Residential security systems
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., is proud to announce the launch of AVA™ (Autonomous Verified Access) Gen 4, an advanced AI-powered access control solution for both residential and commercial applications. Completely redesigned inside and out, AVA Gen 4 integrates new hardware, an entirely rewritten software platform, and groundbreaking security enhancements to serve a broader range of clients, from homeowner assoc...
Nice, a global pioneer in Home and Business Management solutions, proudly announces the launch of the Linear 621 garage door opener (GDO), setting a new standard for reliable, value-driven performance in the residential market. As homeowners increasingly seek dependable and feature-rich solutions without premium price tags, the Linear 621 delivers a robust and refined design that prioritises essential functionality, ease of installation, and long-term value. Modern function and affordability&n...
Comelit-PAC has launched 7TOP, its most advanced IP door entry Monitor to date, designed to seamlessly blend smart technology, sleek aesthetics, and energy efficiency into the latest living and working environments. Compact and elegantly designed, 7TOP from the global security specialist is built to suit a wide range of installations while supporting effortless surface mounting with a secure metal bracket. 7TOP features 7TOP’s integrated Wi-Fi and Ethernet connectivity allow users to st...
The City of New Orleans Office of Homeland Security and Emergency Preparedness (NOHSEP) is pleased to announce the official launch of the NOLA Ready Public Safety App, powered by Motorola Solutions. This new mobile application is designed to enhance public safety and emergency preparedness for both residents and visitors. All individuals planning to attend major events in New Orleans, including the Super Bowl, Mardi Gras, and other large gatherings, are encouraged to download the app....
Artificial Intelligence Technology Solutions, Inc., along with its subsidiary Robotic Assistance Devices Residential, Inc. (RAD-R), is preparing to introduce the next wave of advancements for RADCam™, the world’s first talking security camera, and a revolutionary AI-driven home security solution. Customise security preferences These new features are designed to enhance functionality, improve user interaction, and solidify RADCam as the premier choice for intelli...
Nice, a global pioneer in home and building management solutions, proudly announces the launch of Juno, a sleek and powerful gate operator designed to redefine residential gate automation. As the market increasingly demands compact yet feature-rich solutions, Juno offers a breakthrough design that blends style, performance, and ease of use, delivering unparalleled value for both installers and end users. Aesthetic and functional demands “Our partners need reliable, easy-to-install solut...
News
Artificial Intelligence Technology Solutions, Inc. (the “Company”), a global pioneer in AI-driven security and productivity solutions, is pleased to announce that its subsidiary, Robotic Assistance Devices Residential, Inc. (RAD-R), has appointed Steve Danelon as President of RAD-R. This key appointment underscores RAD-R’s commitment to redefining residential security with innovative, AI-driven solutions like the recently launched RADCam™. Prior roles of Danelon Danelon has been an avid supporter of AITX’s journey and has eagerly followed its evolution Steve Danelon brings with him an illustrious 30-year career in the security industry, including 22 years of leadership with Allied Universal, where he oversaw Canadian sales and operations. Following his tenure at Allied Universal, Steve founded Fortress Solutions, a boutique residential security company that further honed his expertise in protecting homes and families. Danelon has been an avid supporter of AITX’s transformative journey and has eagerly followed its evolution in the security technology sector. RAD-R to new heights “Steve’s extensive industry experience, proven leadership, and entrepreneurial mindset make him the perfect pioneer to take RAD-R to new heights,” said Steve Reinharz, CEO and CTO of AITX and RAD-R. “Having a pioneer of Steve’s calibre strengthens our ability to deliver groundbreaking residential security solutions, and I’m thrilled to welcome him to the AITX and RAD family.” Innovative and accessible AI-security solutions Danelon’s decision to join RAD-R was influenced by his firsthand experience with RAD’s technology Danelon’s decision to join RAD-R was influenced by his firsthand experience with RAD’s technology, particularly the RADCam, which he sees as a game-changer for the residential security market. His compensation package reflects RAD-R’s focus on performance and results, aligning his success with the Company’s goals. This strategic alignment ensures RAD-R is positioned to lead the industry in innovative and accessible AI-powered residential security solutions. “I’m honoured to join RAD-R and excited to contribute to its mission of transforming residential security,” said Steve Danelon. “The technology that RAD has developed, particularly within RADCam, is unlike anything I’ve seen in my career. I’m confident we’ll deliver unparalleled solutions to homeowners and redefine the standard for residential security.” Advanced AI-based solutions RAD-R, a wholly owned subsidiary of AITX, focuses on delivering advanced AI-based solutions to the residential market, including the revolutionary RADCam. Unlike traditional residential security products, RAD-R’s solutions emphasise meaningful interactions, proactive response, and a reimagined approach to home safety. RADCam is now available for purchase on Amazon, Walmart.com, as well as directly through the website. Discover how this groundbreaking technology can redefine security and convenience for the home or property.
DNAKE, a global pioneer in IP video intercom and smart home solutions, is proud to announce the launch of its latest innovation: H616 8” Indoor Monitor. This cutting-edge smart intercom is designed to enhance communication and home security while offering a premium user experience. H616 combines a sleek design with advanced technology, making it ideal for both residential and commercial applications. Key features of the H616 Vertical Installation: The H616 can be easily rotated 90° to suit the installation environment, with an option to select a portrait UI mode. This flexibility is perfect for areas with limited space, such as narrow hallways or near entrance doors, without compromising on functionality. The vertical orientation maximises the device’s efficiency and ease of use in tight spaces. Wall-Cling Design: The embedded bracket in the back cover allows the H616 to cling to the wall, creating a streamlined, elegant, and clean appearance that adds a touch of sophistication to any room. Its slim profile ensures a modern, minimalistic aesthetic that complements contemporary interiors. Choice of Colour Variants: To suit different interior styles, the H616 is available in two timeless colour options, classic black and elegant silver. This variety ensures the device can seamlessly blend into any environment, whether it's a residential living room, office space, or commercial establishment. Android 10 Operating System: The H616 operates on the reliable and robust Android 10, offering fast performance, smooth navigation, and compatibility with a broad range of applications. Whether for home automation, security control, or other smart device management, Android 10 ensures the H616 is highly functional and adaptable to users' needs. User-friendly intercom and smart home solutions “We are thrilled to introduce the H616 as part of our ongoing efforts to bring innovative, user-friendly intercom and smart home solutions to our customers,” said Alex, Vice President at DNAKE. “Driven by customer demand, H616 marks the first 8” indoor monitor in our product lineup. With its powerful operating system, vertical design, and premium features, we believe the H616 will provide users with an enhanced, secure communication experience that fits seamlessly into modern living and working spaces.”
Resideo Technologies, a provider of solutions for home comfort, energy management, safety, and security, announced the First Alert® VISTA® H Series, a full-service, scalable security system designed for residential and light-commercial security installations. Unveiled at its CONNECT 2024 Customer Event, the new VISTA H Series builds on the dependability of customers' trust from Resideo's existing VISTA Platform and delivers a flexible solution that can easily integrate with the latest technology, which can reduce installation time and labour costs. Modern hybrid solution "For more than twenty years, our trusted VISTA portfolio experienced tremendous popularity, and our new VISTA H series offers our professional security dealers a modern hybrid solution for seamless wired and wireless upgrades," said Ryan Park, Senior Product Director of Safety and Security at Resideo. “Resideo is building on our legacy by bridging our past and our future with a security solution that offers cutting-edge technology and can grow with the needs of today’s customers." VISTA H Series The new VISTA H Series is compatible with existing sensors and peripherals, making installations easier for professionals. Its key features are: Versatility: It is a scalable hybrid platform supporting a wide range of applications. The new VISTA H Series supports new and cost-effective upgrades minimising customer investment through compatibility and reuse of pre-existing peripherals and sensors. Simplicity: It is designed for improved operational efficiencies and return on investment. The shared ProSeries peripherals and sensors, including the award-winning First Alert indoor and outdoor cameras, simplify truck inventory. A common installation and back-office process with ProSeries enables streamlined installation and customer support. Low-maintenance and high-performance "We have used Resideo’s VISTA security solutions for many years and trusted its low-maintenance and high-performance capabilities," said Chris Sizemore, co-owner of A-Bell Alarms Company and First Alert Premier Pro Partner. "The new VISTA H Series is a modern upgrade for our retrofit customers, and we're thrilled it offers a large degree of modularity, a versatile panel, enables easy sensor upgrades, and can integrate with the First Alert VX Video Series." First Alert VISTA H Series introduction It is also compatible with components of Resideo's ProSeries Platform, including PRO6 Sensors The first VISTA H Series product to be released will be the First Alert® H3 Security Panel, which will be available later this month. Resideo will add additional options and features in the coming months. The VISTA H Series offers additional security modules including a hardwire zone expander, a relay module, a V-Plex module, an ECP to IB2 module, and two hardwired keypads (one portrait, one landscape). It is also compatible with components of Resideo's ProSeries Platform, including PRO6 Sensors. Expansion modules The First Alert H3 Panel offers several expansion modules, a Wi-Fi or Wi-Fi / Z-wave combo module, an LTE radio module, a legacy takeover module for 5800 sensors, and a bus isolator module. The new VISTA H Series will be available in the U.S. and Canada through ADI Distribution, a Resideo company.
Dahua Technology, a world-pioneering video-centric AIoT solution and service provider, has announced the launch of a 2-Wire Hybrid Video Intercom System (Dahua EACH Series) tailored for apartments and villas. This innovative system promises to redefine residential security and communication with its high image quality and easy deployment features. Demand for high-quality intercoms “In apartment and villa scenarios, the IP systems used in newly built buildings have significantly enhanced the intercom experience. The demand for high-quality intercoms in old residential buildings is also increasing,” said Jack Lyu, Video Intercom Product Manager at Dahua Technology. “Our new EACH series meets market demands, addressing pain points such as poor analogue intercom system image quality and difficulties in upgrading installations.” Enhanced installation efficiency The plug-and-play feature is a crucial benefit of the Dahua 2-Wire Hybrid Video Intercom System The plug-and-play feature is a crucial benefit of the Dahua 2-Wire Hybrid Video Intercom System. In the case of upgrading or installing the intercom system in old residences, installers do not need to rewire. Easy configuration can be achieved through DIP switches, which not only improves the deployment efficiency, but also greatly reduces the cost of installation. It is also worth mentioning that in the apartment system, users can realise batch configuration and batch issuance through the web page of the controller, making apartment management easier. Delivering high-quality intercom experiences for residents Compared to traditional analogue intercom systems, the Dahua 2-Wire Hybrid Video Intercom System is equipped with a 2 MP CMOS wide dynamic range camera that provides users with improved communication quality and video intercom experience. Moreover, the system also supports group calling; when a visitor makes a call, all the indoor monitors inside the home will light up simultaneously, allowing users to quickly respond from any corner of the house. Supporting cameras & alarm integration Wi-Fi-enabled indoor monitors also support HDCVI cameras and IPC integration With the alarm integration features, the system can send alerts to residents in time on order to ensure the security within the property. Meanwhile, the Wi-Fi-enabled indoor monitors also support HDCVI cameras and IPC integration, enabling multi-system integration management through a single VTH. This helps users save on the cost of purchasing additional systems. Remote operation via DMSS App The indoor monitor supports DMSS App via Wi-Fi, through which residents can remotely control the system to realise remote answering, unlocking and arming/disarming functions anytime, anywhere, providing 24/7 protection for the residence. Diverse product design What’s more, the diversified product design of the Dahua EACH Series offers more choices for users What’s more, the diversified product design of the Dahua EACH Series offers more choices for users. In the apartment system, the door station with modular design further enhances the residents’ living experience. The indoor monitors are available in two models, one with Wi-Fi capability and one without, both suitable for apartments and villas. This flexibility allows customers to choose based on their specific needs. Dahua's commitment This latest offering underscores Dahua's commitment to delivering cutting-edge technology that enhances residential security, convenience, and communication efficiency. Moving forward, the Dahua EACH Series will continue to enhance product designs and functions to accommodate a wider range of installation and usage scenarios, providing property residents with a better living experience.
Hikvision, a major manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value is excited to announce the release of the DS-KIS600 Intercom Kit, designed to deliver advanced home security in a compact package. Two-way communication Featuring the DS-KV6113-WPE1 door station, this kit offers crystal-clear two-way communication with a noise-reducing microphone, perfect for narrow door frames. With the Hik-Connect App, homeowners and tenants can easily control their intercom system from anywhere, ensuring greater convenience and peace of mind. Home security solution “The DS-KIS600 is more than just an intercom. It's a comprehensive home security solution in a compact form," said John Xiao, Vice President of Marketing, at Hikvision USA. "With its crystal-clear audio, mobile app integration, and advanced features, we're confident it will set a new standard for convenience and peace of mind." DS-KIS600 Intercom Kit The system allows access control through an integrated RFID card reader, providing an extra layer of security The DS-KIS600 Intercom Kit goes beyond basic communication, offering a layer of security for modern homes and condos. The included DS-KV6113-WPE1 door station features Power over Ethernet (PoE) and a built-in 2 MP high-definition camera with night vision for capturing clear video footage, day or night. Additionally, the system allows access control through an integrated RFID card reader, providing an extra layer of security for authorised personnel. Enhanced security Built-in 2 MP high-definition camera with night vision for clear video footage. Integrated RFID card reader for access control. Compact design Suitable for narrow door frames. Versatile for various residential applications.
RISCO, a globally recognised pioneer in cloud-based security solutions, announces the launch of its latest innovation, the LightSYS Air wireless solution. This state-of-the-art system represents a significant leap forward in wireless security technology for professionals within the industry. LightSYS Air Building upon the success of the widely-praised LightSYS+ hybrid solution, LightSYS Air heeds the call for an enhanced security installer experience akin to its predecessor. By addressing industry feedback, RISCO has engineered a solution that not only simplifies installation procedures but also enhances the operational effectiveness of wireless security systems. Innovative features and advanced technology App-based Configuration Tool: The LightSYS Air wireless system is designed to reduce installation time, utilising the ‘HandyApp Configurator’ smartphone app tool. This has been developed to significantly reduce many of the complexities of setup, providing a simpler, faster, and installer-friendly experience. Enhanced RF: The RF has seen substantial enhancement, ensuring optimal performance of the wireless technology in the system, even in the most challenging environments. It has been engineered for robustness and high reliability. New Colour Options: With an eye for modern aesthetics, LightSYS Air is available in stylish white and black colour selections across its panel and accessory suite. Onboard IP and Wi-Fi It introduces an impressive array of features and pricing set to disrupt the current market standard LightSYS Air is a Grade 2 solution, catering to the security demands of residential and small business sectors and is available in a range of kits and bundles. The innovative offering also boasts onboard IP and Wi-Fi, along with options for GSM connectivity and support for up to 128 zones. It introduces an impressive array of features and pricing set to disrupt the current market standard, ensuring that RISCO remains at the forefront of security technology developments. Insights Dave Strawson, Head of Sales at RISCO UK, highlights the significance of LightSYS Air's introduction, stating, "With the launch of LightSYS Air, RISCO has set a new standard in professional wireless security. Our dedication to innovation is evident in every feature of this system." "We offer an unparalleled blend of convenience, performance, aesthetics, and technological advancements."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
Clean, safe mass transit systems benefit everyone. Today’s transit operators face tremendous challenges, including declining revenue due to work-from-home policies, concerns about disease prevention, and high crime environments. Among these concerns, difficulty recruiting and retaining police resources has been exacerbated by the ongoing mental health crisis that disproportionately impacts public transportation networks. Mass transit systems Safe cities require an operational environment where people feel comfortable on mass transit. Sustainable cities are built upon the growth of mass transit systems. Safe cities and mass transit go hand-in-hand. The safety of an urban city is intrinsically linked to the safety of its mass transit systems. Safe cities require an operational environment where people feel comfortable on mass transit For additional insights into the security of transit systems, we spoke with Angela Osborne, Associate Vice President of Risk and Emergency Management Solutions at Guidepost Solutions, who specialises in emergency management planning, security risk assessments, and physical security assessments. Q: How did the COVID pandemic impact the security of transit systems? Angela Osborne: The pandemic had a profound impact on transit system security. Transit systems are already highly susceptible to crime prevention through environmental design (CTPED) issues. Facilities with poor maintenance, lack of active monitoring or incidence response, and low foot traffic all contribute to CTPED issues, and the pandemic only aggravated this. Many regular commuters began remote work, thus leading to less use of transit facilities. Transit centres experienced an uptick in individuals engaging in drug activity, encampments, encounters with mentally disturbed persons, and opportunistic crime. As a result, individuals who maintained their commute became fearful due to safety and public health concerns. Q: How do millions of employees returning to work (after working at home, for example) change the transit security challenges? This has become a reason why individuals are resistant to returning to working onsite Osborne: While employees returning to work has increased foot traffic and the use of transit has provided positive CPTED elements in terms of having additional eyes and ears around, many individuals are stepping back into a risk environment that has significantly changed since these systems were last widely used. Due to the increase of illegal behaviour in transit facilities, criminality has surged across numerous urban areas. Many returning transit users were not prepared to face these changes. This has become a reason why individuals are resistant to returning to working onsite. Q: What role can employers play in keeping commuters safe as they return to the office? Osborne: Organisations need to provide security awareness training focused on transit. At a minimum, they should share safety resources provided by transit authorities. In addition, harassment on transit systems is a persistent issue that should not be overlooked. Organisations need to provide security awareness training focused on transit Organisations cannot assume that everyone is familiar with these elements, taking into consideration that some individuals began employment at the organisation during the pandemic or are recent graduates. Others may not have had to navigate transportation to the office in years. If an organisation is requiring staff to come to an office, the organisation should fulfil its duty by providing training and resources. Q: What other current trends are impacting transit security -- for better or for worse? Osborne: Transit systems are impacted by many serious trends. Transit is a target for terrorists and saboteurs due to the trends of cybersecurity attacks and active assailant targeting. We recently saw how a cyber sabotage event crippled train operations in Germany. Whether the threat actor is a nation-state or non-state actor, many systems have significant cybersecurity vulnerabilities. As more individuals return to the office, more opportunities for targeting arise. In terms of physical threats, most transit systems are simply not equipped to conduct weapons screenings and have difficulty deterring weapons due to legal regulations. Q: What is the biggest missed opportunity when it comes to transit security? By incorporating AI features, systems can leverage an exceptions-based alerting system Osborne: The biggest missed opportunity is leveraging artificial intelligence (AI) advancements for video surveillance. We tend to find that transit systems have a lot of cameras, but systems are rarely monitoring all cameras in real-time due to the high number of cameras present. By incorporating AI features, systems can leverage an exceptions-based alerting system. Many existing cameras have some form of analytics present that can be leveraged to indicate a line cross and alert on motion; however, AI allows for a greater range of options to alert operators to issues. Q: What is the role of technology to ensure a secure transit system? How well does technology, in general, address the need? Osborne: Technology is an important element in securing a transit system. The current challenge is that the use of technology systems is used reactively rather than proactively. For instance, a video surveillance system is usually leveraged after an incident has taken place. Integrating access control systems, intrusion detection and alarms, and video surveillance can provide a much more proactive approach leading to faster detection or system alerts, enabling a safer and more accessible response. Technology can only accomplish this when paired with a response mechanism. Q: How will the practice and impact of transit security change in the next 10 years? One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement Osborne: Most transit systems will need to adapt to a hybrid work approach to right-size their operations and consider greater consolidation to make security resources more sustainable. One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement. This is a challenge for many urban departments and could continue to have ripple effects for mass transit. As more individuals use mass transit and return to some level of pre-pandemic life, people are likely to feel more comfortable on mass transit (pending no follow-on pandemics) with these safeguards in place. Q: What else do transit security professionals need to know? Osborne: I encourage all transit security systems to conduct a threat, risk, and vulnerability assessment to better understand the risk environment. Data is generated across these systems; however, it is often not being collected and leveraged to its fullest capacity to enable informed security and safety decisions. I would also recommend that new transit systems consider full barriers to prevent individuals from deliberately jumping or accidentally falling onto tracks. Although retrofitting stations to include this is difficult, new build stations offer a good opportunity to incorporate safe and secure design from the start.
Case studies
Comelit-PAC has partnered with Harrold Jones Services Limited to deliver a stylish and secure access control solution at Warmstry Court, resolving security concerns and ensuring residents' safety and independence. Situated near Worcester’s city centre and next to the River Severn, Warmstry Court is an esteemed housing development, offering high-quality living for older residents while providing peace of mind through secure and comfortable surroundings. Unique security challenges The complex includes several general needs properties rented by Sanctuary Housing The complex includes several general needs properties rented by Sanctuary Housing. Its central location has posed unique security challenges, particularly regarding access control for the building’s car park and residential areas. Sanctuary Housing sought the expertise of Harrold Jones Services to address issues with their existing access control system. After a detailed risk assessment of the site’s needs, Harrold Jones Services collaborated with Comelit-PAC to design and install a tailored access control solution. The new system incorporates Comelit-PAC’s New Housing Central Product combined with High-Security Anti-Cloning Credentials, enabling site managers to monitor and control access from any PC or smart device, regardless of their location. Integrated with Comelit-PAC’s 512 series controllers Says Sanctuary Housing Scheme Manager Kim Tolnai: “The upgraded access control system has completely transformed how we manage the site. Residents now feel much more secure, and we have full control over who can enter the building and use the car park. The ability to monitor the system remotely has also been embraced by our management team. It gives us peace of mind, knowing we can monitor the site wherever we are.” The installation included high-frequency vandal-resistant readers on both the car park barrier and main entry points, integrated with Comelit-PAC’s 512 series controllers and the Housing Central Gateway. This combination delivers total security and reliability, ensuring only authorised residents can access the property and its parking facilities. Comelit-PAC solution A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents Says Danny Wallis, Director of Harrold Jones Services: “We worked closely with the team at Warmstry Court from early specification to ensure the access control system met the bespoke security requirements of the site. The Comelit-PAC solution has been instrumental in providing a comprehensive, future-proof system that seamlessly blends with surroundings with no impact on the aesthetics of the site. The result not only meets but exceeds the expectations of the residents and management team.” A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents. These secure tokens ensure that only authorised individuals can gain access, putting an end to the cloning issues that had previously plagued the site. Installation of the Comelit-PAC access control system Lloyd Palmer, Comelit-PAC’s Regional Sales Manager, provided on-site support to assist with the system’s setup and programming. He also ensured the management team at Warmstry Court was fully trained on the system’s features. Lloyd concluded: “The installation of the Comelit-PAC access control system has transformed security management at Warmstry Court. Sanctuary Housing now benefits from a robust system that ensures only authorised individuals have access to the building and its facilities. The advanced anti-cloning technology and the ability to manage the system remotely provide the ultimate in convenience, security and peace of mind for both residents and management.”
Located in Istanbul, Turkey, the Nish Adalar Konut Project is a large residential community covering 61 blocks with over 2,000 apartments. DNAKE IP video intercom system has been implemented throughout the community to provide an integrated security solution, offering residents an easy and remote access control living experience. The solution Solution highlights: Great scalability in large residential apartments Real-time video and audio communication Remote and easy mobile access Enhance the safety and functionality of elevator systems Installed products: S215 4.3" SIP Video Door Station C112 One-button SIP Video Door Station E216 7" Linux-based Indoor Monitor 902C-A Master Station Solution benefits Each entry point features DNAKE S215 4.3” SIP video door stations for secure access DNAKE smart intercom system offers easy and flexible access through various methods, including PIN code, IC/ID card, Bluetooth, QR code, temporary key, and more, providing residents with great convenience and peace of mind. Each entry point features DNAKE S215 4.3” SIP video door stations for secure access. Residents can open doors for visitors not only through the E216 Linux-based indoor monitor, typically installed in every apartment, but also via the Smart Pro mobile application, accessible anywhere and anytime. Overall safety and security C112 has been installed in every elevator to enhance the safety and functionality of elevator systems, making it a valuable addition to any building. In case of an emergency, residents can quickly communicate with building management or emergency services. Moreover, with C112, security guards can monitor elevator usage and respond to any incidents or malfunctions promptly. 902C-A master station is typically installed in every guard room for real-time communication. Guards can receive immediate updates on security events or emergencies, engage in two-way conversations with residents or visitors, and grant them access if necessary. It can connect multiple zones, allowing for better monitoring and response across the premises, thereby enhancing overall safety and security.
Silverstein Properties, a pioneering real estate development, investment, and management firm, and its partners SwiftConnect, Allegion, and Kastle, announced they are live with resident keys in Apple Wallet for all apartment units at a multi-family housing location: Silverstein’s Silver Towers residential property at 606 West 42nd Street in New York City. Silverstein’s residential tenants now have an easy and secure way to add a resident key to Apple Wallet to access the apartment building and unlock their homes with a simple tap of an iPhone or Apple Watch—thus eliminating the need to use a traditional, physical key. Resident key in Apple Wallet The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry “We’re excited to make it easy for our residents to use their resident key in Apple Wallet to get into their buildings, homes, and common areas, which builds upon our previous offering to office tenants who use their employee badge in Apple Wallet to access offices and shared spaces including lounges, cafes, conference facilities, and yoga studios,” said Tal Kerret, President of Silverstein Properties. The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry, as property owners and employers reimagine the home and workplace experience for residents, office tenants, and employees. SwiftConnect’s success: Enhance security for residents “The Silver Towers project builds on SwiftConnect’s success in delivering seamless access via NFC wallets across the most iconic commercial real estate properties in New York and beyond,” said Matt Kopel, co-CEO and President of SwiftConnect. “We are excited to once again partner with Silverstein Properties and to extend our leadership into the multi-family housing market. Now, residents can easily access their personal spaces with their iPhone and Apple Watch, and property teams are able to enhance security for their residents—while also automating the process of managing keys and access.” Modern access-control solution SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials To provide residential tenants with this experience, SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials; and access control devices from Allegion™, as well as all other necessary business platforms and systems to create a unified digital network for hassle-free mobile access. “Kastle is thrilled to be a partner on the Silver Tower project, leveraging Kastle’s robust and proven access-control products to create a modern access-control solution that delivers an unparalleled experience both property owners and residents can trust,” said Haniel Lynn, CEO of Kastle. Schlage mobile-enabled wireless locks “We are excited to work with SwiftConnect and play an important role in Silver Tower's resident key in Apple Wallet multifamily housing deployment,” said Mark Casey, Vice President of National Electronic Sales of Allegion. “Resident Keys in Apple Wallet—alongside our Schlage mobile credentials and Schlage mobile-enabled wireless locks—not only enhances security and convenience for residents, but also exemplifies our commitment to driving the future of seamless access and smart apartment technology.” How seamless access works at Silver Towers Tenants can add their resident key to Apple Wallet after an initial set-up through Silverstein’s Inspire app, using SwiftConnect’s AccessCloud platform. Once added, tenants can hold their iPhone or Apple Watch near a door reader or smart lock for seamless access to the apartment building, their home, and shared fitness and amenity spaces. With Express Mode, tenants don’t need to wake or unlock their device to use their resident key—they can simply hold their device near a reader and go. If an iPhone needs to be charged, they can still use their device to access their apartment and amenity spaces with Power Reserve. Resident key in Apple Wallet takes full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when and where a resident uses a home key in Wallet. Silverstein’s holistic customer experience program The new offering falls under Inspire, Silverstein’s holistic customer experience program that reshapes how, when, and where the company’s customers live and work. Inspire brings hospitality services, social and wellness programming, data-driven workplace technology, and a flexible workspace solution under one umbrella. Since its inception 67 years ago, Silverstein Properties has been recognised for driving innovative technology adoption to enhance the tenant experience. The company has built a reputation for developing exceptional projects, enhancing local communities, providing outstanding services to customers and partners, and driving innovation within the industry.
A housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. There is one entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution Highlights: Easy Intercom Retrofitting with Existing Cables Good Scalability for Easy Addition of New Units or Expansion Remote Access with App-based Features Solution Benefits: Future-proofing: With DNAKE 2-wire IP intercom solution, residences can now enjoy high-quality audio and video communication, multiple access options, including remote access, and the integration with surveillance systems, providing a more versatile and secured living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
Soyak Olympiakent in Turkey comprises thousands of apartments that prioritise 'Quality in Life.' It offers a quality and safe living experience, featuring a natural environment, sports facilities, swimming pools, ample parking areas, and a 24-hour private security system supported by an IP video intercom system. The Solution Solution Highlights: Great scalability in large residential apartments Remote and easy mobile access Real-time video and audio communication Emergency alerts Solution Benefits: DNAKE smart intercoms have been installed in 4 Blocks, covering a total of 1,948 apartments. Each entry point features DNAKE S215 4.3” SIP video door stations for secure access. Residents can open doors for visitors not only through the 280M-S8 indoor monitor, typically installed in every apartment, but also via the Smart Pro mobile application, accessible anywhere and anytime. The master station 902C-A in the guard room facilitates real-time communication, enabling guards to receive updates about security events or emergencies immediately. It can connect multiple zones, allowing for better monitoring and response across the premises, thereby enhancing overall safety and security.
High-quality skin care products, developed using the latest technologies and manufactured sustainably: the international Babor Beauty Group is represented in more than 70 countries with its sought-after beauty brands. Research and development as well as production take place at the company's headquarters in Aachen, Germany, while filling and logistics are located just a few miles away in Eschweiler. Use of digital process In 2023, the family enterprise inaugurated a cutting-edge production facility here, known as the “Babor Beauty Cluster”. Around half a million jars, tubes, and ampoules are filled there every day, and logistics and shipping are also handled on-site. A special feature of the 60,000 sq.m plant is its extensive use of digital processes for working and operating as efficiently as possible. The fully networked complete solution from Bosch Building Technologies for safety, security, and building management makes a valuable contribution to this. Greater safety, security, comfort, and efficiency The smart solution integrates, among other things, fire protection, intrusion alarm, and access control systems The smart solution from Bosch Building Technologies was precisely tailored to meet the Babor Beauty Group’s requirements. It integrates, among other things, fire protection, intrusion alarm, and access control systems, as well as a video security solution for safeguarding the perimeter and premises. AI-based video security for fast, frictionless reception The AI-based video security solution analyses every captured image while using predefined rules and only triggers an alarm if at least one of them is met. This avoids false alarms, thus enabling even more effective security management. The solution from Bosch Building Technologies also includes a digital visitor management system that saves time with a self-registration function. It ensures fast, frictionless reception of guests and tradespeople and includes audit-proof archiving, which significantly eases the workload of Babor’s operating team. Smart truck and parking space management The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording Another highlight is the smart truck and parking space management with license plate detection for user-friendly access control. Properly secured loads are also automatically documented. The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording to provide comprehensive documentation of the process. Management system for control across sites The Babor Beauty Group’s technical operations and facility management team is responsible for both the company’s headquarters in Aachen and the production and logistics cluster in Eschweiler. The safety and security systems of both sites have therefore been integrated into the “Building Integration System 360” from Bosch Building Technologies. Centralised management platform This centralised management platform provides control of all building systems, enabling Babor Beauty Group's operations and management team to respond efficiently to security-related events. The solution is also flexibly scalable to facilitate the integration of future site extensions. Bosch Building Technologies will operate this complete solution for the next ten years within the scope of a build-operate-transfer model.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
Videos
Residential security systems: Manufacturers & Suppliers
- Visonic Residential security systems
- Climax Technology Residential security systems
- Bosch Residential security systems
- Dahua Technology Residential security systems
- Pyronix Residential security systems
- Codelocks Residential security systems
- Concord Residential security systems
- Honeywell Security Residential security systems
- OPTEX Residential security systems
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download