Remote video monitoring
Everon, LLC, a pioneering security integrator and premier provider of commercial security, video, fire and life safety solutions in the U.S., announced its award of a Sourcewell cooperative purchasing contract in the state and local government category. This contract allows Everon to expand its extensive portfolio of offerings and services to public agencies across the U.S. Cost-effective and efficient solutions Sourcewell serves government, education, and nonprofit corps across the...
FLIR, pioneer in high-performance marine thermal-imaging systems, announced the launch of the new FLIR JCU-4 remote control, offering precision camera control and an elevated, yet simplified user experience. Providing confident control of FLIR marine thermal and visible cameras, the FLIR JCU-4 remote control is designed for FLIR marine cameras and is compatible with the M232, M300, M400/M400XR and M500 series, as well as legacy models. It offers pan, tilt, and zoom capabilities, and control of...
Advanced Data Risk Management (ADRM), a pioneer in security consulting and managed security services and EyeOTmonitor, a pioneer in network and systems health management for the security industry, are proud to announce a strategic partnership. This collaboration will integrate EyeOTmonitor’s advanced health monitoring capabilities into ADRM’s Security Management Platform, DEFENDER, providing clients with enhanced system health monitoring and real-time change management awareness wi...
Eagle Eye Networks, the global pioneer in cloud video surveillance, launched Eagle Eye Automations. A flexible and extensible rules engine for automating tasks that empowers businesses to proactively and economically improve security, safety and business operations. Simplifying security management “Today’s security systems are complex, increasingly incorporating video surveillance, AI, analytics, sensors, and other third-party devices and technologies. Eagle Eye Automations enable...
The security technology manufacturer Paxton is now hosting Paxton Tech Tour sessions at the company’s newly built US headquarters in Greenville, South Carolina. The Paxton Tech Tour is a free half-day commercial and technical experience that introduces security installers and integrators to Paxton’s extensive security product line. Featuring live demos, hands-on product experience, exclusive access to discounted products and free software, installers won’t want to miss it. Te...
Konica Minolta has announced the sale of its entire 65% stake in MOBOTIX AG, along with all associated shareholder loans, to CERTINA Software Investments AG, a 100% subsidiary of the Munich-based family equity investor CERTINA Group. The CERTINA Software Division of CERTINA Group specialises in the development and expansion of technology-driven businesses worldwide. CERTINA expands portfolio KONICA MINOLTA's medium plan to divest non-focus business and concentrate on core business areas globa...
News
IPConfigure, a trusted pioneer in enterprise video management software (VMS), has joined forces with Blue Eye, an innovator in remote video monitoring (RVM), to deliver an industry-first integration. This partnership empowers IPConfigure's customers to activate Blue Eye's advanced remote video monitoring services directly within the Orchid VMS platform, all in just a few clicks and without additional hardware requirements. Remote monitoring capabilities "This collaboration represents a transformative step forward for security technology," said Christopher Uiterwyk, CEO of IPConfigure. "By embedding Blue Eye's remote monitoring capabilities directly into our Orchid VMS, we've created a solution that's not only user-friendly but also elevates the value of existing surveillance infrastructure." Streamlined, embedded virtual guarding services The integration introduces a robust, cloud-based monitoring solution embedded within Orchid VMS. Customers benefit from: Simplified Onboarding: Seamlessly request monitoring services through Orchid Fusion, enabling Blue Eye's backend setup and activation. Efficient Admin Management: Blue Eye's experts ensure optimal camera configurations, including motion detection and monitoring readiness. Real-Time Threat Mitigation: Blue Eye's Security Operations Center (SOC) operators handle continuous event monitoring, accessing live feeds, reviewing recorded footage, and leveraging audio talk-down features to proactively deter threats. Game-changing solution "This integration marks a milestone for both Blue Eye and IPConfigure," said Steve Jackson, President of Blue Eye. "We've combined our expertise to deliver a game-changing solution that enhances security, simplifies deployment, and provides unmatched convenience for businesses." Key advantages of the integration Proactive Crime Deterrence: SOC operators utilise live audio talk-down features to prevent incidents before they occur. Transparent, Predictable Pricing: With a flat monthly rate and no hidden fees, Blue Eye's RVM solution eliminates unnecessary costs associated with over-alarming and false alarms. Comprehensive Monitoring: Operators access real-time video feeds, recorded footage, and audio tools to ensure timely threat intervention. Broad Compatibility: The system supports ONVIF-compliant cameras, allowing integration without additional hardware investment. Enhanced User Experience: Integrated tools such as status updates, camera snapshots, and advanced search capabilities simplify onboarding and improve user satisfaction. Video surveillance "This partnership reinforces our commitment to delivering innovative solutions that prioritise both security and user experience," said Corey Catten, Chief Technology Officer at Blue Eye. "By integrating our services into Orchid VMS, we're setting a new benchmark for the video surveillance industry." Unlocking the future of security With this first-of-its-kind integration, IPConfigure customers can effortlessly transform their existing video surveillance systems into proactive security solutions. The collaboration enables businesses to deter crime, reduce operational costs, and enhance overall efficiency with minimal disruption.
Interface Systems, a pioneering managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has identified key security and technology trends that will shape retail and restaurant security in 2025. As threats evolve and technology accelerates, Interface anticipates a convergence of AI, advanced video analytics, and smarter monitoring solutions to drive more proactive and efficient business security systems. Growing sophistication of retail crime To counter these strategies, businesses must increasingly adopt cloud-based video systems Retail burglaries are becoming more sophisticated, with organised theft groups using “imposter” tactics to pose as workers and break into businesses from unprotected spaces. These teams employ cellular jamming to disable alarms, quickly attack on-site video equipment, and exploit weak backup systems. To counter these strategies, businesses must increasingly adopt cloud-based video systems, redundant recording solutions, and active remote monitoring to ensure system resilience and real-time detection. Expansion of cloud-based video systems The adoption of cloud-based video systems is expected to accelerate, driven by their ability to provide scalable, remote monitoring solutions. However, growth will be tempered by challenges surrounding appropriate network bandwidth availability and the cost of high-resolution video storage. Interface foresees steady adoption as technology advances to optimise storage efficiency without compromising video quality. AI for life safety and deterrence Video analytics will play an increasingly central role as a detection and deterrence tool Video analytics will play an increasingly central role as a detection and deterrence tool. Advances in AI-driven systems will simplify deployment and enable companies to implement more robust remote video monitoring (RVM). This next stage of innovation will focus on integrating video analytics with access control, alarms, and environmental sensors to create cohesive, intelligent security solutions. This will enable organisations to leverage capabilities like automated locking mechanisms to prevent unauthorised access or triggering voice-down messages to deter theft or loitering. However, maintaining a “human in the loop” will be crucial to overseeing AI operations, ensuring sound decision-making in high-stakes situations, and building trust in the technology. Conversational AI and automated interventions Interface Systems anticipates continued advancements in conversational AI to enhance remote video monitoring. Currently, AI-driven systems can identify “what” to respond to — distinguishing between human motion, vehicle movement, or environmental factors. In 2025, conversational AI will advance to determine “how” to respond, providing highly contextual, automated interventions. Machine learning models Machine learning models refine these interactions by analysing results and response parameters For example, AI could customise announcements based on situational details like a vehicle’s description or a suspect’s clothing, increasing the effectiveness of automated responses. Over time, machine learning models will refine these interactions by analysing outcomes and adapting response parameters to improve deterrence. Ahead of security challenges “As threats continue to evolve, we anticipate that innovation in AI, video analytics, and cloud-based solutions will empower businesses to stay ahead of security challenges." "At Interface, we remain committed to developing and delivering next-generation security technologies that prioritise proactive prevention and operational efficiency,” said Sean Foley, Chief Revenue Officer at Interface Systems.
Eagle Eye Networks, the global pioneer in cloud video surveillance released the 2025 edition of its annual Trends in Video Surveillance report, identifying six trends that will have the largest impact on businesses around the world in 2025. Designed as a resource for business owners and security professionals, the report offers trend analysis, simple explanations of newer technology, and practical advice on implementing video surveillance in new ways. AI in video surveillance “This year’s trends report reflects the rapid technological advances–particularly with AI–that have taken place over the past 12 months,” said Dean Drako, CEO of Eagle Eye Networks. “AI is improving the accuracy, speed, and usability of security cameras and dramatically expanding the value of video surveillance for business owners who want to improve security and make their operations more efficient.” Video surveillance trends The top six video surveillance trends for 2025 are: More remote video monitoring due to increased practicality, affordability, and the use of AI to reduce false positive alarms. Security cameras in more places, including locations that were too remote or too expensive to install only a couple of years ago. Multi-sensor cameras are proliferating, enabling one camera to do the work of two or more cameras. Gun detection is a rapidly improving technology that uses AI, and has numerous advantages over human guards. Low-light capability in security cameras not only delivers better video, but also increases the reliability of AI-based object recognition, face detection, and licence plate recognition. More cameras have built-in AI, capable of functions such as object recognition and event detection.
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the launch of the new U-series, marking the first time edge AI has been introduced to all its security camera lines. The U-series is designed for installations that need the accuracy advantages of AI-based object detection in security environments at an entry level. i-PRO U-series line-up The models are mainly suited for detecting intruders, loitering, direction, and line crossing The models are particularly suited for detecting intruders, loitering, direction, line crossing, and speeding. Providing an efficient, edge-computing approach without compromising on performance. "As a pioneer in edge computing within the security industry, i-PRO was the first to integrate AI across our entire S-series line, setting a new standard. Now, the i-PRO U-series line-up introduces essential edge computing technology to our entry-level models, transforming them into proactive devices that align with market trends,” said Gerard Figols, Chief Product Officer at i-PRO. New product line introduces imaging options Figols added: “By bringing the advantages of AI to fundamental security installations, we’re offering smarter technology for end-users who don’t require forensic search and advanced business insights based on metadata and attributes." The new product line introduces higher-resolution imaging options, including 2MP, 5MP, and 4K dome, box, and bullet cameras, enhancing clarity and precision. Additional features include: Advanced AI Image Analytics: AI-VMD for intelligent video motion detection Audio recording capabilities for enhanced situational awareness Increased Optical Zoom for improved focus on image clarity and analytics accuracy Direct-to-cloud VSaaS support Cameras deliver real-time insights while reducing bandwidth consumption The U-series camera line was designed to be a perfect companion for direct-to-cloud VSaaS deployments offering flexibility and scalability. As cloud-based solutions continue to evolve, future firmware updates will enable additional features and functionality. By combining Direct-to-Cloud connectivity with AI on the Edge, these cameras deliver real-time insights while reducing bandwidth consumption, improving response times, and enhancing data privacy. Strengthening cybersecurity In line with its mission to pioneer edge computing, i-PRO has integrated AI technology across the entire product line-up. Recognising the responsibility this entails, the company remains committed to enhancing its cybersecurity standard. While other companies adhere to FIPS 140-2, the new U-Series surpasses this with FIPS 140-3 level 3 compliance, utilising an NXP EdgeLock secure element, to provide the industry's highest level of data security. Requirements for cryptographic modules Level 3 certification includes stricter requirements for cryptographic modules Level 3 certification includes stricter requirements for cryptographic modules, further reinforcing security by improving physical tamper resistance and safeguarding against key extraction and hardware attacks. Featuring secure boot functionality, the cameras deliver strong protection against unauthorised access and cyber threats. Non-AI replacement models “i-PRO does not compromise cybersecurity by any means - not even in our entry-level camera line-up. By prioritising the highest level of cybersecurity, we demonstrate our commitment to data integrity, ensuring peace of mind for all our customers and users,” adds Figols. The new U-series consists of 28 models, with 15 featuring edge-processed AI analytics and 13 serving as non-AI replacement models. AI-enabled models will be available from June/July, and the non-AI models will be available later this year.
German video technology manufacturer Dallmeier will showcase its intelligent video solutions for casinos as the Exclusive Platinum Sponsor at the WGPC 2025 (World Game Protection Conference) in Las Vegas from 11 to 13 March. Highlights include the new “Picoline” camera series, CAT Casino Automation Technology and the Hemisphere® SeMSy® video management system. Picoline–small camera Dallmeier presents the new “Picoline” camera series at the WGPC. The Picoline combines high image quality with up to five (5) MP resolution, a wide range of cybersecurity features and AI assisted analytics in a compact surface mount housing. The small form factor enables installation in confined spaces on ceilings or walls and is powered via PoE. The cameras are equipped with a High Dynamic Range (HDR) function to optimise the capture of high-contrast scenes with very bright and very dark areas, as is often the case in casinos. Each frame is captured with two special settings that are combined in real time to produce a balanced result. The resulting video stream offers significantly more detail in both light and dark areas and is optically very similar to how the human eye perceives them. Dallmeier’s Casino Automation Technology Key analytics that will be on display at WGPC 2025 include game pace, game results Pit Managers and floor managers can increase operational efficiency and profitability of the entire gaming floor with Dallmeier’s Casino Automation Technology (CAT). CAT monitors and automates table games (e.g. Blackjack, Baccarat), automating a wide variety of manual tasks, significantly increasing dealer efficiency and table gaming profitability. Key analytics that will be on display at WGPC 2025 include game pace, game results and chip float analysis. Intuitive management with Hemisphere® SeMSy® The Hemisphere® SeMSy® management software (SeMSy® 5) is available for professional and intuitive management of the system. At the WGPC 2025 Dallmeier will present the modular VMS live and introduce new functions. In combination with the Panomera® W series 180° and 360° panoramic cameras, which enable efficient surveillance of large indoor areas with fewer cameras, the time to resolve incidents is reduced by more than 80%.
Comelit-PAC is ready to make an impact at The Security Event 2025, with an opportunity for visitors to connect and explore the latest portfolio of security and fire safety systems. On stand 5/F60, the global specialist will present the latest solutions. This includes PAC’s video surveillance integration with PAC Access Central, the PAC 501 access control solution and the PAC Gateway with Housing Central. New 7TOP as Comelit-PAC Door entry technology on display will include the innovative new 7TOP as Comelit-PAC’s most its most advanced IP door entry monitor to date alongside LOGOS Wi-Fi, offering enhanced NFC connectivity and convenience. Visitors to the stand will be able to see live demonstrations of Comelit-PAC’s NDAA-compliant video surveillance range, a key focus for 2025. Fire detection series Life safety systems will feature the LogiFire, including the addition to its robust alarm systems range Life safety systems will feature the LogiFire including the addition to its robust alarm systems range, embracing a wireless fire detection series that is available with addressable or conventional transceivers capable of cloud and remote monitoring. Says Francesca Boeris, Comelit-PAC Managing Director: “The Security Event is always a highlight for us. It’s not just about showcasing our latest innovations - it’s about reconnecting with our valued partners and welcoming new friends. We look forward to discussing new ways of working together, sharing a drink and demonstrating how Comelit-PAC solutions can help ensure end-users truly ‘Feel Secure.’” Advanced security technology and fire safety systems At The Security Event, Comelit-PAC is introducing the Vault Challenge, where attendees can test their knowledge by answering security-related or product-based questions for a chance to unlock a PAC Pin Prox vault and win prizes. Participants are encouraged to share their experiences using #FeelSecureChallenge. Francesca added: “Comelit-PAC’s presence at The Security Event 2025 promises to be an engaging experience. From advanced security technology and fire safety systems to an interactive competition, we are excited to create a warm and welcoming space where industry professionals can connect with us, learn, and experience the very best of our solutions.” The Security Event 2025 is taking place 8 – 10 April 2025 at The NEC Birmingham.
IPConfigure, a trusted pioneer in enterprise video management software (VMS), has joined forces with Blue Eye, an innovator in remote video monitoring (RVM), to deliver an industry-first integration. This partnership empowers IPConfigure's customers to activate Blue Eye's advanced remote video monitoring services directly within the Orchid VMS platform, all in just a few clicks and without additional hardware requirements. Remote monitoring capabilities "This collaboration represents a transformative step forward for security technology," said Christopher Uiterwyk, CEO of IPConfigure. "By embedding Blue Eye's remote monitoring capabilities directly into our Orchid VMS, we've created a solution that's not only user-friendly but also elevates the value of existing surveillance infrastructure." Streamlined, embedded virtual guarding services The integration introduces a robust, cloud-based monitoring solution embedded within Orchid VMS. Customers benefit from: Simplified Onboarding: Seamlessly request monitoring services through Orchid Fusion, enabling Blue Eye's backend setup and activation. Efficient Admin Management: Blue Eye's experts ensure optimal camera configurations, including motion detection and monitoring readiness. Real-Time Threat Mitigation: Blue Eye's Security Operations Center (SOC) operators handle continuous event monitoring, accessing live feeds, reviewing recorded footage, and leveraging audio talk-down features to proactively deter threats. Game-changing solution "This integration marks a milestone for both Blue Eye and IPConfigure," said Steve Jackson, President of Blue Eye. "We've combined our expertise to deliver a game-changing solution that enhances security, simplifies deployment, and provides unmatched convenience for businesses." Key advantages of the integration Proactive Crime Deterrence: SOC operators utilise live audio talk-down features to prevent incidents before they occur. Transparent, Predictable Pricing: With a flat monthly rate and no hidden fees, Blue Eye's RVM solution eliminates unnecessary costs associated with over-alarming and false alarms. Comprehensive Monitoring: Operators access real-time video feeds, recorded footage, and audio tools to ensure timely threat intervention. Broad Compatibility: The system supports ONVIF-compliant cameras, allowing integration without additional hardware investment. Enhanced User Experience: Integrated tools such as status updates, camera snapshots, and advanced search capabilities simplify onboarding and improve user satisfaction. Video surveillance "This partnership reinforces our commitment to delivering innovative solutions that prioritise both security and user experience," said Corey Catten, Chief Technology Officer at Blue Eye. "By integrating our services into Orchid VMS, we're setting a new benchmark for the video surveillance industry." Unlocking the future of security With this first-of-its-kind integration, IPConfigure customers can effortlessly transform their existing video surveillance systems into proactive security solutions. The collaboration enables businesses to deter crime, reduce operational costs, and enhance overall efficiency with minimal disruption.
Interface Systems, a pioneering managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has identified key security and technology trends that will shape retail and restaurant security in 2025. As threats evolve and technology accelerates, Interface anticipates a convergence of AI, advanced video analytics, and smarter monitoring solutions to drive more proactive and efficient business security systems. Growing sophistication of retail crime To counter these strategies, businesses must increasingly adopt cloud-based video systems Retail burglaries are becoming more sophisticated, with organised theft groups using “imposter” tactics to pose as workers and break into businesses from unprotected spaces. These teams employ cellular jamming to disable alarms, quickly attack on-site video equipment, and exploit weak backup systems. To counter these strategies, businesses must increasingly adopt cloud-based video systems, redundant recording solutions, and active remote monitoring to ensure system resilience and real-time detection. Expansion of cloud-based video systems The adoption of cloud-based video systems is expected to accelerate, driven by their ability to provide scalable, remote monitoring solutions. However, growth will be tempered by challenges surrounding appropriate network bandwidth availability and the cost of high-resolution video storage. Interface foresees steady adoption as technology advances to optimise storage efficiency without compromising video quality. AI for life safety and deterrence Video analytics will play an increasingly central role as a detection and deterrence tool Video analytics will play an increasingly central role as a detection and deterrence tool. Advances in AI-driven systems will simplify deployment and enable companies to implement more robust remote video monitoring (RVM). This next stage of innovation will focus on integrating video analytics with access control, alarms, and environmental sensors to create cohesive, intelligent security solutions. This will enable organisations to leverage capabilities like automated locking mechanisms to prevent unauthorised access or triggering voice-down messages to deter theft or loitering. However, maintaining a “human in the loop” will be crucial to overseeing AI operations, ensuring sound decision-making in high-stakes situations, and building trust in the technology. Conversational AI and automated interventions Interface Systems anticipates continued advancements in conversational AI to enhance remote video monitoring. Currently, AI-driven systems can identify “what” to respond to — distinguishing between human motion, vehicle movement, or environmental factors. In 2025, conversational AI will advance to determine “how” to respond, providing highly contextual, automated interventions. Machine learning models Machine learning models refine these interactions by analysing results and response parameters For example, AI could customise announcements based on situational details like a vehicle’s description or a suspect’s clothing, increasing the effectiveness of automated responses. Over time, machine learning models will refine these interactions by analysing outcomes and adapting response parameters to improve deterrence. Ahead of security challenges “As threats continue to evolve, we anticipate that innovation in AI, video analytics, and cloud-based solutions will empower businesses to stay ahead of security challenges." "At Interface, we remain committed to developing and delivering next-generation security technologies that prioritise proactive prevention and operational efficiency,” said Sean Foley, Chief Revenue Officer at Interface Systems.
Eagle Eye Networks, the global pioneer in cloud video surveillance released the 2025 edition of its annual Trends in Video Surveillance report, identifying six trends that will have the largest impact on businesses around the world in 2025. Designed as a resource for business owners and security professionals, the report offers trend analysis, simple explanations of newer technology, and practical advice on implementing video surveillance in new ways. AI in video surveillance “This year’s trends report reflects the rapid technological advances–particularly with AI–that have taken place over the past 12 months,” said Dean Drako, CEO of Eagle Eye Networks. “AI is improving the accuracy, speed, and usability of security cameras and dramatically expanding the value of video surveillance for business owners who want to improve security and make their operations more efficient.” Video surveillance trends The top six video surveillance trends for 2025 are: More remote video monitoring due to increased practicality, affordability, and the use of AI to reduce false positive alarms. Security cameras in more places, including locations that were too remote or too expensive to install only a couple of years ago. Multi-sensor cameras are proliferating, enabling one camera to do the work of two or more cameras. Gun detection is a rapidly improving technology that uses AI, and has numerous advantages over human guards. Low-light capability in security cameras not only delivers better video, but also increases the reliability of AI-based object recognition, face detection, and licence plate recognition. More cameras have built-in AI, capable of functions such as object recognition and event detection.
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the launch of the new U-series, marking the first time edge AI has been introduced to all its security camera lines. The U-series is designed for installations that need the accuracy advantages of AI-based object detection in security environments at an entry level. i-PRO U-series line-up The models are mainly suited for detecting intruders, loitering, direction, and line crossing The models are particularly suited for detecting intruders, loitering, direction, line crossing, and speeding. Providing an efficient, edge-computing approach without compromising on performance. "As a pioneer in edge computing within the security industry, i-PRO was the first to integrate AI across our entire S-series line, setting a new standard. Now, the i-PRO U-series line-up introduces essential edge computing technology to our entry-level models, transforming them into proactive devices that align with market trends,” said Gerard Figols, Chief Product Officer at i-PRO. New product line introduces imaging options Figols added: “By bringing the advantages of AI to fundamental security installations, we’re offering smarter technology for end-users who don’t require forensic search and advanced business insights based on metadata and attributes." The new product line introduces higher-resolution imaging options, including 2MP, 5MP, and 4K dome, box, and bullet cameras, enhancing clarity and precision. Additional features include: Advanced AI Image Analytics: AI-VMD for intelligent video motion detection Audio recording capabilities for enhanced situational awareness Increased Optical Zoom for improved focus on image clarity and analytics accuracy Direct-to-cloud VSaaS support Cameras deliver real-time insights while reducing bandwidth consumption The U-series camera line was designed to be a perfect companion for direct-to-cloud VSaaS deployments offering flexibility and scalability. As cloud-based solutions continue to evolve, future firmware updates will enable additional features and functionality. By combining Direct-to-Cloud connectivity with AI on the Edge, these cameras deliver real-time insights while reducing bandwidth consumption, improving response times, and enhancing data privacy. Strengthening cybersecurity In line with its mission to pioneer edge computing, i-PRO has integrated AI technology across the entire product line-up. Recognising the responsibility this entails, the company remains committed to enhancing its cybersecurity standard. While other companies adhere to FIPS 140-2, the new U-Series surpasses this with FIPS 140-3 level 3 compliance, utilising an NXP EdgeLock secure element, to provide the industry's highest level of data security. Requirements for cryptographic modules Level 3 certification includes stricter requirements for cryptographic modules Level 3 certification includes stricter requirements for cryptographic modules, further reinforcing security by improving physical tamper resistance and safeguarding against key extraction and hardware attacks. Featuring secure boot functionality, the cameras deliver strong protection against unauthorised access and cyber threats. Non-AI replacement models “i-PRO does not compromise cybersecurity by any means - not even in our entry-level camera line-up. By prioritising the highest level of cybersecurity, we demonstrate our commitment to data integrity, ensuring peace of mind for all our customers and users,” adds Figols. The new U-series consists of 28 models, with 15 featuring edge-processed AI analytics and 13 serving as non-AI replacement models. AI-enabled models will be available from June/July, and the non-AI models will be available later this year.
German video technology manufacturer Dallmeier will showcase its intelligent video solutions for casinos as the Exclusive Platinum Sponsor at the WGPC 2025 (World Game Protection Conference) in Las Vegas from 11 to 13 March. Highlights include the new “Picoline” camera series, CAT Casino Automation Technology and the Hemisphere® SeMSy® video management system. Picoline–small camera Dallmeier presents the new “Picoline” camera series at the WGPC. The Picoline combines high image quality with up to five (5) MP resolution, a wide range of cybersecurity features and AI assisted analytics in a compact surface mount housing. The small form factor enables installation in confined spaces on ceilings or walls and is powered via PoE. The cameras are equipped with a High Dynamic Range (HDR) function to optimise the capture of high-contrast scenes with very bright and very dark areas, as is often the case in casinos. Each frame is captured with two special settings that are combined in real time to produce a balanced result. The resulting video stream offers significantly more detail in both light and dark areas and is optically very similar to how the human eye perceives them. Dallmeier’s Casino Automation Technology Key analytics that will be on display at WGPC 2025 include game pace, game results Pit Managers and floor managers can increase operational efficiency and profitability of the entire gaming floor with Dallmeier’s Casino Automation Technology (CAT). CAT monitors and automates table games (e.g. Blackjack, Baccarat), automating a wide variety of manual tasks, significantly increasing dealer efficiency and table gaming profitability. Key analytics that will be on display at WGPC 2025 include game pace, game results and chip float analysis. Intuitive management with Hemisphere® SeMSy® The Hemisphere® SeMSy® management software (SeMSy® 5) is available for professional and intuitive management of the system. At the WGPC 2025 Dallmeier will present the modular VMS live and introduce new functions. In combination with the Panomera® W series 180° and 360° panoramic cameras, which enable efficient surveillance of large indoor areas with fewer cameras, the time to resolve incidents is reduced by more than 80%.
Comelit-PAC is ready to make an impact at The Security Event 2025, with an opportunity for visitors to connect and explore the latest portfolio of security and fire safety systems. On stand 5/F60, the global specialist will present the latest solutions. This includes PAC’s video surveillance integration with PAC Access Central, the PAC 501 access control solution and the PAC Gateway with Housing Central. New 7TOP as Comelit-PAC Door entry technology on display will include the innovative new 7TOP as Comelit-PAC’s most its most advanced IP door entry monitor to date alongside LOGOS Wi-Fi, offering enhanced NFC connectivity and convenience. Visitors to the stand will be able to see live demonstrations of Comelit-PAC’s NDAA-compliant video surveillance range, a key focus for 2025. Fire detection series Life safety systems will feature the LogiFire, including the addition to its robust alarm systems range Life safety systems will feature the LogiFire including the addition to its robust alarm systems range, embracing a wireless fire detection series that is available with addressable or conventional transceivers capable of cloud and remote monitoring. Says Francesca Boeris, Comelit-PAC Managing Director: “The Security Event is always a highlight for us. It’s not just about showcasing our latest innovations - it’s about reconnecting with our valued partners and welcoming new friends. We look forward to discussing new ways of working together, sharing a drink and demonstrating how Comelit-PAC solutions can help ensure end-users truly ‘Feel Secure.’” Advanced security technology and fire safety systems At The Security Event, Comelit-PAC is introducing the Vault Challenge, where attendees can test their knowledge by answering security-related or product-based questions for a chance to unlock a PAC Pin Prox vault and win prizes. Participants are encouraged to share their experiences using #FeelSecureChallenge. Francesca added: “Comelit-PAC’s presence at The Security Event 2025 promises to be an engaging experience. From advanced security technology and fire safety systems to an interactive competition, we are excited to create a warm and welcoming space where industry professionals can connect with us, learn, and experience the very best of our solutions.” The Security Event 2025 is taking place 8 – 10 April 2025 at The NEC Birmingham.


Expert commentary
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
EQUANS were engaged by JLL to create a Digital Artwork Display using LED to showcase immersive content and create a high tech but nature-driven aesthetic at one of Melbourne’s premier business addresses. Digital Artwork Display The Digital Artwork Display had to encompass functional requirements, including LED video wall display, a display interface unit for image processing, LED time module control and remote monitoring, a digital playback server capable of displaying the artwork’s intense digital content, and a control interface accessible via web browser and mobile tablet device. The display’s aspect ratio of 32:9 presented a unique and challenging canvas for content creation. To ensure the highest aesthetic standards, any content had to be able to be displayed in its native aspect without stretching or compressing. The Solution This project is a real-time artwork with interactive waves, tides and currents from an island cluster This project is a real-time artwork with interactive waves, tides and currents from an island cluster in Australia. The PC that the artwork is generated from reads the tidal information in real time and converts it into the artwork. As the wind blows, waves ripple across the screen and during high tide the islands are covered with water. A digital set-top box allows display of commercial TV channels for breaking news and events, if relevant to the building occupants. The LED cabinets are mounted onto a custom aluminum-extruded mounting frame to ensure sub-millimetre accuracy required for an extremely flat image without visible cabinet lines. Sound system with 25 speakers installed To support the video art, a sound system with 25 speakers across three separate zones and 8 audio channels allows for optimal tuning and configuration. The audio resides on a QSC digital sound processor platform supporting network audio. This enables visitors to listen to highest quality sound from a range of audio sources. Control of the video wall takes place via a Crestron control system with a wireless touch panel that technicians can access from the foyer. All head-end equipment is powered by a 2KVA uninterrupted power supply, allowing soft power downs in case of power outages, helping extend the life of the system. The Benefit EQUANS have implemented ground-breaking technology at Freshwater Place’s newly refurbished foyer. The publicly accessible digital artwork provides an opportunity for all building occupants to engage with interactive, situational and customised technology. The 11x3m Silicon Core LED screen and audio system was a successful installation from EQUANS ANZ. Overview Key facts: 25 speakers across three separate zones & 8 audio channels Unique display aspect ratio 32:9
Yanmar Holdings Co., Ltd. is one of Japan's largest manufacturing companies, founded in 1912, and now has more than 25,000 employees worldwide. Yanmar has positioned itself in the international market as a pioneer in diesel engine technology and has developed a wide range of industrial equipment, including engines, agricultural machinery, installations, construction equipment, power systems, marine and other components. With over a century of manufacturing experience, Yanmar is actively promoting digital transformation across the company. As part of this initiative, VIVOTEK implemented advanced surveillance solutions to enhance traffic management and operational efficiency for Yanmar Construction Equipment Co., Ltd. in Fukuoka, Japan. Challenges Before implementing VIVOTEK’s surveillance solutions, Yanmar Construction Equipment Co., Ltd. faced several challenges in ensuring the safety of the factory area. These challenges included: Automated Guided Vehicles (AGVs) were prone to accidents at intersections with truck routes and walking zones. Additionally, AGVs sometimes derailed or stopped due to issues like sunlight reflecting off QR code covers, affecting navigation and requiring better monitoring for diagnosis and resolution. Difficulty in identifying the root causes of quality issues on the assembly line due to high daily production volume and operators' inability to recall specific incidents. Inefficient manual inspections were needed to monitor paint sludge on stored paint containers, along with the need to understand the true causes of productivity issues and detect abnormalities in painting equipment early. These challenges underscored the need for a comprehensive security solution to enhance the efficiency and safety of factory operations. A surveillance system can not only track accidents on traffic routes and improve route planning but also boost overall factory operational efficiency. Solutions After identifying the client’s pain points, VIVOTEK, in collaboration with its partner Takebishi, tailored advanced surveillance solutions to meet their needs by installing various types of cameras and a video receiver in the construction equipment assembly facility of Yanmar Construction Equipment Co., Ltd. AGVs Monitoring: Cameras are focused on monitoring AGVs, enabling supervisors to respond immediately to accidents and identify areas for improvement in safety protocols. Assembly Line Monitoring: Camera footage captures images of the assembly line, helping to pinpoint the causes of quality issues and streamline production processes. By utilising this "looking-back" analysis, management can improve both productivity and safety, pinpoint areas needing improvement, and significantly reduce unwanted accidents, resulting in more effective and efficient operations. Sludge Monitoring: Cameras can monitor the accumulated sludge on stored paint containers, which can cause unpleasant odours in the facility. This monitoring helps maintain a cleaner and odor-free environment. Previously, staff had to physically inspect the site every hour, often discovering that no cleaning was necessary. With the cameras providing continuous real-time images, management can now remotely monitor the condition of the equipment, significantly reducing unnecessary site visits. Staff only need to visit the site when cleaning is actually required. Smart Analysis through Integration of VIVOTEK’s Cameras and BI Tool: By integrating VIVOTEK’s cameras with the BI tool MotionBoard, camera footage is now being used for work analysis and status monitoring in the factory, enabling more intelligent analysis. Results and customer feedback Yanmar Construction Equipment Co., Ltd. expressed a high level of satisfaction with VIVOTEK’s advanced surveillance solutions, including performance, price, and reliability. "Not only did they meet our requirements, but VIVOTEK also provided more detailed proposals based on their expertise. They were flexible in handling tight deadlines and challenging installation demands," said Yanmar Construction Equipment Co., Ltd. "While this project was implemented at one of Yanmar Construction Equipment Co., Ltd.'s locations, due to the customer's high satisfaction, we aim to expand the solution across their nationwide facilities and throughout the entire Yanmar Group," commented from partner company Takebishi Co., Ltd.
Holliday Wharf & Canal Wharf in Central Birmingham is a bustling apartment complex of 143 properties and home to 400 residents. The development is located in a region that has experienced rapid growth and redevelopment, with a surge in new bars and restaurants opening, and new student accommodation also housed in the area. Safety of residents The management group perceived the growth complex was facing rising security concerns With the recent influx of nightlife, hospitality outlets, and a growing student population, the management company perceived the development complex was facing increasing security concerns. James Clayton, Chair of Holliday Wharf Management, emphasised the legal responsibility to ensure the safety of residents. "With the influx of people into the area, it was imperative that we prioritise our residents' security," he said. "We needed a system that would not only protect them but would also enhance their living experience." System requirements The security challenges included incidents of unauthorised access, coupled with increasing concerns about package theft and personal safety, all of which highlighted the need for a more robust access control solution. Wharf Management determined that a comprehensive overhaul of the access control system was imperative to protect residents and their assets. Existing security infrastructure In reply to crises, the firm sought the expertise of Urban Stream to set a tailored safety plan In response to these concerns, the company sought the expertise of Urban Stream, a specialist security installer, to develop a tailored security strategy and install a new system. Dale Taylor, of Urban Stream, explains, “The Wharf Management team identified several pain points within their existing security infrastructure. Our goal was to develop a comprehensive solution that would not only resolve these issues but also exceed their expectations.” The solution Working in partnership with the CIE system design team, Urban Stream implemented a full Akuvox access control and door intercom system. This state-of-the-art system replaced traditional key fobs and pin readers with advanced facial recognition technology. Residents now enjoy seamless access to the building and car park through the power of biometric access credentials. The Akuvox system provides a robust door entry and resident intercom system that encompasses a bespoke-built database management and analytics reporting system, ensuring comprehensive control over access permissions and live reporting. Facial recognition technology Residents have expressed their satisfaction with the increased security and ease of use By eliminating the vulnerabilities associated with physical keys and PIN codes, the system significantly enhances security while offering unparalleled convenience to residents. The positive impact of the new system is evident. Residents have expressed their satisfaction with the increased security and ease of use. The advanced facial recognition technology has added a layer of sophistication to the complex, elevating its appeal and value to potential buyers and tenants. Products At the heart of the Holiday Wharf/Canal Wharf security upgrade is the Akuvox access control system. This comprehensive solution features a range of advanced products and ‘smart intercom’ products designed to provide maximum security and convenience. Central to the system is the facial recognition access credentials featured within the Akuvox R29C and E16 smart door intercoms, a state-of-the-art access credential technology that accurately identifies residents and authorised personnel. By capturing and analysing facial features, the system grants or denies access with speed and precision. Akuvox touchscreen answering panel The system has a vital database control system ruling to efficient control over access licenses Furthermore, each of the 140+ apartments features an Akuvox touchscreen answering panel which not only provides high-definition audio/video communication with visitors requesting access but also allows individual residents to integrate these touchscreen panels with any smart-home automation platforms they may be using within their apartment. The system also includes a robust database management system, allowing for efficient control over access permissions. This feature enables property management to easily manage resident information, grant access privileges, and monitor system activity. Integration of the Akuvox system The integration of the Akuvox system with the apartment complex’s existing infrastructure ensures seamless operation. The system works in harmony with other building management systems, providing a unified approach to security and property management. By leveraging the power of facial recognition and advanced database management, the Akuvox system delivers a superior level of security and live analytical reporting without compromising convenience for residents. Results and benefits Locals have embraced the new system madly, praising its comfort and efficiency The implementation of the Akuvox access control system at Holiday/Canal Wharf development has yielded impressive results. The most significant benefit is a substantial enhancement in security. By replacing traditional, less secure methods with advanced facial recognition technology, the complex has effectively eliminated the risk of unauthorised access. Residents have embraced the new system enthusiastically, praising its convenience and efficiency. The ability to access the building and car park effortlessly using facial recognition has significantly improved residents' quality of life. Effectiveness of the Akuvox system Moreover, the increased security has had a positive impact on property values. Potential buyers and tenants are increasingly drawn to properties that offer state-of-the-art security features. The Akuvox system has positioned Holiday Wharf as a pioneer in apartment complex security, attracting attention from across the region. The success of this project has not gone unnoticed. Holiday Wharf has received numerous inquiries from other property management companies interested in implementing similar systems. This growing interest is a testament to the effectiveness of the Akuvox system and CIE-Group's expertise in delivering cutting-edge security solutions.
Comelit-PAC LOGOS video door entry monitors have been installed at the luxury Mercantile residential development in just two weeks from quotation to project completion, thanks to the enhanced security technology. Situated in Ropewalks, a central hub in Liverpool, the Mercantile is a cosmopolitan living environment situated at the heart of the city. Featuring 32 one- and two-bedroom apartments together with a collection of penthouses, the development is suitable for buy-to-live and buy-to-let clients. Ideal features and benefits of smart LOGOs monitors With premier interior specification, security specialist on site Digital Vision North West was introduced to Comelit-PAC via its gold partner distributor Moreton Alarms, with the smart LOGOs monitors proving ideal features and benefits to seamlessly blend with their surroundings. Says John Morley of Legacie Developments: “Every aspect of the Mercantile has been designed to be world-class and completed to an impeccable standard to maintain our impressive portfolio of luxury living environments in key UK cities. We knew of Comelit-PAC for its own reputation for high specification solutions and were happy to be introduced to the LOGOs monitors. All 32 monitors were installed quickly and offer our residents impressive features and benefits.” Power and use of NFC communications New Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality The new Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality. By harnessing the power of NFC communications and the dedicated MyComelit app, the LOGOS Monitor was selected over other brands for its high-quality video capabilities, user-friendly interface, and competitive pricing. Says Mark Lewis, Director of Digital Vision North West: “The streamlined design and efficient integration of the LOGOs monitors made it the ideal choice for this residential development. Its real benefit is the use of NFC communications, where we could programme each monitor quickly and efficiently, ready for resident use. From quoting to works completion is a top effort to offer such advanced smart door entry technology; we’ll definitely be using them more in the future.” Innovation and security excellence Tom McCabe of Comelit-PAC added: “Whilst Comelit-PAC is known for our focus on style and design, the LOGOs monitor demonstrates our commitment to innovation and security excellence." "We continuously strive to enhance our product portfolio and simplify the setup process, enabling more installers to offer smart door entry technology with ease. It’s fantastic to see LOGOs installed at such a prestigious project in Liverpool and to witness how its advanced functionality enhances both security and convenience for modern city living.”
Battery Energy Storage Systems (BESS) are essential for storing renewable energy and ensuring grid stability. However, their implementation comes with inherent risks, particularly related to lithium-ion battery fires. BESS fires can start from thermal runaway, where one cell failure can trigger a cascade of overheating, leading to fires that are difficult to extinguish and can last for hours or even days. Should a fire breakout, hazardous gases would release from the batteries, posing health risks to nearby communities and causing environmental damage through soil and water contamination. Traditional detection methods BESS fires have the potential for huge disruptions to locals via property damage and even evacuations In severe cases, BESS fires have the potential for huge disruptions to locals through property damage and even evacuations. Traditional detection methods such as flame detectors often fail in the early stages of a BESS fire due to their reliance on visible flames or smoke, which might not be immediately present. Where flame detectors fall short, thermal imaging cameras can significantly improve protection and prevent fires before they ever reach combustion. Advantages of thermal cameras for BESS Thermal cameras detect the heat signature from the onset of thermal runaway long before visible flames or smoke appear, allowing for preemptive action to mitigate risks. While flame detectors react to events that have already happened, a fixed thermal camera such as the FLIR A700F Advance Smart Sensor provides 24/7 surveillance by continuously monitoring for temperature anomalies that could indicate an impending fire, thus enabling early intervention. FLIR cameras are designed for easy integration into broader safety and control systems, allowing for automated responses such as activating suppression systems that enhance response times and efficiency. Comparison with other detection methods FLIR thermal imaging cameras can detect heat in low light and see the start of embers as they heat up While flame detectors are designed to detect visible fire, they may miss smouldering or hidden fires—meaning an alert may not be tripped until the fire has escalated to a dangerous level. FLIR thermal imaging cameras can detect heat in low light and see the beginnings of embers as they heat up surrounding materials, even when there's no visible sign of fire. This early detection can prevent escalation or at least minimise damage by providing critical time for action before fires get out of control. Another advantage of thermal cameras is their ability to monitor large areas or multiple battery racks simultaneously, providing comprehensive coverage which is often challenging for point-specific flame detectors. Conclusion Incorporating FLIR thermal monitoring into BESS installations not only addresses the critical safety concerns associated with battery fires but also offers a proactive, reliable, and technologically advanced solution. By choosing a FLIR fixed thermal solution, they ensure that the energy storage systems are safeguarded with the industry's pioneering thermal imaging technology, protecting both the investment and the community from the devastating effects of BESS fires.
Comcast Smart Solutions, a division of Comcast Corporation (NASDAQ: CMCSA) that specialises in smart technologies for businesses and communities, announced that it will provide the Youth Crisis Centre (YCC) with smart video camera technology with AI analytics capabilities to help strengthen safety protocols and provide monitoring across its facilities. Founded in 1974, the Youth Crisis Centre is a pioneering facility and nonprofit in Jacksonville, Florida. YCC has remained dedicated to its mission of supporting youth and families impacted by traumatic situations, including divorce, homelessness, relocation, loss of life, bullying, and abuse by providing short-term crisis care, counselling, and residential services. Offering a safe environment to support young people and their families is central to YCC’s mission. Smart camera and analytics solutions Offering a safe environment to support young people and their families is central to YCC’s mission “We are honoured to provide our smart camera and analytics solutions to the Youth Crisis Centre. This organisation has made an incredible impact on the Jacksonville community by supporting its residents when they need it the most,” said Jeff Buzzelli, Regional Senior Vice President of Comcast Florida. “Our team is committed to delivering impeccable service that helps YCC create a stable space for patients to heal and give employees peace of mind.” AI-driven video analytics Eighty-two smart video cameras from Eagle Eye Networks will help to enhance security objectives across YCC’s five-building campus by delivering real-time alerts, AI-driven video analytics, entry and exit monitoring, and intuitive smart search for easier object detection. The system, powered by Comcast connectivity, includes a centralised Video Management System (VMS) with a remote dashboard and Licence Plate Recognition (LPR) technology. Additionally, staff can access up to 30 days of recorded footage for improved monitoring and response times. Video information and real-time insights Video information and real-time insights will help YCC better understand resident and employee Collectively, these tools help offer YCC a comprehensive view of its property through its self-monitoring system. Video information and real-time insights will help YCC better understand resident and employee patterns and strengthen security protocols. With campus-wide self-monitoring and smart technology solutions, YCC is better equipped to support staff and families while delivering high-quality care. Reliable and advanced platform “The safety and well-being of our families are our top priorities, as we are continually working towards providing a secure environment that supports recovery during their time here,” said Peter Hicks, Chief Development Office at the Youth Crisis Centre. “Our facilities previously relied on an analog system, but with Comcast Smart Solutions, we have a reliable and advanced platform that allows us to more effectively monitor our campus and take a more comprehensive approach to enhancing security. This helps our staff focus on providing the best care possible to the youth and families we serve.”
EQUANS were engaged by JLL to create a Digital Artwork Display using LED to showcase immersive content and create a high tech but nature-driven aesthetic at one of Melbourne’s premier business addresses. Digital Artwork Display The Digital Artwork Display had to encompass functional requirements, including LED video wall display, a display interface unit for image processing, LED time module control and remote monitoring, a digital playback server capable of displaying the artwork’s intense digital content, and a control interface accessible via web browser and mobile tablet device. The display’s aspect ratio of 32:9 presented a unique and challenging canvas for content creation. To ensure the highest aesthetic standards, any content had to be able to be displayed in its native aspect without stretching or compressing. The Solution This project is a real-time artwork with interactive waves, tides and currents from an island cluster This project is a real-time artwork with interactive waves, tides and currents from an island cluster in Australia. The PC that the artwork is generated from reads the tidal information in real time and converts it into the artwork. As the wind blows, waves ripple across the screen and during high tide the islands are covered with water. A digital set-top box allows display of commercial TV channels for breaking news and events, if relevant to the building occupants. The LED cabinets are mounted onto a custom aluminum-extruded mounting frame to ensure sub-millimetre accuracy required for an extremely flat image without visible cabinet lines. Sound system with 25 speakers installed To support the video art, a sound system with 25 speakers across three separate zones and 8 audio channels allows for optimal tuning and configuration. The audio resides on a QSC digital sound processor platform supporting network audio. This enables visitors to listen to highest quality sound from a range of audio sources. Control of the video wall takes place via a Crestron control system with a wireless touch panel that technicians can access from the foyer. All head-end equipment is powered by a 2KVA uninterrupted power supply, allowing soft power downs in case of power outages, helping extend the life of the system. The Benefit EQUANS have implemented ground-breaking technology at Freshwater Place’s newly refurbished foyer. The publicly accessible digital artwork provides an opportunity for all building occupants to engage with interactive, situational and customised technology. The 11x3m Silicon Core LED screen and audio system was a successful installation from EQUANS ANZ. Overview Key facts: 25 speakers across three separate zones & 8 audio channels Unique display aspect ratio 32:9
Yanmar Holdings Co., Ltd. is one of Japan's largest manufacturing companies, founded in 1912, and now has more than 25,000 employees worldwide. Yanmar has positioned itself in the international market as a pioneer in diesel engine technology and has developed a wide range of industrial equipment, including engines, agricultural machinery, installations, construction equipment, power systems, marine and other components. With over a century of manufacturing experience, Yanmar is actively promoting digital transformation across the company. As part of this initiative, VIVOTEK implemented advanced surveillance solutions to enhance traffic management and operational efficiency for Yanmar Construction Equipment Co., Ltd. in Fukuoka, Japan. Challenges Before implementing VIVOTEK’s surveillance solutions, Yanmar Construction Equipment Co., Ltd. faced several challenges in ensuring the safety of the factory area. These challenges included: Automated Guided Vehicles (AGVs) were prone to accidents at intersections with truck routes and walking zones. Additionally, AGVs sometimes derailed or stopped due to issues like sunlight reflecting off QR code covers, affecting navigation and requiring better monitoring for diagnosis and resolution. Difficulty in identifying the root causes of quality issues on the assembly line due to high daily production volume and operators' inability to recall specific incidents. Inefficient manual inspections were needed to monitor paint sludge on stored paint containers, along with the need to understand the true causes of productivity issues and detect abnormalities in painting equipment early. These challenges underscored the need for a comprehensive security solution to enhance the efficiency and safety of factory operations. A surveillance system can not only track accidents on traffic routes and improve route planning but also boost overall factory operational efficiency. Solutions After identifying the client’s pain points, VIVOTEK, in collaboration with its partner Takebishi, tailored advanced surveillance solutions to meet their needs by installing various types of cameras and a video receiver in the construction equipment assembly facility of Yanmar Construction Equipment Co., Ltd. AGVs Monitoring: Cameras are focused on monitoring AGVs, enabling supervisors to respond immediately to accidents and identify areas for improvement in safety protocols. Assembly Line Monitoring: Camera footage captures images of the assembly line, helping to pinpoint the causes of quality issues and streamline production processes. By utilising this "looking-back" analysis, management can improve both productivity and safety, pinpoint areas needing improvement, and significantly reduce unwanted accidents, resulting in more effective and efficient operations. Sludge Monitoring: Cameras can monitor the accumulated sludge on stored paint containers, which can cause unpleasant odours in the facility. This monitoring helps maintain a cleaner and odor-free environment. Previously, staff had to physically inspect the site every hour, often discovering that no cleaning was necessary. With the cameras providing continuous real-time images, management can now remotely monitor the condition of the equipment, significantly reducing unnecessary site visits. Staff only need to visit the site when cleaning is actually required. Smart Analysis through Integration of VIVOTEK’s Cameras and BI Tool: By integrating VIVOTEK’s cameras with the BI tool MotionBoard, camera footage is now being used for work analysis and status monitoring in the factory, enabling more intelligent analysis. Results and customer feedback Yanmar Construction Equipment Co., Ltd. expressed a high level of satisfaction with VIVOTEK’s advanced surveillance solutions, including performance, price, and reliability. "Not only did they meet our requirements, but VIVOTEK also provided more detailed proposals based on their expertise. They were flexible in handling tight deadlines and challenging installation demands," said Yanmar Construction Equipment Co., Ltd. "While this project was implemented at one of Yanmar Construction Equipment Co., Ltd.'s locations, due to the customer's high satisfaction, we aim to expand the solution across their nationwide facilities and throughout the entire Yanmar Group," commented from partner company Takebishi Co., Ltd.
Holliday Wharf & Canal Wharf in Central Birmingham is a bustling apartment complex of 143 properties and home to 400 residents. The development is located in a region that has experienced rapid growth and redevelopment, with a surge in new bars and restaurants opening, and new student accommodation also housed in the area. Safety of residents The management group perceived the growth complex was facing rising security concerns With the recent influx of nightlife, hospitality outlets, and a growing student population, the management company perceived the development complex was facing increasing security concerns. James Clayton, Chair of Holliday Wharf Management, emphasised the legal responsibility to ensure the safety of residents. "With the influx of people into the area, it was imperative that we prioritise our residents' security," he said. "We needed a system that would not only protect them but would also enhance their living experience." System requirements The security challenges included incidents of unauthorised access, coupled with increasing concerns about package theft and personal safety, all of which highlighted the need for a more robust access control solution. Wharf Management determined that a comprehensive overhaul of the access control system was imperative to protect residents and their assets. Existing security infrastructure In reply to crises, the firm sought the expertise of Urban Stream to set a tailored safety plan In response to these concerns, the company sought the expertise of Urban Stream, a specialist security installer, to develop a tailored security strategy and install a new system. Dale Taylor, of Urban Stream, explains, “The Wharf Management team identified several pain points within their existing security infrastructure. Our goal was to develop a comprehensive solution that would not only resolve these issues but also exceed their expectations.” The solution Working in partnership with the CIE system design team, Urban Stream implemented a full Akuvox access control and door intercom system. This state-of-the-art system replaced traditional key fobs and pin readers with advanced facial recognition technology. Residents now enjoy seamless access to the building and car park through the power of biometric access credentials. The Akuvox system provides a robust door entry and resident intercom system that encompasses a bespoke-built database management and analytics reporting system, ensuring comprehensive control over access permissions and live reporting. Facial recognition technology Residents have expressed their satisfaction with the increased security and ease of use By eliminating the vulnerabilities associated with physical keys and PIN codes, the system significantly enhances security while offering unparalleled convenience to residents. The positive impact of the new system is evident. Residents have expressed their satisfaction with the increased security and ease of use. The advanced facial recognition technology has added a layer of sophistication to the complex, elevating its appeal and value to potential buyers and tenants. Products At the heart of the Holiday Wharf/Canal Wharf security upgrade is the Akuvox access control system. This comprehensive solution features a range of advanced products and ‘smart intercom’ products designed to provide maximum security and convenience. Central to the system is the facial recognition access credentials featured within the Akuvox R29C and E16 smart door intercoms, a state-of-the-art access credential technology that accurately identifies residents and authorised personnel. By capturing and analysing facial features, the system grants or denies access with speed and precision. Akuvox touchscreen answering panel The system has a vital database control system ruling to efficient control over access licenses Furthermore, each of the 140+ apartments features an Akuvox touchscreen answering panel which not only provides high-definition audio/video communication with visitors requesting access but also allows individual residents to integrate these touchscreen panels with any smart-home automation platforms they may be using within their apartment. The system also includes a robust database management system, allowing for efficient control over access permissions. This feature enables property management to easily manage resident information, grant access privileges, and monitor system activity. Integration of the Akuvox system The integration of the Akuvox system with the apartment complex’s existing infrastructure ensures seamless operation. The system works in harmony with other building management systems, providing a unified approach to security and property management. By leveraging the power of facial recognition and advanced database management, the Akuvox system delivers a superior level of security and live analytical reporting without compromising convenience for residents. Results and benefits Locals have embraced the new system madly, praising its comfort and efficiency The implementation of the Akuvox access control system at Holiday/Canal Wharf development has yielded impressive results. The most significant benefit is a substantial enhancement in security. By replacing traditional, less secure methods with advanced facial recognition technology, the complex has effectively eliminated the risk of unauthorised access. Residents have embraced the new system enthusiastically, praising its convenience and efficiency. The ability to access the building and car park effortlessly using facial recognition has significantly improved residents' quality of life. Effectiveness of the Akuvox system Moreover, the increased security has had a positive impact on property values. Potential buyers and tenants are increasingly drawn to properties that offer state-of-the-art security features. The Akuvox system has positioned Holiday Wharf as a pioneer in apartment complex security, attracting attention from across the region. The success of this project has not gone unnoticed. Holiday Wharf has received numerous inquiries from other property management companies interested in implementing similar systems. This growing interest is a testament to the effectiveness of the Akuvox system and CIE-Group's expertise in delivering cutting-edge security solutions.
Comelit-PAC LOGOS video door entry monitors have been installed at the luxury Mercantile residential development in just two weeks from quotation to project completion, thanks to the enhanced security technology. Situated in Ropewalks, a central hub in Liverpool, the Mercantile is a cosmopolitan living environment situated at the heart of the city. Featuring 32 one- and two-bedroom apartments together with a collection of penthouses, the development is suitable for buy-to-live and buy-to-let clients. Ideal features and benefits of smart LOGOs monitors With premier interior specification, security specialist on site Digital Vision North West was introduced to Comelit-PAC via its gold partner distributor Moreton Alarms, with the smart LOGOs monitors proving ideal features and benefits to seamlessly blend with their surroundings. Says John Morley of Legacie Developments: “Every aspect of the Mercantile has been designed to be world-class and completed to an impeccable standard to maintain our impressive portfolio of luxury living environments in key UK cities. We knew of Comelit-PAC for its own reputation for high specification solutions and were happy to be introduced to the LOGOs monitors. All 32 monitors were installed quickly and offer our residents impressive features and benefits.” Power and use of NFC communications New Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality The new Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality. By harnessing the power of NFC communications and the dedicated MyComelit app, the LOGOS Monitor was selected over other brands for its high-quality video capabilities, user-friendly interface, and competitive pricing. Says Mark Lewis, Director of Digital Vision North West: “The streamlined design and efficient integration of the LOGOs monitors made it the ideal choice for this residential development. Its real benefit is the use of NFC communications, where we could programme each monitor quickly and efficiently, ready for resident use. From quoting to works completion is a top effort to offer such advanced smart door entry technology; we’ll definitely be using them more in the future.” Innovation and security excellence Tom McCabe of Comelit-PAC added: “Whilst Comelit-PAC is known for our focus on style and design, the LOGOs monitor demonstrates our commitment to innovation and security excellence." "We continuously strive to enhance our product portfolio and simplify the setup process, enabling more installers to offer smart door entry technology with ease. It’s fantastic to see LOGOs installed at such a prestigious project in Liverpool and to witness how its advanced functionality enhances both security and convenience for modern city living.”
Battery Energy Storage Systems (BESS) are essential for storing renewable energy and ensuring grid stability. However, their implementation comes with inherent risks, particularly related to lithium-ion battery fires. BESS fires can start from thermal runaway, where one cell failure can trigger a cascade of overheating, leading to fires that are difficult to extinguish and can last for hours or even days. Should a fire breakout, hazardous gases would release from the batteries, posing health risks to nearby communities and causing environmental damage through soil and water contamination. Traditional detection methods BESS fires have the potential for huge disruptions to locals via property damage and even evacuations In severe cases, BESS fires have the potential for huge disruptions to locals through property damage and even evacuations. Traditional detection methods such as flame detectors often fail in the early stages of a BESS fire due to their reliance on visible flames or smoke, which might not be immediately present. Where flame detectors fall short, thermal imaging cameras can significantly improve protection and prevent fires before they ever reach combustion. Advantages of thermal cameras for BESS Thermal cameras detect the heat signature from the onset of thermal runaway long before visible flames or smoke appear, allowing for preemptive action to mitigate risks. While flame detectors react to events that have already happened, a fixed thermal camera such as the FLIR A700F Advance Smart Sensor provides 24/7 surveillance by continuously monitoring for temperature anomalies that could indicate an impending fire, thus enabling early intervention. FLIR cameras are designed for easy integration into broader safety and control systems, allowing for automated responses such as activating suppression systems that enhance response times and efficiency. Comparison with other detection methods FLIR thermal imaging cameras can detect heat in low light and see the start of embers as they heat up While flame detectors are designed to detect visible fire, they may miss smouldering or hidden fires—meaning an alert may not be tripped until the fire has escalated to a dangerous level. FLIR thermal imaging cameras can detect heat in low light and see the beginnings of embers as they heat up surrounding materials, even when there's no visible sign of fire. This early detection can prevent escalation or at least minimise damage by providing critical time for action before fires get out of control. Another advantage of thermal cameras is their ability to monitor large areas or multiple battery racks simultaneously, providing comprehensive coverage which is often challenging for point-specific flame detectors. Conclusion Incorporating FLIR thermal monitoring into BESS installations not only addresses the critical safety concerns associated with battery fires but also offers a proactive, reliable, and technologically advanced solution. By choosing a FLIR fixed thermal solution, they ensure that the energy storage systems are safeguarded with the industry's pioneering thermal imaging technology, protecting both the investment and the community from the devastating effects of BESS fires.
Comcast Smart Solutions, a division of Comcast Corporation (NASDAQ: CMCSA) that specialises in smart technologies for businesses and communities, announced that it will provide the Youth Crisis Centre (YCC) with smart video camera technology with AI analytics capabilities to help strengthen safety protocols and provide monitoring across its facilities. Founded in 1974, the Youth Crisis Centre is a pioneering facility and nonprofit in Jacksonville, Florida. YCC has remained dedicated to its mission of supporting youth and families impacted by traumatic situations, including divorce, homelessness, relocation, loss of life, bullying, and abuse by providing short-term crisis care, counselling, and residential services. Offering a safe environment to support young people and their families is central to YCC’s mission. Smart camera and analytics solutions Offering a safe environment to support young people and their families is central to YCC’s mission “We are honoured to provide our smart camera and analytics solutions to the Youth Crisis Centre. This organisation has made an incredible impact on the Jacksonville community by supporting its residents when they need it the most,” said Jeff Buzzelli, Regional Senior Vice President of Comcast Florida. “Our team is committed to delivering impeccable service that helps YCC create a stable space for patients to heal and give employees peace of mind.” AI-driven video analytics Eighty-two smart video cameras from Eagle Eye Networks will help to enhance security objectives across YCC’s five-building campus by delivering real-time alerts, AI-driven video analytics, entry and exit monitoring, and intuitive smart search for easier object detection. The system, powered by Comcast connectivity, includes a centralised Video Management System (VMS) with a remote dashboard and Licence Plate Recognition (LPR) technology. Additionally, staff can access up to 30 days of recorded footage for improved monitoring and response times. Video information and real-time insights Video information and real-time insights will help YCC better understand resident and employee Collectively, these tools help offer YCC a comprehensive view of its property through its self-monitoring system. Video information and real-time insights will help YCC better understand resident and employee patterns and strengthen security protocols. With campus-wide self-monitoring and smart technology solutions, YCC is better equipped to support staff and families while delivering high-quality care. Reliable and advanced platform “The safety and well-being of our families are our top priorities, as we are continually working towards providing a secure environment that supports recovery during their time here,” said Peter Hicks, Chief Development Office at the Youth Crisis Centre. “Our facilities previously relied on an analog system, but with Comcast Smart Solutions, we have a reliable and advanced platform that allows us to more effectively monitor our campus and take a more comprehensive approach to enhancing security. This helps our staff focus on providing the best care possible to the youth and families we serve.”


Products


Round table discussion
For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
White papers

Connected video technology for safe cities
Download
Security investments retailers should consider for their 2021 budget
Download
Optimise your business with analytics and AI
Download
How end-to-end video security solutions can help your organisation with social distancing
Download
The healthy market for video surveillance at medical facilities
Download
Understanding all-in-one solutions
Download
2024 trends in video surveillance
Download
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download
Improving city mobility using connected video technology
Download
Connected video technology for safe cities
Download
Security investments retailers should consider for their 2021 budget
Download
Optimise your business with analytics and AI
Download
How end-to-end video security solutions can help your organisation with social distancing
Download
The healthy market for video surveillance at medical facilities
Download
Understanding all-in-one solutions
Download
2024 trends in video surveillance
Download
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download
Improving city mobility using connected video technology
Download
Connected video technology for safe cities
Download

Videos
Remote video monitoring: Manufacturers & Suppliers

The ultimate guide to mastering key control
Download
Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download