced an Automatic Number Plate Recognition (ANPR) solution at 12 entry points within the power plant premises. This strategic implementation mandated vehicle authentication at the entry gates, allowing access only upon successful authentication. The ANPR solution captured licence plate data, converted it into digital format, and securely stored it in the database, bolstering security measures and establishing a robust record-keeping system for enhanced monitoring and vehicular access control. All in all, Matrix enhanced security for the Indian Power Giant. Products offered Matrix Licence Dongle 200: USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100: Licence for Adding 100 Additional Cameras SATATYA SAMAS CAM20: Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM05: Licence for Adding 5 Additional Cameras SATATYA SAMAS USER03: 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR10: Automatic Number Plate Recognition (ANPR) Licence for 10 Cameras SATATYA SAMAS ANPR01: Automatic Number Plate Recognition Licence for 1 Camera Benefits Interoperability: SATATYA SAMAS facilitated seamless integration with all third-party IP cameras and NVRs, regardless of their models or brands, ensuring a unified and interoperable video management system. Efficient Monitoring: The centralised video surveillance system enabled comprehensive monitoring from a single interface. Effortless Management and Playback: The user-friendly Admin Client simplified camera and NVR management, while the Smart Client facilitated easy playback and monitoring for prompt security responses. Remote Monitoring: The Mobile Client enabled on-the-go surveillance from any location, coupled with instant notifications and alerts for swift response. Enhanced Access Control: Matrix's ANPR solution enhanced access control by authenticating vehicles. Improved Vehicle Tracking: The ANPR solution facilitated accurate vehicle tracking and security through licence plate capture and storage.


Round table discussion
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products


White papers

How to lower labour costs when installing video surveillance
Download
Guide for HAAS: New choice of SMB security system
Download
11 advantages of a combined system for access control and intrusion
Download
Automatic vehicle identification
Download
Cloud video and smart cities
Download
Security investments retailers should consider for their 2021 budget
Download
Sinaloa, Mexico: Connected cities are safer cities
Download
How to overcome the storage challenges of adopting surveillance AI
Download
Record locally, view centrally, manage remotely
Download

Videos
Remote surveillance: Manufacturers & Suppliers

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download