Remote surveillance
Waterfall Security is delighted to announce the launch of HERA™-Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organisations to reap the operational and economical value of remotely accessing and controlling OT devices and workstations, without introducing the risks that come with external connectivity. Remote access is one of the weakest links when it comes to OT cy...
Elite Interactive Solutions (EIS), a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, has named John Valdez as the company’s new Vice President of Sales. A senior pioneer with 25 years of experience working for Fortune 500 companies and start-up ventures, Valdez’s responsibilities include heading up Elite’s sales department with oversight of business development representatives and a lead generation call centre.&n...
Cloudbrink, the personal SASE provider, has named Graphene Networks as a distribution partner for North America. North Carolina-based Graphene Networks, a specialist in managed WAN edge services, will supply the Cloudbrink service to technology service distributors (TSDs) as a VPN replacement and high-performance alternative to ZTNA. Traditional SD-WAN solutions Cloudbrink provides fast, secure access to SaaS, cloud, and on-prem applications. Graphene sells managed network services and suppor...
Educational institutions are witnessing an ever-growing technology integration, be it interactive whiteboards or online learning platforms. Technology is reshaping how we teach and how students learn. Let’s zoom in on a different branch of technology used in education - video analytics. Imagine a tool that captures video and analyses captured footage using artificial intelligence (AI). Video analytics in K-12 education Video analytics in K-12 education can gain insights...
Interface Systems, a renowned managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has announced the launch of an enhanced intelligent voice-down system. This updated solution now seamlessly integrates with Interface Systems’ Interactive Security Operations Centre (iSOC), allowing for immediate intervention by remote specialists to augment AI-powered automated deterrents. Voice-down system As quick-service restaurants (QSRs...
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and...
News
British universities are cited as some of the best in the world; working on cutting-edge and revolutionary research. Physical security measures The Director General of MI5 and senior politicians warned last week these institutions are being targeted for their intellectual property (IP) by hostile states and spies and as a result, this is a threat to national security. In the face of this, universities must work at speed to increase their physical security measures and keep their academia and research safe, while balancing the need for an open exchange of ideas that is vital to academic progress. Open sharing and collaboration Noah Price, G4S Academy International Director, said, “Threats against universities are on the increase and are expected to rise further." "Hostile states target universities because unlike government agencies or security services, these institutions prioritise the open sharing and collaboration of research, ideas, and education, which can make them more vulnerable to cyber-attacks and espionage." Multi-layered security Intellectual property theft committed by an external threat actor is expected to increase by 30% in the UK "Universities working on cutting-edge research need to implement targeted multi-layered security as a matter of urgency to protect sensitive research.” Intellectual property theft committed by an external threat actor is expected to increase by 30% in the UK in the next year, according to G4S’s first-ever World Security Report. Insider threats A preventative measure being considered by the UK government is for academics involved in critical scientific research at British universities to undergo vetting by security services. With internal threats expected to increase next year according to 94% of UK Chief Security Officers, vetting of university staff and regular re-vetting are actions G4S supports. Unauthorised access “Leaking of sensitive information, unauthorised access to company data or networks, and intellectual property theft are all expected by almost a third of respondents to our survey,” Price said. “Vetting and regular re-vetting are a really good physical security measure to detect those trying to infiltrate an organisation, or to see if anyone has been turned.” What physical security measures can be taken? AI surveillance systems may also be another; allowing security officers to monitor the movements Universities must implement a robust security operation preventing both physical and cyber threats. Implementing two-factor authentication on research devices, as well as passcode or biometric access controls are just two examples. AI surveillance systems may also be another; allowing security officers to monitor the movements of individuals ethically. Documents access Institutions should also monitor who is accessing certain documents on their devices. If there is no need for an individual to be reading a piece of research this could be a sign they are attempting to access confidential information and may be an insider. Price said, “While we all want universities to share academia, knowledge, and expertise, they must do so within a secure environment that protects IP from being stolen and also protects our national security. Implementing and maintaining a robust security operation is the best way to do this.”
Synectics, a pioneer in advanced security and surveillance systems, announces its latest Synergy software release. Tools for improved incident management and team collaboration dominate the features list, with a new mobile app, simplified web-based system access, and remote camera sharing among the latest additions. Clear collaboration on vital tasks Synergy’s new mobile app delivers coordinated security management beyond the control room. The app offers seamless task management. Users can easily assign and schedule tasks, streamlining operations for routine security checks along patrol routes or responding to Synergy alerts. This customisable on-screen guidance is designed to uphold Standard Operating Procedures, ensuring adherence to protocols with ease and efficiency. Incident prevention and response Users can update control room teams on tasks completed with the touch of a button Additionally, users can update control room teams on tasks completed with the touch of a button and send additional notes pertinent to the assignment, from photos to written files. Dan Noble, Head of Product Strategy – Synergy, said, "Incident prevention and response are most successful when everyone clearly understands their role." He adds, "This is particularly true in emergencies, where things can easily be missed, and duplicated efforts can waste precious time. Our aim with the app is to help organisations avoid these pitfalls by giving them an easy mechanism to communicate with and coordinate staff on the ground.” Remote access made simple Synergy allows multiple users to securely view footage, control PTZ cameras, and access additional functionality via a web browser. Whether used by security managers working at home, centralised teams managing satellite sites, police stationed in third-party facilities, or field-based personnel, Synergy ensures everyone has what they need at their fingertips. Share footage with key stakeholders The functionality allows organisations to grant remote sites and third parties access to live camera feeds This latest release also features remote camera sharing, rounding out the newly available coordination and collaboration tools. Remote camera sharing can be delivered via Synergy-to-Synergy systems or DVNP technology if the other party is not a Synergy user. This functionality allows organisations to grant remote sites and third parties access to live camera feeds for defined periods, offering a secure route for sharing intelligence while retaining data control. Remote camera sharing With full encryption, audit trails, and the ability to specify which cameras specific individuals can access, Synergy’s remote camera sharing is likely to be of particular interest to organisations seeking a safe, GDPR-compliant mechanism for either multi-site or multi-agency camera sharing as part of coordinated security operations. Other notable enhancements include NMEA radar integration within Synergy’s mapping functionality for automatic target tracking and vessel classification and Angel Eye gaming shoe integration, which provides live baccarat gaming results alongside video footage.
March Networks®, a global pioneer in intelligent video solutions, announced the launch of a new subscription-based video solution called March Networks CloudSight. The cloud-based service is tailored to small and medium-sized businesses (SMBs) and quick service restaurants (QSRs). CloudSight March Networks CloudSight delivers a seamless direct camera-to-cloud video experience and is fully integrated and operational with Searchlight Cloud, the company’s advanced AI-based data analytics and business intelligence platform. By combining the insights generated from AI-based video analytics and data from other sources such as POS systems and other IoT devices, business operators can now get a complete view of their operations, for both enhanced security and strategic decision-making. Evolution of cloud-based surveillance “Combining March Networks CloudSight with Searchlight Cloud data analytics represents a significant milestone in the evolution of cloud-based surveillance and business intelligence solutions,” said Peter Strom, President and CEO of March Networks. “This unique solution addresses the security and loss prevention needs of our customers while simultaneously providing them critical insights into their day-to-day operations. We are pleased to be making this offering available in an affordable and easy subscription model. We believe this is the future of video surveillance, and March Networks is pioneering the way.” Simplifying surveillance with advanced technology CS+ and CS Series provide metadata to enable intelligent video evidence retrieval, resulting in faster, simpler investigation March Networks CloudSight simplifies security by eliminating the need for an NVR, offering a plug-and-play solution. It allows users to access video data anytime, anywhere and integrates advanced AI analytics for better security and efficiency, ensuring data security with robust encryption, all cost-effectively tailored for small businesses. The March Networks CloudSight offering includes new additions to March Networks AI-enabled camera lineup with built-in analytics – the CS+ and CS Series. Both provide metadata to enable intelligent video evidence retrieval, resulting in faster, simpler investigations. CS+ Series Cameras features CS+ Series Cameras (12MP 360° dome and a 5MP dome) feature essential analytics as well as Deep Search, which uses AI to improve accuracy and search functionality. This includes: Attribute Search uses specific attributes (e.g. gender, age group, clothing or vehicle color, vehicle type) to quickly and accurately find the person or vehicle of interest. Re-Search allows users to search for the person or vehicle of interest and tracks their activities across all cameras in the system. Profile Search involves uploading face images or saving face images from Deep Search to view a specific person quickly and efficiently. CS Series Cameras inclusions Scene search allows users to analyse a specific scene by using intrusion, line crossing, or loitering detection CS Series Cameras include essential analytics such as intrusion, loitering, and tripwire detection, abandoned object and object removal, blocked exit detection, and scene search. Scene search allows users to analyse a specific scene by using intrusion, line crossing, or loitering detection on recorded video. The CS Series includes two 5MP dome cameras and a 2MP dome. Flexible cloud offering with real-time alerts March Networks CloudSight offers flexible storage solutions to meet the unique needs of SMBs in various vertical markets. It includes 30 days of internal video storage per camera, with extended cloud storage solutions available for 30, 60, 90, 180, and 365+ days. Cloud Business Intelligence platform integration March Networks CloudSight’s integration with March Networks Searchlight™ Cloud Business Intelligence platform combines high-quality video surveillance with transaction data (POS systems, ATMs, etc.) and business analytics to help businesses cut losses from theft, oversee operations, improve service, and drive profitability. Smaller businesses benefit from real-time actionable intelligence via alerts for critical events and suspect transactions, while tracking KPIs and incidents across all locations and over time through intuitive dashboards. Improving customer experience This integration enhances security and provides invaluable data for optimising operations This represents a leap forward for small and medium-sized businesses, providing a suite of analytics that report on transaction data, traffic analysis, conversion rates, speed of service, queue management, dwell times, drive-thru metrics, blocked exits, loitering detection, security and intrusion events, and much more. This integration enhances security and provides invaluable data for optimising operations, improving the customer experience, and supporting strategic business decisions based on data. Expertise tailored to SMBs With a legacy of serving large, multi-site enterprise customers, March Networks has built a reputation for delivering complex, robust, and highly scalable surveillance systems that meet the stringent demands of enterprise-level operations. Leveraging this extensive experience, March Networks has made strategic investments to broaden its offerings, bringing simple yet sophisticated cloud surveillance capabilities to small and medium-sized businesses. Innovation and inclusivity “By channeling our expertise and technological advancements into cloud solutions for smaller businesses, we underscore March Networks’ dedication to innovation and inclusivity, and this is just the beginning." "We are enabling businesses of every size to benefit from the simplicity and ease-of-use of cloud video surveillance solutions, with added business intelligence capabilities,” continues Peter Strom. Unmatched benefits for a competitive edge As the demand for VSaaS (Video Surveillance as a Service) and camera-to-cloud systems grows, businesses seek more than just video recording, they demand comprehensive solutions that offer insights and operational intelligence beyond security. March Networks CloudSight with Searchlight Cloud delivers: Ease of Use: The system’s plug-and-play functionality ensures that sophisticated surveillance and analytics are easily accessible. Advanced Analytics: Real-time AI-powered analytics enable rapid investigations and deep insights for informed decision-making. Flexible Storage Options: Users benefit from scalable storage solutions tailored to their needs, with the flexibility of cloud storage. Enhanced Security: End-to-end data encryption and NDAA compliance guarantees the security of surveillance data. Integrated Business Intelligence: By transforming video data into actionable intelligence, March Networks CloudSight and Searchlight Cloud equip businesses with the tools needed for data-driven strategies.
Hanwha Vision is showcasing its growing ecosystem of cloud-based devices and apps designed to enable on-premise and remote surveillance capabilities, at ISC West 2024, Booth #14025, April 10-12 in Las Vegas. The company will also highlight the proliferation of Artificial Intelligence (AI) throughout its product lines. Combined with business intelligence software and AI-based data analytics, Hanwha Vision is developing solutions to help organisations generate meaningful and actionable insights to drive informed business decisions. Software-based solutions “Security professionals today need new solutions that fit the constantly changing nature of their markets,” said Miguel Lazatin, senior director of marketing, Hanwha Vision America. “Hanwha is constantly listening to its customers, and the results of that collaboration will be on display at ISC West in the form of diverse and powerful cloud and software-based solutions that address specific business challenges.” The surveillance industry is increasingly recognising the cloud’s clear benefits: operational efficiency, system storage, enhanced security, centralised data-all on a platform that flexibly scales to meet an organisation’s requirements and resources. OPEX business model Embracing the cloud “as-a-service” lets users to make intuitive and custom video security deployments Embracing the cloud “as-a-service” allows users to create intuitive and customised video security deployments that are also simple enough for users to manage on their own. With cloud-based video surveillance, users can benefit from continuous feature updates, regular security patches and lower maintenance costs, among many other benefits. Cloud-based video surveillance frees users from many of the day-to-day burdens of managing and operating a surveillance operation-while allowing them to adopt an OPEX business model. In addition to saving CapEx costs, organisations can reduce, or even eliminate, their time spent on maintaining hardware infrastructures. OnCloud OnCloud is Hanwha Vision’s new direct-to-cloud video management system providing low-latency access to live and recorded video, searchable clips, event notifications, and more. It’s a fully cloud-based solution for monitoring an organization's locations and assets, whether it’s across a single facility or multiple sites. OnCloud uses Natural Language Processing to make forensic review faster and more accurate. Searching is instant and intuitive – no waiting while a camera uploads from a gateway, an NVR, or an SD card. The results are instantly available. Search results can also be filtered by object classification and attributes. ONVIF camera compatibility ONVIF camera compatibility is seamless via Hanwha’s Cloud Gateway, a close, PoE-powered device OnCloud is built with collaboration in mind. Users can invite integrators to share a dashboard view of customer sites to proactively identify potential issues before they arise. During an investigation, collaborators can securely upload documents, images and video files from their phones or other sources to share complete incident details. OnCloud will launch with support for more than 150 Hanwha Vision camera models of all types, including PTZ, multi-directional and fisheye, plus a range of resolutions, and form factors. ONVIF camera compatibility is seamless via Hanwha’s Cloud Gateway, a compact, PoE-powered appliance. Users can add existing ONVIF cameras, or Hanwha cameras that aren’t direct-to-cloud. Designed for up to 16 cameras, users can scale by adding multiple appliances easily while occupying minimal real estate. DMPro DMPro is a cloud-based solution that provides device maintenance and system health monitoring capabilities. DMPro leverages the cloud to provide peace of mind to system integrators seeking to maintain their deployments no matter where they are. DMPro delivers near-real-time notifications to users when their camera deployments require attention. DMPro can either be deployed as a standalone system using the DM Bridge software or directly integrated with WAVE Sync to pull in information from the cameras and Wisenet WAVE VMS systems. Through DMPro, customers can effortlessly keep their cameras’ firmware up-to-date and maintain the highest cybersecurity practices. SightMind The software processes the metadata and shows it via customisable widgets and charts SightMind AI metadata visualisation software harnesses the data already being generated by the embedded edge AI analytics in Hanwha Vision cameras. The software processes the metadata and presents it through customisable widgets and charts in a visualised dashboard. Users can gather data from multiple cameras and sites to generate valuable business insights to support data-driven decisions that can impact the success of their entire operations. SightMind software also offers a view into statistics that optimise the customer experience, increase productivity, and enhance profitability. FLEX AI FLEX AI can train solid-object detection models that Hanwha's P series AI cameras can comprehend. This cloud-based application lets users train objects with as few as 20 images. This solves the challenge of customers having to create their own custom detection models by expanding beyond the typical People and Vehicle recognition to include almost any object possible. FLEX AI connects seamlessly to WAVE Sync to retrieve the latest training video assets, and to existing P series AI cameras to upload trained models.
Matrix, a pioneer in security and telecom solutions, proudly introduces the Matrix All Colour Cameras, marking a significant leap forward in video surveillance technology. Engineered to provide vivid coloured images in low-light conditions, these IP cameras redefine the standard for sharper, clearer visuals, especially during nighttime operations. In the landscape of remote site monitoring, video surveillance plays a pivotal role in ensuring the safety and security of both human and material assets. It also serves as a crucial tool for enforcing compliance and boosting overall productivity. Launch of SONY STARVIS SERIES These versatile cameras excel in a spectrum of surveillance applications, including corporate offices The launch of the Matrix All Colour Series IP Cameras in Turret Enclosures reflects a strategic move by Matrix to broaden its product portfolio while upholding the brand's commitment to durability and performance. These versatile cameras excel in a spectrum of surveillance applications, including corporate offices, hospitals, hotels, and residential areas. The incorporation of SONY STARVIS SERIES sensors and advanced lenses equips these cameras to deliver outstanding low-light performance, capturing colour images even in low-light/no-light environments. Matrix's commitment This capability not only enhances identification but also reduces false alarms, offering valuable forensic evidence. The cameras serve as visible deterrents, contributing significantly to heightened security measures. From retail and healthcare to education and critical infrastructure, the All Colour Series exhibits unmatched versatility. The product stands out with its revolutionary low-light colour imaging technology, strict adherence to cyber security compliance, robust design featuring turret enclosures, and a simplified installation process. Certification to meet national and international standards, including IP67, CE, FCC, BIS, ROHS, NDAA, and STQC's cyber secure certification, further underscores Matrix's commitment to quality and innovation in this latest addition to its security solutions lineup.
Arrow Electronics, Inc. and its engineering services company, eInfochips, are working with Infineon Technologies AG to help eInfochips’ customers accelerate the development of electric vehicle (EV) chargers. Development of EV chargers, especially DC ‘fast chargers’, is becoming increasingly challenging to equipment manufacturers due to several factors, such as lack of prior experience, stringent functional safety and reliability requirements, and a fledgling support network. Arrow Electronics and Infineon Technologies partnership Arrow’s High Power Center of Excellence has developed a 30kW DC fast charger reference platform The collaboration between Arrow and Infineon aims to help innovators navigate these challenges, while accelerating time-to-market. As part of the collaboration, Arrow’s High Power Center of Excellence has developed a 30kW DC fast charger reference platform. This includes Infineon’s 1200V CoolSiC™ Easy power modules and also hardware design, embedded firmware, bi-directional charging support and energy metering functionality. Accelerate speed to market in e-mobility applications “Combining Arrow’s strength in components, engineering and design services with Infineon’s innovative products will help customers accelerate their design and speed to market in e-mobility applications,” said Murdoch Fitzgerald, the Vice President of Global Engineering and Design Services at Arrow. He adds, “Customers can rely on this collaboration to deliver innovative and leading edge DC faster chargers, accelerate and de-risk design cycles, and get access to a world-class support team enabling them to plan and manage their product roadmap and lifecycles.” Drive towards decarbonisation and digitalisation “Infineon is on a drive towards decarbonisation and digitalisation with our ecosystem partners, and this collaboration with Arrow is a testament to this mission,” said Shri Joshi, the Vice President of Green Industrial Power, Infineon Technologies Americas. He adds, “The joint 30kW DC fast charger reference platform, which includes Infineon’s latest power modules and devices, will help our customers bring more fast chargers to market as the future moves to electrical vehicles. We look forward to this ongoing collaboration to support our customer base.” 30kW DC fast charger reference development platform The first reference design from this collaboration, a production-grade 30kW DC fast charger reference development platform, is being demonstrated at Applied Power Electronics Conference, taking place from Feb. 25-29, 2024, in Long Beach, California, USA.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Renowned as a significant entity in the power industry, the Indian Power Giant stands as a key player in India's public sector power utility domain. Under the auspices of the Ministry of Power, Government of India, it specialises in hydroelectric power generation and associated endeavours. With a steadfast commitment to providing clean, sustainable, and cost-effective energy, the Power Giant has successfully executed numerous large-scale hydroelectric projects, making substantial contributions to India's energy landscape. Business challenge The Indian Power Giant encountered a formidable obstacle with its existing video surveillance infrastructure, comprising 128 IP cameras and NVRs of disparate makes and models dispersed across its facility. Lack of video management software capable of seamlessly merging with third-party IP cameras This diversity in camera types presented a significant hurdle to centralised surveillance efforts, resulting in delayed detection of security incidents, prolonged response times, and an overall compromised security stance. Moreover, the lack of video management software capable of seamlessly integrating with various third-party IP cameras and NVRs compounded the issue. Key challenges Absence of a centralised video management solution for over 100 IP cameras and NVRs deployed at multiple locations within the facility. Difficulty in finding a Video Management Software (VMS) compatible with diverse third-party IP cameras and NVRs. Varied user interfaces of IP cameras and NVRs from different brands causing user confusion. Inability to integrate the Automatic Number Plate Recognition (ANPR) system with the existing VMS, missing out on enhanced access control and vehicle tracking opportunities. The Power Giant faced issues related to manual monitoring and tracking of vehicles entering or leaving their premises. Solution Remote surveillance became feasible from any location, ensuring continuous monitoring of the facility The deployment of Matrix SATATYA SAMAS-Video Management Software emerged as the solution to the Indian Power Giant’s challenges. SATATYA SAMAS seamlessly integrated all 128 third-party IP cameras and NVRs across the facility, facilitating smooth centralised video surveillance operations. The Admin Client simplified the addition of cameras and NVRs, while the Smart Client enabled effortless playback and monitoring. With the Mobile Client, remote surveillance became feasible from any location, ensuring continuous monitoring of the facility. SATATYA SAMAS effectively addressed the hurdles, providing a user-friendly video management system that significantly enhanced overall security system efficacy. Furthermore, Matrix introduced an Automatic Number Plate Recognition (ANPR) solution at 12 entry points within the power plant premises. This strategic implementation mandated vehicle authentication at the entry gates, allowing access only upon successful authentication. The ANPR solution captured licence plate data, converted it into digital format, and securely stored it in the database, bolstering security measures and establishing a robust record-keeping system for enhanced monitoring and vehicular access control. All in all, Matrix enhanced security for the Indian Power Giant. Products offered Matrix Licence Dongle 200: USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100: Licence for Adding 100 Additional Cameras SATATYA SAMAS CAM20: Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM05: Licence for Adding 5 Additional Cameras SATATYA SAMAS USER03: 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR10: Automatic Number Plate Recognition (ANPR) Licence for 10 Cameras SATATYA SAMAS ANPR01: Automatic Number Plate Recognition Licence for 1 Camera Benefits Interoperability: SATATYA SAMAS facilitated seamless integration with all third-party IP cameras and NVRs, regardless of their models or brands, ensuring a unified and interoperable video management system. Efficient Monitoring: The centralised video surveillance system enabled comprehensive monitoring from a single interface. Effortless Management and Playback: The user-friendly Admin Client simplified camera and NVR management, while the Smart Client facilitated easy playback and monitoring for prompt security responses. Remote Monitoring: The Mobile Client enabled on-the-go surveillance from any location, coupled with instant notifications and alerts for swift response. Enhanced Access Control: Matrix's ANPR solution enhanced access control by authenticating vehicles. Improved Vehicle Tracking: The ANPR solution facilitated accurate vehicle tracking and security through licence plate capture and storage.
Banking premises require a robust security infrastructure to safeguard sensitive financial information, customer data, and valuable assets. When a pioneering investment bank in Finland needed to enhance the protection of its archive room, it turned to PACOM’s cutting-edge VIGIL CORE security management platform. An archive room A bank’s archive room is a designated location, often in a basement, which is designed for the storage and preservation of critical documents, customer records, historical financial information, legal agreements, and other important paperwork. As a repository for a wide range of sensitive materials, an archive room plays a crucial role in maintaining the integrity of a bank's records. Regulatory requirements Given the sensitive nature of the stored documents, access must be restricted to designated personnel only Banks are subject to stringent regulatory requirements to ensure the security and privacy of customer data, so organising documents in an archive room allows them to efficiently manage and retrieve information when needed, facilitating internal audits, regulatory compliance checks, and responding to customer inquiries. Given the sensitive nature of the stored documents, access must be restricted to designated personnel only to protect against unauthorised handling or removal. As such, these spaces are typically equipped with advanced security measures. Northern star To mitigate any emerging risks and threats, banks need to employ an ongoing program of security infrastructure upgrades. When a pioneering investment bank in Finland needed to improve the security of an archive room in one of its locations in Helsinki, it asked for recommendations from Securitas Technology – a PACOM value-added reseller for over 25 years. VIGIL CORE When we were asked to suggest ways to maximise the integrity of our client’s archive room, we researched" Mikko Seppänen, product manager at Securitas Technology, takes up the story and explains, "As a world-pioneering provider of integrated security solutions that employs approximately 13,000 people across the globe, we have experience working with a wide range of technologies. We operate extensively within the financial sector, so understand that nothing can be left to chance and only the best will do." "When we were asked to suggest ways to maximise the integrity of our client’s archive room, we researched the best possible option, which we decided was PACOM’s VIGIL CORE integrated security management platform." Reach for the sky Intelligent, user-friendly, and highly cost-effective, VIGIL CORE is a cloud-based software solution that offers the flexibility, scalability, affordability, and functionality demanded by organisations. It has been designed to redefine what’s possible in security integration management, without any legacy restrictions, and can deliver valuable business intelligence, operational insights, and efficiencies. "End users are now able to harness the power of the cloud through VIGIL CORE," comments Brad McMullen, PACOM’s general manager of security products and solutions. Customisable dashboard It can also scale up and down as required and provides existing PACOM users with an opportunity to migrate" "VIGIL CORE is a true game-changer and a great fit for customers with single sites, hundreds of sites, or large campus environments. Its fully customisable dashboard can be accessed via any internet-connected desktop PC or smartphone." "It can also scale up and down as required and provides existing PACOM users with an opportunity to migrate to it quickly and easily." All for one and one for all Limiting access to sensitive areas within the bank is vital and different levels of access can be assigned based on job roles. In archive rooms, access control systems are often integrated with other security technologies. Intrusion detection systems detect unauthorised access or entry attempts, while video surveillance systems are strategically placed to monitor entry points and critical areas, serving both as a deterrent and a means of recording any suspicious activities. Alarm systems can be linked to access control systems to trigger alerts in the event of unauthorised access attempts and configure transactional logs. Features and benefits Our customer needed the system to be up and running very quickly and we were very impressed with how easy it was" Securitas Technology’s Mikko Seppänen states, "This is the first time VIGIL CORE has been installed in Finland, so for us it provided a great opportunity to find out more about its features and benefits. Our customer needed the system to be up and running very quickly and we were very impressed with how easy it was to deploy." "The archive room is quite small, so we integrated the access control and intrusion detection systems on the same panel, and there is the potential to expand the system by adding doors and cameras as required. The integration of security systems is the way forward and it’s clear that VIGIL CORE has great potential across many vertical sectors and organisations of all sizes." Under control The administration of access control systems involves careful management and oversight. With VIGIL CORE system administrators can configure access levels, assign credentials, and regularly review and update security settings helping to ensure that the administrator accounts are always controlled correctly. Automatic software and firmware installations Doing this in a standardised manner takes the burden of managing the cybersecurity of the system To ensure that the bank’s security infrastructure is fully up to date, VIGIL CORE can carry out automatic software and firmware installations to allow it to benefit from the latest security features and enhancements. Doing this in a standardised manner takes the burden of managing the cybersecurity of the system off of the end user while helping to ensure regulatory compliance through built-in operational features and documentation. Securitas Technology can also carry out remote diagnostics, troubleshooting, and maintenance when needed. Statement of account Having been successfully implemented within the customer’s defined timeframe, a bank spokesperson concludes, "A safe and secure archive room is vital for the continuity and stability of a bank." "It not only supports day-to-day operations but also acts as a safeguard against unforeseen events such as legal disputes, regulatory investigations, or audits." Reliability and accountability "We take this incredibly seriously, which is why we trusted Securitas Technology to configure the most appropriate solution for our needs." "We are delighted with the VIGIL CORE integrated security management platform – it reinforces the integrity of the bank and establishes a foundation of reliability and accountability in the eyes of both customers and regulatory authorities."
Al Erkyah City is a new upscale mixed-use development in the Lusail district of Doha, Qatar. The luxury community features ultra-modern high-rise buildings, premium retail spaces, and a 5-star hotel. Al Erkyah City represents the pinnacle of modern, high-end living in Qatar. Need for IP intercom system The project developers required an IP intercom system on par with the development's elite standards, to facilitate secure access control and streamline property management across the vast property. After careful evaluation, Al Erkyah City selected DNAKE to deploy completed and comprehensive IP intercom solutions for the buildings R-05, R-15, and R34 with a total of 205 apartments. Flexible cloud-based system A customised solution utilising feature-rich door stations with HD cameras and touchscreen indoor monitors By choosing DNAKE, Al Erkyah City is outfitting its properties with a flexible cloud-based system that can easily scale across its growing community. DNAKE engineers conducted in-depth evaluations of Al Erkyah's unique requirements before proposing a customised solution utilising a combination of feature-rich door stations with HD cameras and 7-inch touchscreen indoor monitors. Residents of Al Erkyah City will enjoy advanced features such as indoor monitoring via the DNAKE smart life APP, remote unlocking, and integration with home alarm systems. 4.3'' video door phones At this large community, high-resolution 4.3'' video door phones were installed at key access points leading into the buildings. The crisp video provided by these devices enabled the security personnel or the residents to visually identify visitors requesting entry from the video door phone. The high-quality video from the door phones gave them confidence in assessing potential risks or suspicious behavior without having to personally greet every single visitor. Maximum visibility and oversight Additionally, the wide-angle camera on the door phones provided a comprehensive view of the entry areas, allowing the residents to keep a close eye on the surroundings for maximum visibility and oversight. Positioning the 4.3'' door phones at carefully selected entry points allowed the complex to leverage its investment in this video intercom security solution for optimal monitoring and access control across the property. 7'' Linux indoor monitors 7'' Linux indoor monitors deliver residents an advanced, convenient, and smart intercom solution for their homes A major factor in Al Erkyah City's decision was DNAKE's flexible offering for indoor intercom terminals. DNAKE's slim-profile 7’’ indoor monitors were installed in a total of 205 apartments. Residents benefit from convenient video intercom capabilities directly from their suite, including a clear high-quality display for video verification of visitors, intuitive touch controls through the flexible Linux OS, and remote access and communication via smartphone apps. In summary, the large 7'' Linux indoor monitors deliver residents an advanced, convenient, and smart intercom solution for their homes. Future-ready intercom communication platform Residents will find the communication system remains at the cutting edge due to DNAKE's over-the-air update capability. New capabilities can be seamlessly rolled out to indoor monitors and door stations without costly site visits. With the DNAKE intercom, Al Erkyah City can provide a smart, connected, and future-ready intercom communication platform matching the innovation and growth of this new community.
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep track of who had the keys. The choice It’s very easy to manage and we can focus our time on providing quality care to our patients" “The Brivo system makes my job easier and frees me up for other things. With Brivo, it’s easy to find out what we need; the system doesn’t lie," Larry Kadin, Facilities and Purchasing Manager, Adelante Healthcare. "It’s very easy to manage and we can focus our time on providing quality care to our patients.” The change Adelante has issued access cards to over 200 staff and the cleaning crews at their seven facilities. Without lots of keys floating around, the healthcare provider no longer has security breaches. One person is administering multiple sites from a single web interface. Access can be programmed easily and quickly, it’s done remotely and in a manner of just minutes. The team has better records and easy access to data that can be provided to other departments. The new system has had significant positive effects on staff productivity and effectiveness. “I’ve not seen anything that comes close to what Brivo provides. The Brivo system is a joy to work with. It saves us so much time compared to other systems we were looking at, ” Larry Kadin.
The proven “CAT” gaming analysis solution from German casino expert Dallmeier is also available for Sic Bo, in addition to Baccarat and Black Jack. The video-based solution offers a whole range of analysis options with which casino operators can increase the “game pace”, combat fraud, and gain valuable insights into the gaming action through real-time data collection. Optimisation challenges Optimising the gameplay at Sic Bo tables poses no small challenge to casino operators. These include potential cheating attempts, difficulties in tracking results, and operations such as late bets. Above all, however, gaming managers benefit from collecting and analysing data that can be used to increase the game pace and optimise the efficiency of tables and dealers. “It's all about the data” Real-time tracking of important data and processes The information that can be used to optimise the gameplay at the Sic Bo table is manifold The information that can be used to optimise the gameplay at the Sic Bo table is manifold. For example, “CAT for Sic Bo” precisely records the game pace of each table based on the times for placing the bets, game phase, and payout and thus makes the performances of tables and dealers comparable. Additional information such as which fields are the most popular, information about the value of the top chip for quick identification of “high-value” bets, objective tracking of “late bets” and other events that regularly lead to discussions between players and casinos complete the portfolio. Data points from existing sources CAT for Sic Bo combines data points from existing Sic Bo consoles with CAT data captured by AI cameras above the table. In this way, data from all participating tables can be collected together and evaluated centrally. This can either be done via the Dallmeier SeMSy® casino software or the data is exported as a CSV file and can then also be evaluated by any other system. Automated Business Intelligence for the Gaming Manager This centralised capture and analysis of data provide gaming managers with insights that previously had to be laboriously collected manually by the PIT manager or were not accessible at all in a highly efficient and automated manner. This opens up a completely new field for gaming managers to optimise the profits of their Sic Bo tables: From a higher game pace to the objective evaluation of dealer performance, support in the fight against fraud to the data-driven optimisation of table layout, placement, minimum bet levels, monitoring of compliance rules or promos.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![11 advantages of a combined system for access control and intrusion](https://www.sourcesecurity.com/img/white-papers/612/wp-banner-920x533_1654533709.jpg)
11 advantages of a combined system for access control and intrusion
Download![Automatic vehicle identification](https://www.sourcesecurity.com/img/white-papers/612/vehicle-identification-nortech.jpg)
Automatic vehicle identification
Download![Cloud video and smart cities](https://www.sourcesecurity.com/img/white-papers/612/smart-cities-whitepaper-eagle-eye-networks-920.jpg)
Cloud video and smart cities
Download![Security investments retailers should consider for their 2021 budget](https://www.sourcesecurity.com/img/white-papers/612/retail-security-investments-for-2021-budget-920_1603476210.jpg)
Security investments retailers should consider for their 2021 budget
Download![Sinaloa, Mexico: Connected cities are safer cities](https://www.sourcesecurity.com/img/white-papers/612/sinaloa-mexico-safe-connected-city-security-vicon-whitepaper-920_1601030674.jpg)
Sinaloa, Mexico: Connected cities are safer cities
Download![How to overcome the storage challenges of adopting surveillance AI](https://www.sourcesecurity.com/img/white-papers/612/seagate-landing-page.jpg)
How to overcome the storage challenges of adopting surveillance AI
Download![Record locally, view centrally, manage remotely](https://www.sourcesecurity.com/img/white-papers/612/record-locally-620.jpg)
Record locally, view centrally, manage remotely
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Remote surveillance: Manufacturers & Suppliers
![Access control system planning phase 2](https://www.sourcesecurity.com/img/white-papers/612/920x533_1722432285.jpg)
Access control system planning phase 2
Download![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![DNAKE Cloud Intercom: Dive into V1.5.1 Updates](https://www.sourcesecurity.com/img/virtual-events/612/dnake-cloud-intercom-webinar-920x533.jpeg)
DNAKE Cloud Intercom: Dive into V1.5.1 Updates
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download