Remote video surveillance
Mayflex, the distributor of Converged IP Solutions, together with Ruijie and Reyee in celebration of the UEFA Euro 2024 football tournament will be hosting their interactive football competition. Samsung 55” 4K TV Players will have the chance to win the star prize of a Samsung 55” 4K TV, together with weekly competitions and other prizes worth hundreds of pounds in vouchers. Back in April, Mayflex scored a partnership with Ruijie Networks, a global manufacturer of Wired and Wirele...
RiverSafe, an Application Security, DevOps, and Cyber Security professional services provider, has partnered with Checkmarx, the industry pioneer in cloud-native application security for the enterprise, to help organisations fortify their security landscape amid rising global threats. Open-source vulnerabilities A recent report unveiled concerning statistics. 84 percent of codebases contain open-source vulnerabilities, with 91 percent featuring outdated components, demanding heightened securit...
Elite Interactive Solutions (EIS), a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, has named John Valdez as the company’s new Vice President of Sales. A senior pioneer with 25 years of experience working for Fortune 500 companies and start-up ventures, Valdez’s responsibilities include heading up Elite’s sales department with oversight of business development representatives and a lead generation call centre.&n...
This autofocus camera is tiny, but not to be underestimated: The uEye XS from IDS Imaging Development Systems weighs just 12 grams and fits into almost any application with its size of just 26.4 x 23 x 21.7 mm. Thanks to its autofocus and 5 MP CMOS sensor, it delivers consistently sharp images and videos from a distance of just 10 cm – for example in hand-held scanners, on robotic arms, or in passport photo machines. The uEye XS starter set is ideal for testing the camera. In addition to...
Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, in partnership with Olympic Broadcasting Services (OBS), has tested its latest AI-enhanced multi-camera replay service at the Olympic Qualifier Series in Shanghai, China, occurring between May 16 to 19, 2024. This pivotal event determined the athletes participating in the forthcoming Olympic Games in Paris ("Paris 2024”). AI innovation The AI innovation from Alibaba Cloud is poised for deployment across va...
Interface Systems, a renowned managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has announced the launch of an enhanced intelligent voice-down system. This updated solution now seamlessly integrates with Interface Systems’ Interactive Security Operations Centre (iSOC), allowing for immediate intervention by remote specialists to augment AI-powered automated deterrents. Voice-down system As quick-service restaurants (QSRs...
News
FLIR, part of Teledyne Technologies, and UE Systems, a pioneer in ultrasound inspection tools announced a business and technology partnership to provide industrial customers with a pioneering predictive maintenance solution, beginning with the FLIR Si2-Series of acoustic imaging cameras: Si2-Pro, Si2-LD, and Si2-PD. Si2-series Leveraging each organisation’s deep expertise in supporting manufacturing reliability and energy conservation, UE Systems and FLIR will jointly operate throughout the world providing ultrasonic technology for condition monitoring needs over a wide range of industrial applications. The Si2-series empowers customers to pinpoint issues relating to detecting partial discharge, identifying pressurised leaks, and locating mechanical faults in industrial environments. Acoustic imaging solutions “By partnering together, FLIR and UE Systems can provide manufacturing-focused industrial customers with more effective acoustic imaging solutions and expertise as part of comprehensive condition monitoring, predictive maintenance, and energy conservation programmes,” said Mark Bochella, Vice President of Sales and Marketing, FLIR. Mark Bochella adds, “The mutually beneficial combination of FLIR’s strong brand, built on its thermal imaging expertise, with UE Systems’ extensive understanding of ultrasonic maintenance programmes within manufacturing environments presents an enticing growth opportunity for both organisations.” Comprehensive, multi-sensing solutions “This partnership affords FLIR and UE Systems the ability to combine their respective strengths for the benefit of reliability maintenance programmes and energy conservation across the world, starting with the Si2-Series of acoustic imaging cameras,” said Blair Fraser, Vice President of Global Technology & Business Development, UE Systems. Blair Fraser adds, “In the months and years ahead, we anticipate UE Systems and FLIR will explore additional opportunities for collaboration that provide comprehensive, multi-sensing solutions customers can’t find anywhere else.” Industrial maintenance initiatives The technology and business partnership initially comprises the Si2-Series of acoustic imaging cameras, offering industrial-grade solutions that address the top inspection requirements for manufacturing, electrical, processing, and utility organisations. The partnership also opens additional opportunities for FLIR and UESystems to collaborate on future industrial maintenance initiatives that align with the respective priorities of each organisation.
Sweden's Södra Älvsborgs Rescue Service Association, (SÄRF) has increased its deployment of LiveU's real-time video transmission solutions, adding recording capabilities to create a complete 'live and store' video set-up for situational awareness and use in training scenarios. This significantly strengthens its decision-making, responsiveness and preparedness to deal with fires and accidents. Headquartered in Boras, the regional rescue organisation runs rescue services in six municipalities, including 25 fire and ambulance stations. LiveU's compact LU300S field encoder LiveU apps and field encoders are used for live transmission enabling real-time situational awareness LiveU's resilient IP-video technology is used for real-time situational awareness, with live video transmitted from the field to SÄRF's headquarters for fire and accident prevention as well as training. The equipment, set-up and support are provided by LiveU's longstanding local partner in Sweden, Entercast. SÄRF has supplied over 200 LU-Smart mobile apps to its rescue crews, most importantly for use by the fire truck operators on their personal smartphones. LiveU's compact LU300S field encoder, used with a DJI Mavic Pro drone operator, is deployed to provide a bird's eye view of major incidents. The LiveU apps and field encoder are used for live transmission enabling real-time situational awareness, response management and resource allocation, and storing for debriefing and analysis. Live feeds are transmitted to the LU2000 server in the HQ control room and displayed on a large 70-inch screen. The data from the live server is also transmitted out to the field, as needed, specifically to the team pioneers. Fire truck phones with the app Niklas Ignell, Fire Safety Manager, SÄRF, said, "It’s often said one picture says more than 1,000 words. We've been using LiveU technology for several years and its reliability, encryption and ease of use, in particular, are critical advantages. We're now using a complete solution where everyone on the team has the LU-Smart app; the firefighters can simply click two buttons after unlocking their phones to get the video app working." "The teams find it easy to use whether they're technical or non-technical. Our fire truck phones with the app are the ones used most actively in the field. Combined with the cloud service, the video is automatically recorded, and we can then analyse the critical pictures, deleting them when we close the report. The live streams are transmitted instantly into the main control centre and the operators can decide quickly if more help and resources are needed." Integrated with the LiveU solution The received encrypted feeds are forwarded to the Vindral platform from the LU2000 server Ignell continued, "Five of our guys are also certified drone pilots so they can operate the LU300S with the drone in major incidents, such as industrial fires. For example, we recently had a fire in a pizzeria and the LiveU unit and the drone were used to ensure that nobody was left inside the building. We also use the drone and LiveU for non-emergency situations, for example, checking the safety of the roofs of large factories and facilities in extreme weather conditions. LiveU has become an important element in our team training and education as well, such as handling situations with chemicals." Entercast also provides a real-time content-sharing platform from its sister company Vindral, integrated with the LiveU solution. The received encrypted feeds are forwarded to the Vindral platform from the LU2000 server. This gives a secure, low latency web page player with a pin number where team members can view the live streams in a browser from any device. Resilient video solutions Paul Shepherd, Channel Sales Director, LiveU, said, "We're increasingly seeing our resilient video solutions used for life-saving public safety applications, enabling emergency teams to respond faster and make informed tactical decisions." "SÄRF is a true innovator with the way that it maximises its use of our mobile apps and LU300S with the drone. It's very impressive to see how it has expanded its situational awareness capabilities throughout its region using LiveU."
Sensera Systems, a provider of solutions for real-time jobsite intelligence, announced the launch of its complete site security solution. The full solution includes the compact solar-powered SiteWatch Pro3 camera, the newly released TalkDown deterrence kit, and professional monitoring services all enabled through Sensera’s SiteCloud software. Sensera Systems now offers comprehensive jobsite security coverage and meets risk compliance for projects of any size. Sensera's energy-efficient solution “Construction costs continue to rise across the board — and tools, materials, and equipment must be protected on the jobsite," said Robert Garber, CEO Sensera Systems. He adds, "General contractors and project managers need the power of jobsite intelligence to meet builder's risk insurance requirements and give their customers peace of mind. Sensera Systems’ energy-efficient solution, complemented by our cloud-based technology, provides contractors with the simple-to-deploy monitoring and security they’ve been asking for." Sensera Systems’ complete security solution Sensera Systems’ skilled security monitoring gives structure site experts confidence According to industry estimates, construction theft costs hundreds of millions of dollars a year. Furthermore, fluctuating material costs and evolving project complexity continue to stress builder’s risk insurance policies, pioneering to rising premium costs. As a result, site security, real-time site monitoring, and verified security dispatch have become immediate priorities for construction professionals. Sensera Systems’ complete security solution brings together detection, deterrence, and response in one flexible, reliable, and affordable offering. This means simplified site coverage and a lower cost of implementation for contractors, eliminating complexities that can result from patching disparate security features together. Sensera Systems’ professional security monitoring gives construction site professionals confidence in protecting their assets while meeting builder’s risk insurance requirements. Benefits of Sensera Systems’ complete site security Sensera Systems’ complete site security offering delivers the following benefits to customers: Complete monitoring support through the combination of video, audio, and automation technology alongside human interactivity. Sustainable construction practices through solar power, preventing the need to run costly trenches along a site for power. Flexibility and portability through simplified setup, requiring no professional installation of cameras during construction. Central command and control through integration with SiteCloud. Reduced dispatch costs through thermal sensing, threat verification and TalkDown deterrence.
i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety announced that it has appointed Gerard Figols as the company's Chief Product Officer (CPO). With a career spanning over 17 years in the physical security industry, Figols brings a wealth of global experience and strategic vision to his new role. Experience and responsibilities In his most recent position as President of i-PRO EMEA and i-PRO APAC, Figols demonstrated exceptional leadership in driving the company's growth and success in these markets. Leveraging his extensive experience in engineering, marketing, and sales, Figols has been instrumental in shaping i-PRO's presence in the security industry. As Chief Product Officer, Figols will spearhead i-PRO's global product strategy. Leveraging insights “Gerard’s appointment as CPO underscores our mission to establish i-PRO as a truly global organisation,” said Masato Nakao, CEO at i-PRO, adding "Building on his years of experience working across cultures, Gerard can leverage insights from different business regions to develop best-in-class products suited to the needs of different industries and markets." Innovation and pursuit of excellence Commenting on his appointment, Gerard Figols said, "At i-PRO, we're driven by innovation and the pursuit of excellence, pioneering the global market with our open AI platform and reputation for quality engineering. I am honoured to be Chief Product Officer at i-PRO and excited to lead the company's global product strategy focusing on ethical AI, cybersecurity, and seamless integration with our VMS partners." He adds, "By fostering international collaboration between i-PRO stakeholders and making it easier than ever for our channel partners to work with us, we will continue to drive innovation and deliver exceptional hardware to our customers worldwide." Driving growth and deliver value In a related announcement, i-PRO has appointed Jose Riolobos as Figols’ successor to the role of President of i-PRO EMEA. For several years, Riolobos held senior positions within i-PRO and, previously, Panasonic in Europe and Japan. "I am honoured to lead i-PRO EMEA’s operations and build upon the foundation of success established by Gerard," commented Jose Riolobos, adding "I look forward to continuing to drive growth and delivering value to our partners and customers across the region."
BCD, a major global provider of IP video data infrastructure solutions, is pleased to announce the appointment of Joshua Basgall as its new Vice President of Sales. BCD is thrilled to welcome Joshua aboard to lead their sales team and drive strategic initiatives to accelerate growth and expand BCD’s market reach. Extensive industry experience With nearly 10 years of experience in the security industry, Joshua has a proven track record of success With nearly 10 years of experience in the security industry, Joshua has a proven track record of success in sales leadership. Prior to joining BCD, he held key positions as a sales leader with major industry players, including Milestone Systems, LenelS2, Acre Security, and most recently cloud-based access control provider, Genea. “We’re thrilled to be bringing Josh on board.” says BCD’s Chief Executive Officer (CEO), Jim Gross, adding “He has a wealth of knowledge and industry experience that make him a strong addition to our team. BCD has seen so much growth over the last few years, and we are confident that Josh will inspire and empower our sales team to reach new heights.” BCD appoints Joshua Basgall as new Vice President (VP) of Sales Regarding his new position, Joshua Basgall states, “Throughout my years in this industry, I’ve heard nothing but great things about the quality of BCD’s solutions and the responsiveness and collaboration of their team. I’m excited to join and bring a fresh perspective to this group.” Throughout his career, Joshua has played instrumental roles in driving revenue growth, providing key market insights, and fostering strong client relationships. Outside of his journey through the security industry, Joshua is also an avid fisherman and certified boat captain. Please join BCD in welcoming Joshua Basgall to the team!
Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, announces the upcoming launch of its new NVR 5.0 Series, the next generation in network video recording technology. Building upon the success of Hikvision NVR innovation, the new NVR 5.0 Series revolutionises traditional security systems by seamlessly integrating artificial intelligence (AI) and the Internet of Things (AIoT) capabilities. Next generation NVR 5.0 Series Webinar attendees who play the Kahoot Poll after will win a chance at a FREE iPhone 15 or an M-Series NVR A webinar on Thursday, May 9, will cover all the ground-breaking features of the NVR 5.0 Series with special offers for registered attendees. Webinar attendees who play the Kahoot Poll after will win a chance at a FREE iPhone 15 or an M-Series NVR. Dealer webinar attendees will get 50% off select M-Series NVRs through May 31 (limit 10 units/per dealer). "Our new next generation NVR 5.0 Series sets new benchmarks in network video recording technology," said John Xiao, Vice President of Marketing, Hikvision USA, adding "With its intuitive operations, smart search capabilities, and centralised alarm management, the new Hikvision NVR 5.0 Series empowers users with unprecedented intelligence, efficiency and control over their video systems." Benefits of the new NVR 5.0 Series The NVR 5.0 Series NVRs serve as a pivotal central hub, offering an intelligent platform and scenario-based applications, ushering in the AIoT era. These next-generation NVRs are designed to provide users with unparalleled efficiency, innovation, and ease of use. The five pivotal benefits of the new NVR 5.0 Series include: Intuitive Operations for Real-Time Insights: Gone are the days of complex management interfaces. The NVR 5.0 Series includes a user-friendly interface with tailored views and automated switching, providing real-time clarity and ease of understanding. Revolutionising Video Searching with Smart Technologies: The NVR 5.0 Series introduces Smart Search and AcuSearch functions, significantly reducing search times to mere seconds. Features include frame-by-frame searches, event-based navigation, and target-specific filtering, enhancing operational efficiency. Centralised Alarm Management for Immediate Response: The integrated event centre of the NVR 5.0 Series NVRs streamlines alarm management, search, and configuration, enabling rapid and effective responses to security incidents. Innovating with Intelligent Protection: The NVR 5.0 Series self-learning perimeter protection minimises false alarms and manual input, ensuring smarter and more accurate surveillance with its embedded inference engine. Converged Functions for Comprehensive Control: Enjoy a unified solution for video, audio, alarm, and access control with the NVR 5.0 Series NVRs.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern programme Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern programme, welcoming 120 interns into various departments for a full semester. The programme helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organisations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centres as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centres as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realise the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasise data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organisation. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
Case studies
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep track of who had the keys. The choice It’s very easy to manage and we can focus our time on providing quality care to our patients" “The Brivo system makes my job easier and frees me up for other things. With Brivo, it’s easy to find out what we need; the system doesn’t lie," Larry Kadin, Facilities and Purchasing Manager, Adelante Healthcare. "It’s very easy to manage and we can focus our time on providing quality care to our patients.” The change Adelante has issued access cards to over 200 staff and the cleaning crews at their seven facilities. Without lots of keys floating around, the healthcare provider no longer has security breaches. One person is administering multiple sites from a single web interface. Access can be programmed easily and quickly, it’s done remotely and in a manner of just minutes. The team has better records and easy access to data that can be provided to other departments. The new system has had significant positive effects on staff productivity and effectiveness. “I’ve not seen anything that comes close to what Brivo provides. The Brivo system is a joy to work with. It saves us so much time compared to other systems we were looking at, ” Larry Kadin.
The proven “CAT” gaming analysis solution from German casino expert Dallmeier is also available for Sic Bo, in addition to Baccarat and Black Jack. The video-based solution offers a whole range of analysis options with which casino operators can increase the “game pace”, combat fraud, and gain valuable insights into the gaming action through real-time data collection. Optimisation challenges Optimising the gameplay at Sic Bo tables poses no small challenge to casino operators. These include potential cheating attempts, difficulties in tracking results, and operations such as late bets. Above all, however, gaming managers benefit from collecting and analysing data that can be used to increase the game pace and optimise the efficiency of tables and dealers. “It's all about the data” Real-time tracking of important data and processes The information that can be used to optimise the gameplay at the Sic Bo table is manifold The information that can be used to optimise the gameplay at the Sic Bo table is manifold. For example, “CAT for Sic Bo” precisely records the game pace of each table based on the times for placing the bets, game phase, and payout and thus makes the performances of tables and dealers comparable. Additional information such as which fields are the most popular, information about the value of the top chip for quick identification of “high-value” bets, objective tracking of “late bets” and other events that regularly lead to discussions between players and casinos complete the portfolio. Data points from existing sources CAT for Sic Bo combines data points from existing Sic Bo consoles with CAT data captured by AI cameras above the table. In this way, data from all participating tables can be collected together and evaluated centrally. This can either be done via the Dallmeier SeMSy® casino software or the data is exported as a CSV file and can then also be evaluated by any other system. Automated Business Intelligence for the Gaming Manager This centralised capture and analysis of data provide gaming managers with insights that previously had to be laboriously collected manually by the PIT manager or were not accessible at all in a highly efficient and automated manner. This opens up a completely new field for gaming managers to optimise the profits of their Sic Bo tables: From a higher game pace to the objective evaluation of dealer performance, support in the fight against fraud to the data-driven optimisation of table layout, placement, minimum bet levels, monitoring of compliance rules or promos.
Ipsotek, an Eviden Business at Atos Group, has announced that it was appointed to provide its AI video analytics technology at the soon-to-be-opened new Midfield Terminal Building at Abu Dhabi International Airport, in Abu Dhabi, UAE. Delivered in partnership with Atlas Security, deployment of Ipsotek’s AI video analytics solutions is anticipated to improve operations, security, and safety across various areas of the Midfield Terminal Building, which is renowned for its iconic architecture and recently gained international attention as a filming location for Mission: Impossible - Dead Reckoning Part One. Advanced surveillance capabilities Ipsotek's AI video analytics technology is well-equipped to address these circumstances Safety and security are clearly paramount in any airport environment, and Ipsotek's AI video analytics technology is well-equipped to address these concerns. The advanced surveillance capabilities of the solution enable operators to detect and identify potential threats across various zones of the airport. By leveraging intelligent algorithms and machine learning, the system can recognise suspicious behaviours, unauthorised access attempts, or other pre-defined security risks in real time, allowing for swift response and mitigation. Ipsotek's AI video analytics By leveraging Ipsotek's cutting-edge video analytics solutions, the airport aims to enhance its security measures by effectively detecting abandoned baggage scenarios. Security teams at the airport will be able to quickly identify and respond to any unattended baggage, reducing potential security risks and ensuring a safe environment for passengers and staff. "The deployment of Ipsotek's AI video analytics solutions at the Midfield Terminal Building signifies a significant leap forward for the aviation industry," said Sophiene Marzouk, Ipsotek’s UAE Country Manager. Sophiene Marzouk adds, "We are proud to collaborate with Atlas Security to deliver state-of-the-art technology that enhances operations, security, and safety in one of the world's most iconic airport buildings." Ipsotek's solutions Ipsotek's solutions also play a crucial role in optimising queue management and crowd control “Atlas Security aspires to implement the best technology for security systems in airports and we therefore look to partner with companies bringing innovation in security applications with Artificial Analytics. One company that brings this cutting-edge technology is Ipsotek and Atlas Security is proud to work in the Midfield Terminal Building with Ipsotek,” said Khizer Rehman, Project and Technical Manager at Atlas Security. Ipsotek's solutions will also play a crucial role in optimising queue management and crowd control throughout the airport. By analysing video feeds, the software can determine queue lengths and alert airport staff to potential bottlenecks. New standards for excellence The intelligent system will empower operators to proactively manage queues, allocate resources effectively, and ensure a smooth flow of passengers. As travellers eagerly anticipate the unveiling of the Midfield Terminal Building, the deployment of Ipsotek's AI video analytics solutions is set to improve the airport experience, from safety to security and operations setting new standards for excellence in the aviation industry and turning an impossible mission into a successful deployment.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that Eastern Michigan University (EMU) in Washtenaw County, Michigan, will deploy ZeroEyes’ solution across its campus to protect students, staff, and visitors from gun-related violence. EMU selected ZeroEyes following an extensive selection process and is the first higher education institution in Michigan to adopt an AI gun detection solution. Alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational awareness software will be layered on EMU’s existing digital security cameras. If a gun is identified, images will instantly be shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local staff and the campus police force in as fast as 3 to 5 seconds from detection. Safe campus experience ZeroEyes does not conduct any kind of facial recognition, eliminating the risk of bias based on skin colour Throughout this process, ZeroEyes does not conduct any kind of facial recognition, eliminating the risk of bias based on skin colour or other personal characteristics. "The integration of ZeroEyes will continue Eastern’s commitment to providing a safe campus experience for all who study and work here," said James Smith, President of Eastern Michigan University. James Smith adds, "Ensuring a secure, inclusive, and open campus environment is an ongoing commitment by our Department of Public Safety (DPS) leadership and campus staff.” Multilayered security Located in Ypsilanti, Mich., EMU has an 800-acre campus, with 14,000 students and nearly 2,000 employees. ZeroEyes is the latest addition to an expanded, comprehensive, and multilayered range of security measures the university has implemented to help ensure a safe community. Other solutions include a hi-tech police dispatch centre that monitors over 1,000 security cameras 24/7, key locks on classroom doors, newly installed over the summer with additional locks being added throughout the year, an emergency text alert system, and residence hall key card entry for students. Intelligent situational awareness The advance notice offered by ZeroEyes will provide our first responders with the opportunity to intervene proactively" "In the event of gun-related violence, the advance notice offered by ZeroEyes will provide our first responders with the opportunity to intervene proactively and potentially de-escalate the situation,” said Matthew Lige, Executive Director of Public Safety and Chief of Police at Eastern Michigan University. He adds, “It will also provide Department of Public Safety staff the ability to notify the campus community with timely and accurate information to make informed safety decisions.” AI gun detection “Eastern Michigan University’s dedication to the safety and welfare of its community is truly admirable,” said Mike Lahiff, CEO, and Co-Founder of ZeroEyes. He adds, “By choosing to implement ZeroEyes technology, the campus is showcasing its unwavering commitment to establish a safe and trusted learning environment. We are proud to provide the first AI gun detection solution adopted by a higher education institution in Michigan.”
Robots do monotonous workflows and less pleasant, repetitive tasks with brilliance. Combined with image processing, they become “seeing” and reliable supporters of humans. They are used in quality assurance to check components, help with the assembly and positioning of components, detect errors and deviations in production processes and thus increase the efficiency of entire production lines. An automobile manufacturer is taking advantage of this to improve the cycle time of its press lines. Together with the latter, VMT Vision Machine Technic Bildverarbeitungssysteme GmbH from Mannheim developed the robot-based 3D measuring system FrameSense for the fully automatic loading and unloading of containers. Pressed parts are thus safely and precisely inserted into or removed from containers. Four Ensenso 3D cameras from IDS Imaging Development Systems GmbH provide the basic data and thus the platform for process automation. Application The actual workflow that FrameSense is designed to automate is part of many manufacturing operations. A component comes out of a machine-here a press- and runs on a conveyor belt to a container. There it is stacked. As soon as the container is full, it is transported to the next production step, e.g., assembly into a vehicle. All these tasks are now to be taken over by a robot with a vision system-a technological challenge Up to now, employees have been responsible for loading the containers. This actually simple subtask is more complex than one might think at first glance. In addition to the actual insertion process, the first step is to determine the appropriate free space for the part. At the same time, any interfering factors, such as interlocks, must be removed and a general check of the “load box” for any defects must be carried out. All these tasks are now to be taken over by a robot with a vision system-a technological challenge. This is because the containers also come from different manufacturers, are of different types, and thus vary in some cases in their dimensions. Positioning of the components For their fully automatic loading and unloading, the position of several relevant features of the containers must be determined for a so-called multi-vector correction of the robot. The basis is a type, shape and position check of the respective container. This is the only way to ensure process-reliable and collision-free path guidance of the loading robot. All this has to be integrated into the existing production process. Time delays must be eliminated and the positioning of the components must be accurate to the millimetre. 3D point cloud These point clouds of all four sensors are combined for the subsequent evaluation To counter this, VMT uses four 3D cameras per system. The four sensors each record a part of the entire image field. This can consist of two containers, each measuring approximately 1.5 × 2 × 1.5 metres (D × W × H). Two of the cameras focus on one container. This results in data from two perspectives each for a higher information quality of the 3D point cloud. These point clouds of all four sensors are combined for the subsequent evaluation. In the process, registrations of relevant features of the container take place in Regions of Interest (ROIs) of the total point cloud. Interference contours Registration is the exact positioning of a feature using a model in all six degrees of freedom. In other ROIs, interference contours are searched for which could lead to collisions during loading. Finally, the overall picture is compared with a stored reference model. In this way, the containers can be simultaneously checked for their condition and position in a fully automated manner. Even deformed or slanted containers can be processed. All this information is also recorded for use in a quality management system where the condition of all containers can be traced. The calibration as well as the consolidation of the measurement data and their subsequent evaluation are carried out in a separate IPC (industrial computer) with screen visualisation, operating elements and connection to the respective robot control. Image processing solution The entire image processing takes place in the image processing software MSS developed by VMT The main result of the image processing solution is the multi-vector correction. In this way, the robot is adjusted to be able to insert the component at the next possible, suitable deposit position. Secondary results are error messages due to interfering edges or objects in the container that would prevent filling. Damaged containers that are in a generally poor condition can be detected and sorted out with the help of the data. The entire image processing takes place in the image processing software Multi-Sensor Systems (MSS) developed by VMT. FrameSense is designed to be easy to use and can also be converted to other components directly on site. Robust 3D camera system On the camera side, VMT relies on Ensenso 3D cameras-initially on the X36 model. The current expansion stage of FrameSense is equipped with the Ensenso C variant. The reasons for the change are mainly the better projector performance-thanks to a new projection process-as well as a higher recording speed. In addition, the Ensenso C enables a larger measuring volume. This is an important criterion for FrameSense, because the robot can only reach the containers to be filled up to a certain distance. The specifications of the Ensenso C thus correspond exactly to VMT's requirements, as project manager and technology manager Andreas Redekop explains: "High projector performance and resolution together with fast data processing were our main technical criteria when selecting the camera. The installation in a fixed housing was also an advantage.” Ensenso models Housing of a robust 3D camera system meets the requirements of protection class IP65/67 The Ensenso C addresses current challenges in the automation and robotics industry. Compared to other Ensenso models, it provides both 3D and RGB colour information. Customers thus benefit from even more meaningful image data. The housing of the robust 3D camera system meets the requirements of protection class IP65/67. It offers a resolution of 5 MP and is available with baselines from current to approx. 455 mm. This means that even large objects can be reliably detected. The camera is quick and easy to use and addresses primarily large-volume applications, e.g., in medical technology, logistics or factory automation. Outlook By automatically loading and unloading containers and the integrated 3D container inspection, manual workstations can be automated with the help of FrameSense. Against the background of the shortage of skilled workers, the system can thus make an important contribution to process automation in the automotive industry, among others. It meets the prevailing challenges of the industry. Ensenso C provides the crucial basis for data generation and exceeds the requirements of many applications. Lukas Neumann from Product Management sees their added value especially here: “The high projector power and large sensor resolutions are particularly advantageous in the field of intralogistics. Here, high-precision components have to be gripped from a great distance with a large measuring volume.” For other stacking or bin-picking applications in classic logistics, he could imagine a similar camera with high projector power but lower resolution and fast recording. So nothing stands in the way of further developments and automation solutions in conjunction with "seeing" robots.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![Are you ready for an on-site emergency?](https://www.sourcesecurity.com/img/white-papers/612/920x533_1712671512.jpg)
Are you ready for an on-site emergency?
Download![Understanding all-in-one solutions](https://www.sourcesecurity.com/img/white-papers/612/920x533_1709648610.png)
Understanding all-in-one solutions
Download![Automatic vehicle identification](https://www.sourcesecurity.com/img/white-papers/612/vehicle-identification-nortech.jpg)
Automatic vehicle identification
Download![Cloud video and smart cities](https://www.sourcesecurity.com/img/white-papers/612/smart-cities-whitepaper-eagle-eye-networks-920.jpg)
Cloud video and smart cities
Download![Security investments retailers should consider for their 2021 budget](https://www.sourcesecurity.com/img/white-papers/612/retail-security-investments-for-2021-budget-920_1603476210.jpg)
Security investments retailers should consider for their 2021 budget
Download![Optimise your business with analytics and AI](https://www.sourcesecurity.com/img/white-papers/612/security-video-analytics-with-artificial-intelligence-eagle-eye-networks-920_1599560771.jpg)
Optimise your business with analytics and AI
Download![Sinaloa, Mexico: Connected cities are safer cities](https://www.sourcesecurity.com/img/white-papers/612/sinaloa-mexico-safe-connected-city-security-vicon-whitepaper-920_1601030674.jpg)
Sinaloa, Mexico: Connected cities are safer cities
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Remote video surveillance: Manufacturers & Suppliers
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download