Security cameras
Milestone Systems, a provider of open platform video management software (VMS), announces the release of XProtect 2025 R1, featuring expanded cloud integration capabilities and advanced vehicle identification video analytics. This release demonstrates Milestone's commitment to platform accessibility and enhanced security features across its XProtect product line. The XProtect 2025 R1 release, available from March 18, 2025 at 12.00 CET, marks a significant expansion in platform accessibility, wi...
At ISC West 2025, Hanwha Vision (Booth 14025) is defining its vision for the future of surveillance, highlighting the potential for security devices to move beyond monitoring and protection and become true business transformation tools. Hanwha is featuring its Wisenet 9 System on Chip (SoC), unique camera design collaborations delivering unprecedented AI functionality and business intelligence software generating enhanced data-driven insights. Managing surveillance resources In Hanwha’...
Quanergy Solutions, Inc., a provider of 3D LiDAR solutions, announced integration of its Q-Track™ 3D LiDAR platform with Axis Communications’ VAPIX® network video API. This integration enables seamless connectivity between Quanergy’s advanced 3D LiDAR-powered security platform and Axis’ industry-pioneer network cameras, delivering unparalleled real-time detection, tracking, and situational awareness for critical security environments. Issuing automated notification...
Leveraging the NVIDIA platform, Milestone Systems’ Project Hafnia is aiming to be a pioneer service for data generators, to share and utilise their data, and for developers, to access traceable and regulatory-compliant annotated video data. Milestone’s goal is to put the latest advances in Vision Language Models (VLM) and supporting data curation capabilities in the hands of as many developers as possible. One of the first service offerings is a VLM, fine-tuned using NVIDIA fine-tun...
Cybersecurity pioneer Rubrik announced Nicole Perlroth, bestselling cybersecurity author and former New York Times lead cybersecurity reporter, has been appointed as Chief Cyber Raconteur. In her advisory role, Perlroth will help strengthen Rubrik’s leadership in the cyber resilience market and drive the company’s reporting on cyber threats. Rubrik Zero Labs reports Perlroth aims to transform broad cybersecurity and cyber resilience topics into easily accessible Perlrot...
Relyon, a pioneering provider of an innovative approach to personal safety solutions, announced its strategic expansion into North and South America. This expansion marks a significant milestone in Relyon’s mission to provide cutting-edge safety and security technology to individuals, families, and organisations across the Americas. Relyon’s comprehensive safety Relyon’s comprehensive safety app utilises advanced technology, including real-time location sharing, video emerge...
News
Power over Ethernet (PoE) switches have fundamentally transformed how devices are powered and connected to industrial networks. By transmitting both power and data through a single Ethernet cable, industrial PoE switches enable the deployment of Powered Devices (PD), such as IP cameras, wireless access points, VoIP phones, and sensors. New generation of PoE switches New generation of low-voltage PoE switches able to operate on input voltages below 48VDC Standard PoE Ethernet switches supply PDs with clean, stable DC power compliant with the IEEE’s 802.3af/at/bt PoE specifications. In order to do this, they usually require 48VDC (Direct Current Voltage) input, and are unable to properly supply PoE to devices in settings where this voltage is not accessible. This article explores a new generation of low-voltage PoE switches able to operate on input voltages below 48VDC. Internal DC-to-DC power-boosting technology enables these switches to convert 12-36VDC input to 48-56VDC output, ensuring seamless power delivery for PDs in compliance with IEEE 802.3 PoE standards. IEEE specifies 48VDC input on devices Due to its stability, virtually all communication devices utilise direct current (DC) sourced from a power supply, converting alternating current (AC) into DC or a DC battery. IEEE specified 48VDC in its PoE standards because it balances efficient power transmission, voltage drop considerations over long Ethernet cable runs, and electrical safety thresholds. IEEE’s original PoE standard PoE operates within a flexible voltage range rather than a fixed 48VDC While many PoE devices can operate on battery power, the vast majority of enterprise and industrial PoE networks derive power from AC-to-DC power supplies converting grid electricity. PoE operates within a flexible voltage range rather than a fixed 48VDC. The IEEE’s original PoE standard, 802.3af, along with subsequent standards 802.3at and 802.bt, specify a voltage range requirement of 44 to 57 volts. Power standard PoE switches Industrial networks continuously change and expand into new areas, unlocking opportunities even in locations without 48VDC input to power standard PoE switches. Low voltage input switches represent an innovative new solution, eliminating the need for complex setups like connecting four 12V batteries in series to achieve 48VDC. By simplifying power requirements, low voltage input Ethernet switches save space, reduce complexity, and enhance reliability by removing the need for additional voltage converters for lower-voltage devices. Below are some applications where low-voltage PoE switches excel, particularly in remote sites without readily available power outlets. Smart buses These vehicles are networked to improve transportation efficiency and the passenger experience. Smart buses can be frequently equipped with IP cameras, WAPs, GPS, and VoIP, yet have only DC12V input for a PoE switch to draw power. Similar power challenges arise in RVs, mobile command centres, trucks, and ships. Remote sites Off-grid industrial sites use solar-powered battery systems featuring DC12V, DC18V, and DC36V inputs Off-grid industrial sites use solar-powered battery systems featuring DC12V, DC18V, and DC36V inputs. Depending on the size of the panel and the sunlight conditions, different types of high-capacity batteries can be charged to power a low-voltage industrial PoE switch, greatly simplifying connectivity for multiple PDs. These PDs can include standalone roadside devices, access control/VoIP, agricultural monitoring, surveillance trailers, and Intelligent Transportation Systems. Besides solar, batteries can be charged by a backup generator or connected to the grid during off-peak hours, when available. Though far less common, wind, hydroelectrical, and geothermal power are power options. Factory automation Although these electrical systems can range from 12VDC to 36VDC, the de facto voltage for industrial automation and control systems is 24VDC. Relays, industrial sensors, actuators, and PLCs use 24VDC, for instance. A low-voltage PoE switch will operate on various 24VDC power supplies in industrial automation systems. The low voltage PoE switch will power network devices directly from a properly specified 24VDC power supply without needing a separate high-voltage wall outlet. Mobile trailers Solar-powered mobile security trailers offer a key for where reducing the use of long cables improves safety Solar-powered mobile security trailers allow for quick deployment in various scenarios, such as construction sites, live events, parking lots, schools, and general crowd control. Trailers provide a security presence by being equipped with multiple IP cameras, speakers, wireless radios, lights, and other hardware to identify, find, and deter criminals and capture incidents 24/7, day or night. Solar-powered mobile security trailers offer a solution for where reducing the use of long electrical cables improves safety. In these situations, a low-voltage PoE switch with an internal DC boost is required to convert 12-36VDC input into the necessary 48-56VDC PoE output for connected PDs. Antaira power boost Antaira's "power boost" technology utilises the switch's integrated circuitry, typically a boost converter, to efficiently store energy in an inductor during the switch-on phase and release it during the switch-off phase. This process results in a higher output voltage than the input, ensuring reliable power delivery. This way, PDs operate on a standard 48VDC PoE output even when the industrial type of switch is supplied with a lower voltage input. It also eliminates the need for a separate step-up transformer and, in turn, saves space in an enclosure using only one device.
At ISC-West, booth #7041, Acoem, a pioneer in advanced physical security solutions, will unveil its next-generation gunshot detection system. Acoem ATD (Acoustic Threat Detection) technology is designed for security professionals, law enforcement agencies, and critical infrastructure operators who require a data-driven gunshot detection solution that delivers unparalleled speed, accuracy, and scalability—without the need for multiple sensors. Acoem’s Cadence™ software The system’s edge-processed AI analytics always learn from the environment By processing events on the edge (within the sensor), a single ATD-300 sensor, combined with Acoem’s Cadence™ software, provides instantaneous camera slewing toward detected threats, enhancing situational awareness for security teams. The system’s edge-processed AI analytics continuously learn from the environment, reducing false positives and ensuring precise threat localisation. AI-driven neural network Unlike other gunshot detection systems that rely on multiple sensors or cloud-based processing, Acoem ATD conducts real-time threat detection and classification directly on the edge, enabling faster and more reliable alerts. “Gunshot detection systems are not all the same. With our 30-year history of innovation and battle-proven defense applications, we have continually evolved our acoustic threat detection capabilities,” said Timothy English, Managing Director at Acoem ATD. “The AI-driven neural network is trained with threat data collected over decades and allows us to continually refine sensor responses for each unique environment, enabling the system to keep improving over time.” Setting a new standard in gunshot detection The ATD-300 sensor outperforms existing keys that require large-scale infrastructure Unlike competitors that depend on multi-sensor triangulation and backend processing, Acoem ATD technology detects both the muzzle blast and the ballistic sound wave of a bullet in motion, allowing detection and location from a single sensor to ensure instant alerts and faster response times. The ATD-300 sensor outperforms existing solutions that require large-scale infrastructure, offering a more efficient, cost-effective solution for protecting high-risk environments such as stadiums, smart cities, campuses, and critical infrastructure sites. Advanced threat detection systems "Since 1995, our threat surveillance and detection solutions have been deployed to the world’s most challenging and demanding combat environments, earning the trust of operators for their accuracy and reliability." "This battle-proven technology became the foundation for our advanced threat detection systems designed for civilian applications. Today, we empower law enforcement agencies and security professionals with cutting-edge tools to enhance public safety, providing a new level of situational awareness in responding to incidents of gun violence," adds English. Acoem ATD key differentiators Single-Sensor Deployment: Many gunshot detection systems require multiple sensors for triangulation. The ATD-300 provides accurate threat detection with a single device, allowing for greater deployment flexibility. Immediate Camera Slewing: Security teams gain real-time visual confirmation as PTZ cameras are instantly directed toward the source of gunfire. Scalability & Flexibility: The system supports small-scale deployments and can be expanded as needed. Sensors can be strategically installed on trailers or inside the perimeters of monitored areas. Seamless Integration: Acoem’s ADT technology integrates effortlessly with pioneering video management systems (VMS) and existing security infrastructure, minimising deployment costs and complexity. ISC West attendees are invited to visit booth #7041 to view a demonstration of Acoustic Threat Detection in action.
Milestone Systems, a pioneer in video technology software, is exhibiting and speaking at ISC West 2025, taking place in Las Vegas, March 31–April 4. This marks the company’s 22nd time participating in the premier industry event. At ISC West, Milestone will present the new product suite as well as a range of new solutions within public safety and hybrid and cloud deployment. Unlocking the full video data For the first time, Milestone will present the expanded suite of products consisting of XProtect, BriefCam, and Arcules – spanning industry-pioneering video management software, innovative AI-driven video analytics, and flexible cloud-based solutions. Milestone will present the expanded suite of products consisting of XProtect, BriefCam, and Arcules “The combination of Milestone’s product portfolio enables organisations to unite all cameras, sensors, and sites in one centralised solution, and to tailor their installation to their unique needs – while also leveraging the latest analytics and AI technologies to get the full potential of video data. This means that organisations can now truly amplify what they can achieve with our video technology,” says Morten Illum, Chief Revenue Officer at Milestone. At Milestone’s booth at ISC West, it will, among other, be possible to experience how the BriefCam AI-driven video analytics supercharge the potential of video surveillance cameras by transforming video footage into searchable, actionable and quantifiable insights. Empowering public safety to make faster responses At ISC West, Milestone will also exhibit digital evidence management solutions within Public Safety – an area that faces unmatched challenges, from proactive crime prevention to real-time threat detection and efficient incident investigations. "As of 2024, almost every criminal case involves some form of digital evidence, creating unprecedented challenges for law enforcement and prosecutors. Having secure and reliable video evidence is critical to solving these challenges and driving successful investigations,” says Tim Palmquist, Vice President of Milestone Systems Americas. “Our suite of products enables law enforcement and other public safety agencies to respond faster to incidents, prepare cases more efficiently, and manage video evidence with ease – creating valuable impact, not only for the users, but for the safety of people and society,” says Tim Palmquist. Revolutionising hybrid cloud architecture During ISC West, Milestone will also showcase the new, flexible hybrid solution During ISC West, Milestone will also showcase the new, flexible hybrid solution. This innovative deployment allows multi-site organisations to seamlessly integrate on-premise and cloud video management across various locations, providing centralised control and enhancing situational awareness. “For businesses already using on-premise systems, the switch to cloud-based surveillance can seem daunting. However, a hybrid model provides an ‘off-ramp’ from on-premises infrastructure to cloud, empowering organisations to evolve their security infrastructure at their own pace – or to simply enjoy the best of both worlds with a hybrid solution,” says Rahul Yadav, Chief Technology Officer at Milestone Systems. XProtect investments with Arcules cloud capabilities “Our new, expanded Arcules integration will provide users with a valuable hybrid approach that truly offers unmatched flexibility to design their video security setup exactly to their needs." "It's centralised, seamless, easy to use, and adjustable – as well as futureproof: by connecting current on-premises XProtect investments with Arcules cloud capabilities, users can evolve their security exactly how and when they choose – without compromise,” says Rahul Yadav. Launching as part of the upcoming XProtect R1 release, the expanded Arcules integration will be available from March 18. Coming to ISC West? Meet them at booth #18053 and on stage! ISC West attendees can engage with Milestone at Booth #18053, where we will be showcasing and demonstrating the XProtect, Arcules and BriefCam products – along with the other solutions. They can also experience Milestone’s VMS, tech, and AI experts on stage during one of the thought leadership sessions throughout the event: The Return of Investment of AI-Driven Video Analytics – Monday, March 31 Have It Your Way: Your Journey to the Cloud – Tuesday, April 1 Learning from You: The Promise of Generative AI in the Physical Security Industry – Wednesday, April 2
Ranger Fire and Security has announced its first acquisition of 2025, with McGoff & Vickers Fire & Security Systems (MGV) becoming the latest business to join the rapidly growing Ranger Group. Run by industry specialists and service business experts, Ranger brings together high-quality fire and security (F&S) businesses in partnership to share industry expertise, resources and boost cross-selling opportunities. Fire protection services North-West-based F&S business MGV has a history of providing high-quality fire protection services Founded in 1925, North-West-based F&S business MGV has a long history of providing high-quality fire protection services within both the private and public sectors. It currently boasts a wide range of high-profile clients, including hospitals, councils, and educational facilities. With a hugely loyal customer base, MGV has a 95% recurring revenue stream based on maintenance relationships, which aligns closely with Ranger’s guardrails. NSI’s highest technical standards Later this year, the company celebrates its centenary anniversary, as it continues to enhance security for its customers through a range of products including fire, intruder, CCTV, electrical and data cabling network installations. MGV has also been a National Security Inspectorate NACOSS Gold Contractor since the 1970s, achieving the NSI’s highest technical standards. As a security specialist in the North-West, MGV will complement the existing fire alarm services at Ranger and enhance the group’s multidiscipline and cross-selling capability. The team will work with other companies in the Ranger Group to increase efficiency, skills and knowledge, while delivering work to existing customers on a wider scale. Ranger’s enhance mission MGV will continue to operate under its current name but will work closely with Syncro Fire and Security As part of this acquisition, and like previous businesses that have joined the Ranger Group, MGV will continue to operate under its current name but will work closely alongside Syncro Fire and Security to further enhance Ranger’s mission in delivering a one-stop shop for its North-West customers. Gerry Bates, Managing Director of Syncro, said: “We know McGoff & Vickers really well by reputation, and they have an excellent reputation gained with their many long-standing customers, providing the North-West with the high-quality fire and security needs it requires." Incredible opportunity for Ranger Bates added: “Working closely with Syncro under the Ranger umbrella, we will work together as a team to enable McGoff & Vickers and Syncro to delight our current customer base and to reach a wider range of customers. I’m looking forward to working with the MGV team to enhance our offering to customers across the North-West.” Ian Teader, Group Managing Director of Ranger Fire and Security, said: “MGV is well known to me and its business model aligns closely with what we are looking to achieve at Ranger. To have a business join with such a strong reputation and history is testament to Ranger’s pull in the market. Furthermore, for the business to be a 95% maintenance led business is an incredible opportunity for Ranger to build out their services alongside the other businesses that we have in the North-West.” Range of quality fire and security services Ranger has embarked on a mission to set itself as the one-stop solution provider in the fire and safety sector Mark Giardelli, Managing Director of McGoff & Vickers Fire and Security Systems, said: “Joining the Ranger Group and working closely with Syncro is a huge opportunity for MGV and its customers. This will enable MGV to further expand the business, as well as giving clients greater access to a full range of quality fire and security services through cross-selling initiatives." “Collaborating with other companies allows for an expansion in services to existing clients while also reaching new customers. The plan is to work closely with other North-West based businesses to increase resources, skills and knowledge to the area.” Ranger Fire and Security’s previous acquisitions The announcement builds on Ranger Fire and Security’s previous acquisitions of AFIL, Ignis Fire Protection Ltd, Syncro Group Ltd, IPH Fire Solutions Ltd, Fire Door Specialists Ltd, KSS Fire Suppression, and Secureshield Ltd, which together have helped Ranger to enhance its offering in all key areas of fire and security services, such as fire detection and alarms, extinguisher maintenance, passive fire and security services. Since launching in Q1 2024, with backing from the private investment firm Hyperion Equity Partners, Ranger has embarked on a mission to establish itself as the pioneering one-stop solution provider in the fire and safety sector, offering a comprehensive range of services through both regional and national operations, and providing a seamless customer experience. Funding for the acquisition was provided by ThinCats.
Hexagon’s Safety, Infrastructure & Geospatial division announced the expansion and rebranding of its portfolio of physical security solutions to HxGN dC3. The new name, which stands for Detect, Command, Control and Collaborate, reflects the company’s approach to protecting people, property and assets by supporting the entire lifecycle of an incident to minimise its impact. LiDAR detection technology Since acquiring pioneering physical security solution provider Qognify in April 2023, Hexagon has been extending and integrating its offerings into the broader Hexagon ecosystem. The newly expanded portfolio will continue to serve as a platform for growing Hexagon’s footprint in the physical security space. New to the portfolio is the AI-enhanced HxGN dC3 LidarVision (formerly Accur8vision), a 3D surveillance system based on volumetric LiDAR detection technology. It goes beyond traditional perimeter protection to secure entire areas instead of just the fence line, with the ability to track intrusions even in low light and classify objects using Hexagon’s proprietary AI neural network, DeepTection. HxGN dC3 core portfolio HxGN dC3 leverages solutions from the wider Hexagon stack, including HxGN OnCall Dispatch The portfolio also includes HxGN dC3 Video (formerly Qognify VMS), an open-platform video management software (VMS), and HxGN dC3 Orchestrator (formerly Situator), an enterprise-class physical security information management (PSIM) software. Solutions for advanced video analytics, forensic search and centralised management and monitoring of multi-site physical security systems complete the HxGN dC3 core portfolio. In addition, HxGN dC3 leverages solutions from the wider Hexagon stack, including HxGN OnCall Dispatch, Hexagon’s industry-leading computer-aided dispatch solution, and HxGN Connect, an AI-enhanced, cloud-based collaboration portal. Integrated software solutions With the HxGN dC3 portfolio and complementary solutions, customers have all-encompassing security coverage to manage incidents from beginning to end, plus an unprecedented ability to manage, store and analyse data to deter and prevent intrusions and incidents. “Hexagon is reinventing physical security with a suite of integrated software solutions for enterprise organisations,” said Mladen Stojic, president of physical security for Hexagon’s Safety, Infrastructure & Geospatial division. “With HxGN dC3, Hexagon empowers these organisations to safeguard their worlds.”
i-PRO Americas Inc. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the launch of VideoInsight™ version 8.0, the latest release of its powerful video management system (VMS). Designed to meet the evolving security needs of school administrators, IT directors and security teams, VideoInsight 8.0 simplifies campus safety with an intuitive, cost-effective platform that delivers seamless integration, advanced AI tools and unmatched reliability. VideoInsight platform Educational institutions face ongoing challenges such as limited budgets, complex security infrastructures and fragmented security tools that hinder real-time response. The VideoInsight platform directly addresses budget concerns by not requiring camera licencing when using i-PRO cameras; this drives down upfront costs and lowers reoccurring costs. Intuitive dashboards and features VideoInsight 8.0 reduces administrative burdens, saving both time and resources With intuitive dashboards and automated maintenance features, VideoInsight 8.0 reduces administrative burdens, saving both time and resources. Built-in self-diagnostics, health monitoring and database optimisation ensure system reliability with 24/7 fault tolerance, minimising IT oversight and lowering maintenance costs, freeing up valuable resources for other critical school operations. It also offers cloud-based storage options without requiring additional middleware, allowing schools to reduce expensive hardware costs while maintaining easy access to video footage for investigations and compliance. Key benefits Scalable Security: VideoInsight 8.0 is designed to adapt to evolving security requirements in schools without adding complexity. Its open-platform design seamlessly integrates with i-PRO hardware and third-party solutions from Triton Ultra (vape detection), ZeroEyes (weapons detection), Wasabi (cloud storage), and Zenitel (video intercom), reducing upfront costs and long-term ownership expenses. Schools can integrate it effortlessly with existing systems while benefiting from cost-effective licencing and a future-ready security platform. Faster Forensic Searches with Built-In i-PRO Active Guard: i-PRO Active Guard is now natively integrated into the VideoInsight 8.0 platform, enabling forensic searches directly within the camera pane – eliminating the need for separate plugins. Schools can consolidate all security devices, including indoor, outdoor, and transportation cameras, into a single, user-friendly platform. i-PRO Active Guard extends across servers, clients, web and mobile platforms, enabling AI-triggered searches without switching between multiple applications. Unified Access Control and Video Management: VideoInsight 8.0 integrates seamlessly with i-PRO’s MonitorCast access control platform, creating a single-pane-of-glass view for access control events tied to video footage. This integration streamlines workflows, saving time and providing a comprehensive, real-time security overview. Whether on campus or off-site, security teams can monitor school security remotely with AI-triggered searches, instant alerts and mobile access, ensuring swift response to incidents. Enhanced Transit Solutions: VideoInsight 8.0 improves transit monitoring with native video offloading and durable storage technology, ensuring reliable video performance for buses and other school transportation systems—all within a single platform. Cost-Effective Body-Worn Camera Deployment: The i-PRO BWC4000 body-worn camera includes a bundled camera licence, allowing direct connectivity to VideoInsight 8.0 without additional licencing costs. Advanced accessible security solution “Our goal is to provide educational institutions with an advanced yet accessible security solution that provides an end-to-end offering with options for access control, vape and weapons detection, intercom, cloud storage and more,” said Adam Lowenstein, Product Director at i-PRO Americas, Inc. “VideoInsight 8.0 stands out by offering a unique combination of affordability, high-performance features and open infrastructure. Unlike other VMS solutions, it seamlessly integrates with existing hardware and software while reducing or even eliminating recurring licencing fees, ensuring institutions get maximum value without hidden expenses.”
Power over Ethernet (PoE) switches have fundamentally transformed how devices are powered and connected to industrial networks. By transmitting both power and data through a single Ethernet cable, industrial PoE switches enable the deployment of Powered Devices (PD), such as IP cameras, wireless access points, VoIP phones, and sensors. New generation of PoE switches New generation of low-voltage PoE switches able to operate on input voltages below 48VDC Standard PoE Ethernet switches supply PDs with clean, stable DC power compliant with the IEEE’s 802.3af/at/bt PoE specifications. In order to do this, they usually require 48VDC (Direct Current Voltage) input, and are unable to properly supply PoE to devices in settings where this voltage is not accessible. This article explores a new generation of low-voltage PoE switches able to operate on input voltages below 48VDC. Internal DC-to-DC power-boosting technology enables these switches to convert 12-36VDC input to 48-56VDC output, ensuring seamless power delivery for PDs in compliance with IEEE 802.3 PoE standards. IEEE specifies 48VDC input on devices Due to its stability, virtually all communication devices utilise direct current (DC) sourced from a power supply, converting alternating current (AC) into DC or a DC battery. IEEE specified 48VDC in its PoE standards because it balances efficient power transmission, voltage drop considerations over long Ethernet cable runs, and electrical safety thresholds. IEEE’s original PoE standard PoE operates within a flexible voltage range rather than a fixed 48VDC While many PoE devices can operate on battery power, the vast majority of enterprise and industrial PoE networks derive power from AC-to-DC power supplies converting grid electricity. PoE operates within a flexible voltage range rather than a fixed 48VDC. The IEEE’s original PoE standard, 802.3af, along with subsequent standards 802.3at and 802.bt, specify a voltage range requirement of 44 to 57 volts. Power standard PoE switches Industrial networks continuously change and expand into new areas, unlocking opportunities even in locations without 48VDC input to power standard PoE switches. Low voltage input switches represent an innovative new solution, eliminating the need for complex setups like connecting four 12V batteries in series to achieve 48VDC. By simplifying power requirements, low voltage input Ethernet switches save space, reduce complexity, and enhance reliability by removing the need for additional voltage converters for lower-voltage devices. Below are some applications where low-voltage PoE switches excel, particularly in remote sites without readily available power outlets. Smart buses These vehicles are networked to improve transportation efficiency and the passenger experience. Smart buses can be frequently equipped with IP cameras, WAPs, GPS, and VoIP, yet have only DC12V input for a PoE switch to draw power. Similar power challenges arise in RVs, mobile command centres, trucks, and ships. Remote sites Off-grid industrial sites use solar-powered battery systems featuring DC12V, DC18V, and DC36V inputs Off-grid industrial sites use solar-powered battery systems featuring DC12V, DC18V, and DC36V inputs. Depending on the size of the panel and the sunlight conditions, different types of high-capacity batteries can be charged to power a low-voltage industrial PoE switch, greatly simplifying connectivity for multiple PDs. These PDs can include standalone roadside devices, access control/VoIP, agricultural monitoring, surveillance trailers, and Intelligent Transportation Systems. Besides solar, batteries can be charged by a backup generator or connected to the grid during off-peak hours, when available. Though far less common, wind, hydroelectrical, and geothermal power are power options. Factory automation Although these electrical systems can range from 12VDC to 36VDC, the de facto voltage for industrial automation and control systems is 24VDC. Relays, industrial sensors, actuators, and PLCs use 24VDC, for instance. A low-voltage PoE switch will operate on various 24VDC power supplies in industrial automation systems. The low voltage PoE switch will power network devices directly from a properly specified 24VDC power supply without needing a separate high-voltage wall outlet. Mobile trailers Solar-powered mobile security trailers offer a key for where reducing the use of long cables improves safety Solar-powered mobile security trailers allow for quick deployment in various scenarios, such as construction sites, live events, parking lots, schools, and general crowd control. Trailers provide a security presence by being equipped with multiple IP cameras, speakers, wireless radios, lights, and other hardware to identify, find, and deter criminals and capture incidents 24/7, day or night. Solar-powered mobile security trailers offer a solution for where reducing the use of long electrical cables improves safety. In these situations, a low-voltage PoE switch with an internal DC boost is required to convert 12-36VDC input into the necessary 48-56VDC PoE output for connected PDs. Antaira power boost Antaira's "power boost" technology utilises the switch's integrated circuitry, typically a boost converter, to efficiently store energy in an inductor during the switch-on phase and release it during the switch-off phase. This process results in a higher output voltage than the input, ensuring reliable power delivery. This way, PDs operate on a standard 48VDC PoE output even when the industrial type of switch is supplied with a lower voltage input. It also eliminates the need for a separate step-up transformer and, in turn, saves space in an enclosure using only one device.
At ISC-West, booth #7041, Acoem, a pioneer in advanced physical security solutions, will unveil its next-generation gunshot detection system. Acoem ATD (Acoustic Threat Detection) technology is designed for security professionals, law enforcement agencies, and critical infrastructure operators who require a data-driven gunshot detection solution that delivers unparalleled speed, accuracy, and scalability—without the need for multiple sensors. Acoem’s Cadence™ software The system’s edge-processed AI analytics always learn from the environment By processing events on the edge (within the sensor), a single ATD-300 sensor, combined with Acoem’s Cadence™ software, provides instantaneous camera slewing toward detected threats, enhancing situational awareness for security teams. The system’s edge-processed AI analytics continuously learn from the environment, reducing false positives and ensuring precise threat localisation. AI-driven neural network Unlike other gunshot detection systems that rely on multiple sensors or cloud-based processing, Acoem ATD conducts real-time threat detection and classification directly on the edge, enabling faster and more reliable alerts. “Gunshot detection systems are not all the same. With our 30-year history of innovation and battle-proven defense applications, we have continually evolved our acoustic threat detection capabilities,” said Timothy English, Managing Director at Acoem ATD. “The AI-driven neural network is trained with threat data collected over decades and allows us to continually refine sensor responses for each unique environment, enabling the system to keep improving over time.” Setting a new standard in gunshot detection The ATD-300 sensor outperforms existing keys that require large-scale infrastructure Unlike competitors that depend on multi-sensor triangulation and backend processing, Acoem ATD technology detects both the muzzle blast and the ballistic sound wave of a bullet in motion, allowing detection and location from a single sensor to ensure instant alerts and faster response times. The ATD-300 sensor outperforms existing solutions that require large-scale infrastructure, offering a more efficient, cost-effective solution for protecting high-risk environments such as stadiums, smart cities, campuses, and critical infrastructure sites. Advanced threat detection systems "Since 1995, our threat surveillance and detection solutions have been deployed to the world’s most challenging and demanding combat environments, earning the trust of operators for their accuracy and reliability." "This battle-proven technology became the foundation for our advanced threat detection systems designed for civilian applications. Today, we empower law enforcement agencies and security professionals with cutting-edge tools to enhance public safety, providing a new level of situational awareness in responding to incidents of gun violence," adds English. Acoem ATD key differentiators Single-Sensor Deployment: Many gunshot detection systems require multiple sensors for triangulation. The ATD-300 provides accurate threat detection with a single device, allowing for greater deployment flexibility. Immediate Camera Slewing: Security teams gain real-time visual confirmation as PTZ cameras are instantly directed toward the source of gunfire. Scalability & Flexibility: The system supports small-scale deployments and can be expanded as needed. Sensors can be strategically installed on trailers or inside the perimeters of monitored areas. Seamless Integration: Acoem’s ADT technology integrates effortlessly with pioneering video management systems (VMS) and existing security infrastructure, minimising deployment costs and complexity. ISC West attendees are invited to visit booth #7041 to view a demonstration of Acoustic Threat Detection in action.
Milestone Systems, a pioneer in video technology software, is exhibiting and speaking at ISC West 2025, taking place in Las Vegas, March 31–April 4. This marks the company’s 22nd time participating in the premier industry event. At ISC West, Milestone will present the new product suite as well as a range of new solutions within public safety and hybrid and cloud deployment. Unlocking the full video data For the first time, Milestone will present the expanded suite of products consisting of XProtect, BriefCam, and Arcules – spanning industry-pioneering video management software, innovative AI-driven video analytics, and flexible cloud-based solutions. Milestone will present the expanded suite of products consisting of XProtect, BriefCam, and Arcules “The combination of Milestone’s product portfolio enables organisations to unite all cameras, sensors, and sites in one centralised solution, and to tailor their installation to their unique needs – while also leveraging the latest analytics and AI technologies to get the full potential of video data. This means that organisations can now truly amplify what they can achieve with our video technology,” says Morten Illum, Chief Revenue Officer at Milestone. At Milestone’s booth at ISC West, it will, among other, be possible to experience how the BriefCam AI-driven video analytics supercharge the potential of video surveillance cameras by transforming video footage into searchable, actionable and quantifiable insights. Empowering public safety to make faster responses At ISC West, Milestone will also exhibit digital evidence management solutions within Public Safety – an area that faces unmatched challenges, from proactive crime prevention to real-time threat detection and efficient incident investigations. "As of 2024, almost every criminal case involves some form of digital evidence, creating unprecedented challenges for law enforcement and prosecutors. Having secure and reliable video evidence is critical to solving these challenges and driving successful investigations,” says Tim Palmquist, Vice President of Milestone Systems Americas. “Our suite of products enables law enforcement and other public safety agencies to respond faster to incidents, prepare cases more efficiently, and manage video evidence with ease – creating valuable impact, not only for the users, but for the safety of people and society,” says Tim Palmquist. Revolutionising hybrid cloud architecture During ISC West, Milestone will also showcase the new, flexible hybrid solution During ISC West, Milestone will also showcase the new, flexible hybrid solution. This innovative deployment allows multi-site organisations to seamlessly integrate on-premise and cloud video management across various locations, providing centralised control and enhancing situational awareness. “For businesses already using on-premise systems, the switch to cloud-based surveillance can seem daunting. However, a hybrid model provides an ‘off-ramp’ from on-premises infrastructure to cloud, empowering organisations to evolve their security infrastructure at their own pace – or to simply enjoy the best of both worlds with a hybrid solution,” says Rahul Yadav, Chief Technology Officer at Milestone Systems. XProtect investments with Arcules cloud capabilities “Our new, expanded Arcules integration will provide users with a valuable hybrid approach that truly offers unmatched flexibility to design their video security setup exactly to their needs." "It's centralised, seamless, easy to use, and adjustable – as well as futureproof: by connecting current on-premises XProtect investments with Arcules cloud capabilities, users can evolve their security exactly how and when they choose – without compromise,” says Rahul Yadav. Launching as part of the upcoming XProtect R1 release, the expanded Arcules integration will be available from March 18. Coming to ISC West? Meet them at booth #18053 and on stage! ISC West attendees can engage with Milestone at Booth #18053, where we will be showcasing and demonstrating the XProtect, Arcules and BriefCam products – along with the other solutions. They can also experience Milestone’s VMS, tech, and AI experts on stage during one of the thought leadership sessions throughout the event: The Return of Investment of AI-Driven Video Analytics – Monday, March 31 Have It Your Way: Your Journey to the Cloud – Tuesday, April 1 Learning from You: The Promise of Generative AI in the Physical Security Industry – Wednesday, April 2
Ranger Fire and Security has announced its first acquisition of 2025, with McGoff & Vickers Fire & Security Systems (MGV) becoming the latest business to join the rapidly growing Ranger Group. Run by industry specialists and service business experts, Ranger brings together high-quality fire and security (F&S) businesses in partnership to share industry expertise, resources and boost cross-selling opportunities. Fire protection services North-West-based F&S business MGV has a history of providing high-quality fire protection services Founded in 1925, North-West-based F&S business MGV has a long history of providing high-quality fire protection services within both the private and public sectors. It currently boasts a wide range of high-profile clients, including hospitals, councils, and educational facilities. With a hugely loyal customer base, MGV has a 95% recurring revenue stream based on maintenance relationships, which aligns closely with Ranger’s guardrails. NSI’s highest technical standards Later this year, the company celebrates its centenary anniversary, as it continues to enhance security for its customers through a range of products including fire, intruder, CCTV, electrical and data cabling network installations. MGV has also been a National Security Inspectorate NACOSS Gold Contractor since the 1970s, achieving the NSI’s highest technical standards. As a security specialist in the North-West, MGV will complement the existing fire alarm services at Ranger and enhance the group’s multidiscipline and cross-selling capability. The team will work with other companies in the Ranger Group to increase efficiency, skills and knowledge, while delivering work to existing customers on a wider scale. Ranger’s enhance mission MGV will continue to operate under its current name but will work closely with Syncro Fire and Security As part of this acquisition, and like previous businesses that have joined the Ranger Group, MGV will continue to operate under its current name but will work closely alongside Syncro Fire and Security to further enhance Ranger’s mission in delivering a one-stop shop for its North-West customers. Gerry Bates, Managing Director of Syncro, said: “We know McGoff & Vickers really well by reputation, and they have an excellent reputation gained with their many long-standing customers, providing the North-West with the high-quality fire and security needs it requires." Incredible opportunity for Ranger Bates added: “Working closely with Syncro under the Ranger umbrella, we will work together as a team to enable McGoff & Vickers and Syncro to delight our current customer base and to reach a wider range of customers. I’m looking forward to working with the MGV team to enhance our offering to customers across the North-West.” Ian Teader, Group Managing Director of Ranger Fire and Security, said: “MGV is well known to me and its business model aligns closely with what we are looking to achieve at Ranger. To have a business join with such a strong reputation and history is testament to Ranger’s pull in the market. Furthermore, for the business to be a 95% maintenance led business is an incredible opportunity for Ranger to build out their services alongside the other businesses that we have in the North-West.” Range of quality fire and security services Ranger has embarked on a mission to set itself as the one-stop solution provider in the fire and safety sector Mark Giardelli, Managing Director of McGoff & Vickers Fire and Security Systems, said: “Joining the Ranger Group and working closely with Syncro is a huge opportunity for MGV and its customers. This will enable MGV to further expand the business, as well as giving clients greater access to a full range of quality fire and security services through cross-selling initiatives." “Collaborating with other companies allows for an expansion in services to existing clients while also reaching new customers. The plan is to work closely with other North-West based businesses to increase resources, skills and knowledge to the area.” Ranger Fire and Security’s previous acquisitions The announcement builds on Ranger Fire and Security’s previous acquisitions of AFIL, Ignis Fire Protection Ltd, Syncro Group Ltd, IPH Fire Solutions Ltd, Fire Door Specialists Ltd, KSS Fire Suppression, and Secureshield Ltd, which together have helped Ranger to enhance its offering in all key areas of fire and security services, such as fire detection and alarms, extinguisher maintenance, passive fire and security services. Since launching in Q1 2024, with backing from the private investment firm Hyperion Equity Partners, Ranger has embarked on a mission to establish itself as the pioneering one-stop solution provider in the fire and safety sector, offering a comprehensive range of services through both regional and national operations, and providing a seamless customer experience. Funding for the acquisition was provided by ThinCats.
Hexagon’s Safety, Infrastructure & Geospatial division announced the expansion and rebranding of its portfolio of physical security solutions to HxGN dC3. The new name, which stands for Detect, Command, Control and Collaborate, reflects the company’s approach to protecting people, property and assets by supporting the entire lifecycle of an incident to minimise its impact. LiDAR detection technology Since acquiring pioneering physical security solution provider Qognify in April 2023, Hexagon has been extending and integrating its offerings into the broader Hexagon ecosystem. The newly expanded portfolio will continue to serve as a platform for growing Hexagon’s footprint in the physical security space. New to the portfolio is the AI-enhanced HxGN dC3 LidarVision (formerly Accur8vision), a 3D surveillance system based on volumetric LiDAR detection technology. It goes beyond traditional perimeter protection to secure entire areas instead of just the fence line, with the ability to track intrusions even in low light and classify objects using Hexagon’s proprietary AI neural network, DeepTection. HxGN dC3 core portfolio HxGN dC3 leverages solutions from the wider Hexagon stack, including HxGN OnCall Dispatch The portfolio also includes HxGN dC3 Video (formerly Qognify VMS), an open-platform video management software (VMS), and HxGN dC3 Orchestrator (formerly Situator), an enterprise-class physical security information management (PSIM) software. Solutions for advanced video analytics, forensic search and centralised management and monitoring of multi-site physical security systems complete the HxGN dC3 core portfolio. In addition, HxGN dC3 leverages solutions from the wider Hexagon stack, including HxGN OnCall Dispatch, Hexagon’s industry-leading computer-aided dispatch solution, and HxGN Connect, an AI-enhanced, cloud-based collaboration portal. Integrated software solutions With the HxGN dC3 portfolio and complementary solutions, customers have all-encompassing security coverage to manage incidents from beginning to end, plus an unprecedented ability to manage, store and analyse data to deter and prevent intrusions and incidents. “Hexagon is reinventing physical security with a suite of integrated software solutions for enterprise organisations,” said Mladen Stojic, president of physical security for Hexagon’s Safety, Infrastructure & Geospatial division. “With HxGN dC3, Hexagon empowers these organisations to safeguard their worlds.”
i-PRO Americas Inc. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the launch of VideoInsight™ version 8.0, the latest release of its powerful video management system (VMS). Designed to meet the evolving security needs of school administrators, IT directors and security teams, VideoInsight 8.0 simplifies campus safety with an intuitive, cost-effective platform that delivers seamless integration, advanced AI tools and unmatched reliability. VideoInsight platform Educational institutions face ongoing challenges such as limited budgets, complex security infrastructures and fragmented security tools that hinder real-time response. The VideoInsight platform directly addresses budget concerns by not requiring camera licencing when using i-PRO cameras; this drives down upfront costs and lowers reoccurring costs. Intuitive dashboards and features VideoInsight 8.0 reduces administrative burdens, saving both time and resources With intuitive dashboards and automated maintenance features, VideoInsight 8.0 reduces administrative burdens, saving both time and resources. Built-in self-diagnostics, health monitoring and database optimisation ensure system reliability with 24/7 fault tolerance, minimising IT oversight and lowering maintenance costs, freeing up valuable resources for other critical school operations. It also offers cloud-based storage options without requiring additional middleware, allowing schools to reduce expensive hardware costs while maintaining easy access to video footage for investigations and compliance. Key benefits Scalable Security: VideoInsight 8.0 is designed to adapt to evolving security requirements in schools without adding complexity. Its open-platform design seamlessly integrates with i-PRO hardware and third-party solutions from Triton Ultra (vape detection), ZeroEyes (weapons detection), Wasabi (cloud storage), and Zenitel (video intercom), reducing upfront costs and long-term ownership expenses. Schools can integrate it effortlessly with existing systems while benefiting from cost-effective licencing and a future-ready security platform. Faster Forensic Searches with Built-In i-PRO Active Guard: i-PRO Active Guard is now natively integrated into the VideoInsight 8.0 platform, enabling forensic searches directly within the camera pane – eliminating the need for separate plugins. Schools can consolidate all security devices, including indoor, outdoor, and transportation cameras, into a single, user-friendly platform. i-PRO Active Guard extends across servers, clients, web and mobile platforms, enabling AI-triggered searches without switching between multiple applications. Unified Access Control and Video Management: VideoInsight 8.0 integrates seamlessly with i-PRO’s MonitorCast access control platform, creating a single-pane-of-glass view for access control events tied to video footage. This integration streamlines workflows, saving time and providing a comprehensive, real-time security overview. Whether on campus or off-site, security teams can monitor school security remotely with AI-triggered searches, instant alerts and mobile access, ensuring swift response to incidents. Enhanced Transit Solutions: VideoInsight 8.0 improves transit monitoring with native video offloading and durable storage technology, ensuring reliable video performance for buses and other school transportation systems—all within a single platform. Cost-Effective Body-Worn Camera Deployment: The i-PRO BWC4000 body-worn camera includes a bundled camera licence, allowing direct connectivity to VideoInsight 8.0 without additional licencing costs. Advanced accessible security solution “Our goal is to provide educational institutions with an advanced yet accessible security solution that provides an end-to-end offering with options for access control, vape and weapons detection, intercom, cloud storage and more,” said Adam Lowenstein, Product Director at i-PRO Americas, Inc. “VideoInsight 8.0 stands out by offering a unique combination of affordability, high-performance features and open infrastructure. Unlike other VMS solutions, it seamlessly integrates with existing hardware and software while reducing or even eliminating recurring licencing fees, ensuring institutions get maximum value without hidden expenses.”


Expert commentary
Technology advances in the security industry are transforming the way modern systems are designed and installed. Customers today are looking for greater scalability and flexibility, lower up-front costs, and operational efficiency. Cloud-based software as a service (SaaS) solutions, AI-enhanced tools, and IoT-enabled sensors and devices are increasingly in demand. The traditional role of the systems integrator is evolving as a result. While security integrators have always worked closely with end users, today’s pioneers go beyond installation and maintenance. They align security strategies with evolving business needs, integrating IT, cybersecurity, and data-driven insights into their offerings. A look at the past and present Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity Traditionally, systems integrators specialised in installing and maintaining wired physical security systems like CCTV, access control, and alarms. The service model was built around large, up-front investments and project-based installations. However, today customers are seeking comprehensive solutions. They’re looking to wirelessly integrate security infrastructure with cloud-based SaaS systems and IoT devices. While modern systems are often faster to deploy, they’re most effective when supported by ongoing consulting and strategic planning. Integrators are often asked to help tailor solutions and provide expertise in IT and cybersecurity. Data requirements and modern systems Data requirements have also changed. Modern systems collect vast amounts of data. Advanced analytics, machine learning, and automation are now must-have tools for actionable insights. Security integrators can help end users set up custom dashboards, automations, and continuous system optimisation. Let’s look at some of the specific ways the role of systems integrators is evolving and how to adapt and succeed. Strengthen your IT expertise Integrators with IT expertise can ensure that hardware is optimised and maintained for peak performance The competitive landscape today includes not just security specialists but also IT-focused integrators and SaaS providers. Systems integrators with expertise in traditional physical security solutions plus IT experience offer unique value. They understand the real-world security challenges and opportunities, along with cybersecurity and network best practices. Integrators with IT expertise can also ensure that hardware is optimised and maintained for peak performance. Their experience with legacy systems allows them to offer practical recommendations on cost-effective approaches, such as upgrading or integrating older hardware with new digital solutions. Consider who’s making the purchase decisions Traditionally, security integrators primarily sold to security directors, facility managers, and operations teams. Now, multiple stakeholders may be involved in decision-making. IT teams, CIOs, and CTOs often weigh in on purchase decisions when cloud-based security and SaaS solutions are under consideration. Customers today aren’t just shopping for cameras, access control panels, alarms, and other hardware components. They’re looking for security ecosystems that can integrate with enterprise-wide IT infrastructure and business applications. When working with these different teams, consider outlining the system's return on investment (ROI). How can the solution reduce risk for various departments? Can it help improve operational efficiency or reduce the time required to onboard and train staff? Will it make regulatory compliance easier to manage? Focus on the long-term value for the entire organisation. Take a consultative approach Another way systems integrators are adding value is by offering vertical specialisation Installation fees remain important for many integrators, but there may be additional consultative opportunities to build long-term relationships with customers. Offer services such as roadmap planning, hardware and integration maintenance, training to certify end users on the manufacturer’s product, and cybersecurity services. While cloud-based solutions reduce on-premises maintenance, they don’t eliminate the need for ongoing support and training. Consider offering training opportunities. These can lead to other benefits as well. Better-educated and technically proficient customers are usually more willing to adopt new technologies. They understand the value of these investments and have more confidence that they’ll see results. Another way systems integrators are adding value is by offering vertical specialisation. Healthcare, sports venues, critical infrastructure, education, retail - each specialty has its own set of challenges, partner networks, regulatory restrictions, training needs, and business requirements. Integrators who specialise are uniquely positioned to offer key sector-specific insights that are invaluable to their clients. Embrace the cloud A key growth area for integrators is supporting customers in their shift to cloud deployments. Cloud solutions aren’t a one-size-fits-all solution. Each organisation is evaluating options and deciding whether cloud, hybrid, or fully on-prem solutions are the right fit for its unique needs. A key growth area for integrators is helping clients in their shift to cloud deployments Helping customers navigate and adopt cloud or hybrid solutions opens new opportunities to expand your business and deepen your relationship with your customers. Systems integrators who sell cloud solutions have the opportunity to add new layers to services for more value for customers. With a cloud solution that's easy and fast to deploy and managed and maintained by the provider, you can reduce overhead costs, staff training, and truck rolls via remote customer support. These benefits also allow you to spend time developing greater expertise in your customers’ processes. Using this knowledge, you can tailor your services towards potential productivity gains for your customers and turn them into additional sales. You ensure that your customers get the most out of the technology that’s available and that they have already purchased. Highlight your focus on cybersecurity Cybersecurity is no longer solely an IT department's responsibility. While dedicated IT security teams may still handle broader network defense, integrators play a crucial role in securing access control, surveillance, and IoT devices within a security framework. If unsecured, these devices can provide an entry point for cyber criminals to gain access to an organisation’s network. Cybersecurity is no longer solely an IT department's responsibility To best protect end users from cyberattacks, choose physical security systems with built-in security and privacy-by-design features. Help customers implement best practices to ensure their entire ecosystem is designed, built, and managed with end-to-end security in mind. Once implemented, work with your manufacturers, consultants, and end users to ensure that vulnerabilities are identified and mitigated. Every person on the network plays a role in keeping cyber threats at bay. Lean into the power of partnerships In today’s complex and dynamic security landscape, choosing the right technology partners is crucial. Ask potential partners to share their technology roadmap, and how you can offer feedback or participate in discussions about industry trends. Ideally, your partners will have a program in place to get input from integrators and end users, so they can develop products that are designed to address their most pressing issues and concerns. Your manufacturer partners should be working to help identify the evolving needs of customers and communicate these insights to systems integrators. Seek partners who actively support integrators to understand how security is evolving In addition to a good experience for the end user, strong manufacturer partners also offer solutions to streamline and automate workflows for integrators. It should be easy to order and check your shipping statuses online, for example. These are simple things that save you time and demonstrate your partner’s care for your business. Seek partners who actively support integrators to understand how security is evolving. While training is often offered on-site, some companies are now also offering blended learning models so integrators and their technicians can reduce classroom time and stay out in the field. Evolution is an opportunity Security integrators with traditional physical security expertise remain indispensable because they understand real-world risks and regulatory requirements. They can provide hands-on system deployment and optimisation. Now, there are new opportunities to build long term customer relationships. As the physical security industry undergoes this profound shift, adaptation is key. By embracing cloud and hybrid solutions, integrators can unlock new revenue streams, enhance customer relationships, and stay ahead of technological advancements. With the right partnerships and a forward-thinking mindset, systems integrators can navigate this transformation and take advantage of new opportunities being presented by evolving technology. Leverage your deep industry experience while upskilling in cloud, cybersecurity, and IT. The strongest approach is for end users, systems integrators, IT specialists, and manufacturers to work together to navigate industry changes.
From where I sit in talking to security pioneers every day, the traditional Global Security Operations Centre (GSOC) stands at a critical inflection point. Security teams are up against challenges in staffing, operational efficiency, and more threat complexity, which means “thinking outside the box” is becoming critical. The use of artificial intelligence (AI) is emerging as more than a buzzword in these situations; it’s becoming a game-changing force multiplier in security operations. Reaching a breaking point Today's GSOCs face a perfect storm of operational challenges. Security operators, typically earning between $20-40 per hour, require extensive training periods lasting weeks or months as a result of the numerous applications they’re tasked with using. Yet the industry grapples with insane turnover rates of 100-% to 300% annually, creating a costly cycle of continuous recruitment and training. Meanwhile, operators are drowning in video feeds and alarms, leading to fatigue, missed incidents, and delayed response times. Practical applications for AI The reality of many GSOCs, however, is a disjointed mess of multiple applications The GSOC is the centre of an organization’s security and in a perfect world, all of the data related to safety across multiple facilities flows through there, giving operators a clear picture of what’s going on at any given time. The reality of many GSOCs, however, is a disjointed mess of multiple applications. Think about all the platforms needed to respond to a single incident – access control alarm, video to verify, standard operating procedures (SOPs) stored on a shared drive, radios to get a hold of a guard to dispatch, finding a list of emergency numbers and corresponding it to where the incident is happening, and manually logging the results. Steps into a single platform Not only is there a case for unifying all of these steps into a single platform that pulls in data from various sources, but layering response with AI-enabled technology to achieve the following: Real-time video analysis and threat detection. AI-enabled systems are revolutionising surveillance operations by simultaneously monitoring multiple video feeds, detecting and classifying objects, people, and behaviours in real-time. The technology excels at identifying suspicious activities such as loitering, abandoned objects, or unauthorised access attempts, automatically alerting operators to potential threats – or even identifying false alarms that can take human operators away from the work they’re doing – all while maintaining vigilance across numerous camera feeds. Intelligent alarm management. One of AI's most immediate impacts is in addressing the chronic problem of false alarms. By analysing multiple data points simultaneously, AI technology can intelligently filter and verify alerts, dramatically reducing false positives that traditionally consume valuable operator time. An AI GSOC operator, for example, can assess an incoming alarm and either identify it as a real threat (then escalate to its human supervisors) or use SOPs to determine that the alarm is false, providing feedback and reasoning that’s collected and assessed. This intelligent triage ensures security teams focus on genuine threats rather than chasing false alarms, significantly improving response efficiency. Automated incident response. When security incidents occur, AI systems can instantly gather relevant data from multiple sources – including video feeds, access control logs, and sensor data – to generate preliminary incident reports and initiate appropriate response protocols. This automation ensures consistent application of security procedures while maintaining detailed documentation for compliance and analysis purposes. Predictive analytics and pattern recognition. By analysing historical data, AI systems can identify patterns that might indicate emerging security risks before they materialise. This includes detecting unusual access patterns, anomalies in foot traffic, or behavioural patterns that suggest potential future security threats, enabling proactive rather than reactive security measures. The benefits to the business While AI can be used in so many ways to reduce false alarms, create more efficiencies, and help GSOC operators elevate their roles to be more strategic, there is still a stigma associated with its use. However, a lot of the conversations around this kind of investment can be elevated to reflect positively on the business, which can help achieve more buy-in from leadership. Here are some of the ways: Operational improvements: Dramatic reduction in false alarm rates through intelligent verification systems that analyse multiple data points simultaneously Response times cut significantly through automated triage and threat assessment protocols Standardised and consistent application of security protocols across all shifts and incidents More efficient resource allocation through AI-driven staffing recommendations based on historical patterns Expanded security coverage without proportional staffing increases, enabling monitoring of multiple locations simultaneously Enhanced incident documentation through automated report generation and data collection Improved situational awareness through real-time correlation of multiple data sources Reduced training time for new operators through AI-assisted guidance systems Better compliance management through automated protocol enforcement and documentation Business impact: Significant cost savings through reduced false alarm response and more efficient staffing Decreased liability exposure through comprehensive incident documentation and consistent protocol application Enhanced regulatory compliance through automated record-keeping and standardised procedures Improved risk management through predictive analytics and early warning capabilities Better return on investment for security technology through integrated AI-driven optimization Increased scalability of security operations without proportional cost increases More robust business continuity through improved threat detection and response Enhanced protection of critical assets through constant AI monitoring Personnel impact: Reduced operator burnout through automation of routine and repetitive tasks Enhanced job satisfaction as operators focus on strategic decision-making rather than routine monitoring Improved work-life balance through more efficient resource allocation New career development opportunities in AI-enabled security operations Better retention rates through reduced stress and increased job engagement Enhanced skill development as operators learn to work with advanced technology Improved team collaboration through AI-assisted information sharing More effective decision-making support through AI-driven insights Greater operator confidence through AI-backed verification of security events AI and the road ahead Integration of AI into the GSOC is about more than simply technological advancement While security historically hasn’t changed as quickly as its cyber counterparts, its evolution is imminent. Integration of AI into the GSOC is about more than simply technological advancement; it’s a seismic shift in how organisations approach security operations. The future of this is in the partnership between human expertise and AI capabilities, where technology handles routine monitoring and initial threat assessment, allowing security personnel to focus on complex decision-making and strategic security initiatives. Transformation of security operations For security pioneers looking to implement AI in their GSOCs, success lies in thoughtful integration that considers both technical requirements and human factors. By carefully balancing automation with human oversight, organisations can create more effective, efficient, and responsive security operations that deliver tangible value to the enterprise. The transformation of security operations through AI isn't just about doing more with less – it's about doing better with what we have. As threats become more sophisticated and security demands continue to grow, AI-enabled GSOCs will be better positioned to meet these challenges while delivering enhanced protection for people, assets, and operations.
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Security beat
The practice of executive protection changed forever on Dec. 4, 2024, when UnitedHealthcare CEO Brian Thompson was shot outside a Manhattan, New York, hotel. The shocking event raised awareness in board rooms around the world about the need for, and challenges of, executive protection. Questions followed immediately, including why was the high-level executive not protected? Combination of risk and reward UnitedHealthcare’s stock price has gone down more than 20% since the shooting The event also highlighted what is at stake for companies, extending beyond the safety of executives and impacting many factors, even including a company’s stock price. UnitedHealthcare’s stock price has gone down more than 20% since the shooting, equating to tens of billions of dollars. “Companies are considering the combination of risk and reward like never before when it comes to executive protection,” says Glen Kucera, President of Allied Universal Enhanced Protection Services. “What are the chances this could happen? Before Dec. 4 many thought it was zero. And what are the financial implications for a company if it happens? Executive protection is a small investment to protect against a worst-case scenario.” Evaluation of an executive protection Before the UnitedHealthcare shooting raised awareness, fewer than 50% of executives had protection. But concerns that previously fell on deaf ears now have the full attention of companies, says Kucera. “Boards of directors are having to figure this out,” he adds. “They may not have executive protection, but now they have to do it.” A threat assessment, conducted by a company such as Allied Universal, provides an independent evaluation of a company’s executive protection needs. The assessment evaluates factors such as an executive’s travel habits, the safety of their home, etc. Does the executive need protection 24/7, or just when they travel into more dangerous areas? Risks increase related to corporate earnings Sometimes, cases increase the need for executive protection, such as an internal threat In assessing threats, security professionals also look beyond the individual to consider the safety of a corporate facility, for example. “Is there a visual deterrent, controlling who comes and goes?” asks Kucera. “If there is good security, it all ties together. We do home assessment, facility assessment, route assessment, and travel assessment as needed.” Sometimes, circumstances increase the need for executive protection, such as an internal threat. Timing is a factor, and risks increase related to corporate earnings releases, new product announcements, and corporate layoffs or consolidation. Monitoring social media tracks shifting threats that impact the need for executive protection. UnitedHealthcare shooting “He didn’t have it and probably didn’t think he needed it,” comments Kucera about the UnitedHealthcare executive who was gunned down in the streets of New York City. “He was staying at the hotel across the street and was used to walking down the street every day.” “Sometimes executives want to preserve their privacy and be able to walk down the street,” says Kucera. “Getting protection can be seen as a sign of weakness. Some CEOs in the past have said they just didn’t want it.” However, the UnitedHealthcare shooting raised the stakes of the need for more vigilance. “The bottom line is you have to yet beyond objections and make the investment to protect against a worst-case scenario,” says Kucera. Anti-capitalist sentiment in the general population An internal police bulletin warned of an online hit list naming eight executives and their salaries Threats to executives sometimes arise from anti-capitalist sentiment in the general population about perceived inequalities in wealth and power. Executives provide symbolic targets for anyone who fights the system, and social media has amplified the voices of those who oppose capitalism. For example, a "Most Wanted CEO” card deck seeks to shine a spotlight on "titans of greed." Also, in the aftermath of the UnitedHealthcare shooting, CEO "wanted" posters appeared across New York City, threatening various executives of large companies. An internal police bulletin warned of an online hit list naming eight executives and their salaries. Careful monitoring of social media posts Careful monitoring of social media posts and other sources enables executive protection professionals to analyse data and separate the dangerous threats from the merely negative ones. Sadly, positive support of the UnitedHealthcare shooting was expressed by the 300,000 or so followers of the shooter, who became a celebrity of sorts. A huge outcry of negative sentiment toward the insurance industry led to fear that copycat incidents might occur. “There has been an unprecedented amount of positive support for committing murder,” commented Kucera. Executive protection requests HR executives can be at risk, especially at a time of layoffs or consolidation “Let’s face it, there has been a lot of controversy, from COVID to the Middle East crisis, to the political campaign, and there is negativity on both sides,” says Kucera. “People have opportunities to pick sides, and there is a lot of sentiment going both ways, and there is a small percentage of people who will act aggressively.” Executive protection requests now extend beyond the CEO to include others in the management ranks of companies. Basically, any public-facing executive is at risk, including anyone who makes statements to the press. Human resource (HR) executives can be at risk, especially at a time of layoffs or consolidation. Private information on the Internet Typically, an executive is assigned a single armed operative for protection. The firearm serves primarily as a visual deterrent that hopefully makes a potential perpetrator think twice. “When they plan an event like this, their expectation is that it will be a soft target,” says Kucera. “If there is an officer, it gives them pause.” Controversial or high-profile CEOs are typically protected 24/7, including when they travel with their family. Adding risks is the fact that private information is now posted on the Internet, including where an executive lives and where their children go to school. Internet monitoring Internet monitoring also includes the “dark web,” which includes sometimes dangerous information “We offer social media monitoring, and we advise them to be more careful with what they post,” says Kucera. “We monitor reactions to posts including any that might be threatening. We watch social media carefully if a company announces earnings or a change in their service or product offering.” Internet monitoring also includes the “dark web,” which includes sometimes dangerous information that is intentionally hidden and requires specific software, configurations, or authorisation to access. Own layer of protection Public and government officials can also come under fire in a variety of scenarios. FEMA officials faced threats after the recent floods in the Southeast, for example, among other situations where perceived unfair treatment promotes thoughts of retribution. Although government agencies have their own layer of protection, there are instances when they call on companies such as Allied Universal for additional help. Ad hoc protection for various executives In the aftermath of the UnitedHealthcare shooting, calls to Allied Universal’s Command Centre increased by 600%, reflecting requests for ad hoc protection for various executives. These requests are in addition to the company’s business providing “embedded” operatives that travel with executives all or some of the time. On that side of the business, requests for services are up probably 300%, says Kucera. {##Poll1742194323 - Has the recent increase in violent threats changed your company's view on executive protection?##}
As the pioneering security event in the United States, ISC West is truly the global focal point for bringing together professionals across the physical and cybersecurity landscape. The event seeks to showcase innovation in security technology, nurture professional development, and explore the security implications of today’s connected world. Future of security With the growth of cybersecurity programming and the established Cybersecurity & Connected Internet of Things (IoT) pavilion, ISC West is addressing the future of security head-on. “As the lines between the digital and physical worlds blur, collaboration and shared learning among defenders have never been more critical,” says Mary Beth Shaughnessy, Event Vice President at RX USA, who oversees all aspects of the ISC brand. Shaughnessy previews what’s new at ISC West 2025 and shares other insights in our interview. Q: For long-time attendees at ISC West, what will be the biggest surprise at the 2025 show? Shaughnessy: Long-time attendees know to expect top-tier educational content through the SIA Education@ISC West program (produced by the Security Industry Association (SIA)) in addition to cutting-edge security innovations showcased by 700+ exhibitors. New this year is our focus on technology, training, and education around cyber-physical threats. In today’s connected world, physical and cybersecurity defenders must take a unified, holistic approach to protecting their people, assets, and data. ISC West serves as a bridge between those two worlds, helping organisations tackle the complex security landscape. Q: Presenting a high-profile music concert as part of ISC West is a fun value-add for attendees. Describe how this feature has been embraced by longtime attendees, and the plans for 2025. Shaughnessy: We’re thrilled to announce that the legendary Gin Blossoms will headline the ISC West Concert, sponsored by Wavelynx. This tradition began last year and became a celebrated highlight, offering professionals a chance to unwind and connect with colleagues and peers after a productive day on the show floor. When choosing a performer, we focus on acts that resonate across generations, making the experience both entertaining and memorable for our diverse audience. We are excited to continue this fun and exciting event and networking opportunity. Q: In the past, the education program at ISC West has been seen as secondary to the Expo event. How have you sought to increase the profile of the education program, and what new features will attract more attendees in 2025? Shaughnessy: We’ve expanded the SIA Education@ISC programming from three to four days, now beginning two days before the expo hall opens. These dedicated education days ensure professionals can engage in thoughtful discussions and gain actionable insights without overlapping with the Expo. This year, we’re proud to partner with RSA to introduce a new “IT for Security Professionals” track while also offering our core tracks, including AI & Digital Transformation, Critical Infrastructure & Data Protection, Cybersecurity & IT, InfraGard National Members Alliance @ ISC, and Video Surveillance. We will also be welcoming powerful keynote speakers — Rachel Wilson, Director of Cybersecurity, Morgan Stanley Wealth Management; Will Bernhjelm, Vice President of Security, Mall of America; and Kate Maxwell, Chief Technology Officer, Worldwide Defense & Intelligence, Microsoft. Q: What else is “new” at ISC West in 2025? Shaughnessy: Our educational programming has grown significantly — this year’s SIA Education@ISC program is our most extensive yet, offering more than 115 sessions led by over 200 distinguished experts. With broader and deeper topics, the program emphasises the critical convergence of cyber and physical security, providing unparalleled insights for today’s security professionals. We are also significantly ramping up our cybersecurity offerings and expect to have more than 50 exhibitors in our Cybersecurity & Connected IoT pavilion with names such as Entrust and Ontic. Q: Networking is a critical aspect of ISC West. How are show organisers working to increase networking opportunities? Shaughnessy: Networking remains a top priority at ISC West, with countless opportunities to build valuable connections. Professionals can join peers at popular spots like The Bridge, The Cyber Hub, and the Career Zone (sponsored by: TEECOM). These spaces offer the chance to learn from industry experts, explore the challenges and innovations shaping the security workforce, and engage in dynamic discussions with peers. Also, returning by popular demand, the ISC West Concert, proudly sponsored by Wavelynx, delivers a vibrant evening of music and networking in a relaxed atmosphere. Together, these experiences ensure networking at ISC West is both impactful and memorable. Q: What is the biggest challenge for organisers of ISC West (and related events), and how are the organisers seeking to address the challenges? Shaughnessy: As with most events, there is a lot of pressure on organisers to ensure there’s “something for everyone,” add meaningful value, and introduce fresh, exciting features. At ISC West, we work to raise the bar each year by expanding our content with more thought pioneers, showcasing a broader range of innovative technologies, and fostering additional networking opportunities. Achieving top-quality results is no small task — it demands careful planning, collaboration, and a dedication to continuous improvement. This means actively listening to the needs of our attendees and exhibitors, staying ahead of industry trends, and ensuring we provide an experience that informs, inspires, and connects the security community.
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness platform has been deployed by the Modesto Police Department (PD) in strategic locations throughout the city. This partnership reflects the Modesto Police Department’s commitment to utilising the latest tools to improve public safety and reduce crime in the community. Firearms and instant alerts “We want our community members to feel secure in their work, leisure, and daily lives,” said Cat McFadon, Police Civilian Manager of Modesto PD. “ZeroEyes’ ability to detect firearms and trigger instant alerts will allow us to respond more quickly and efficiently to gun-related threats. With this additional technology in our toolbelt, we’re reinforcing our efforts to drive down crime and make Modesto a safer place for everyone.” Effectiveness of ZeroEyes technology Pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions Modesto, a city of 216,000 residents in Northern California, is known for its progressive law enforcement efforts. The department has a long-standing dedication to equipping its officers with the most advanced technology to support their mission to protect life and property. This pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions, with the goal of expanding its use in key areas such as local schools and the city’s shopping mall. ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to Modesto PD as quickly as 3 to 5 seconds from detection. Modesto PD’s expectations “The Modesto PD’s commitment to increasing public safety through innovative technology aligns perfectly with our mission, and we look forward to the collaboration,” said Mike Lahiff, CEO of ZeroEyes. “We’re confident that ZeroEyes will not only meet but exceed Modesto PD’s expectations, enhancing response times and reducing the impact of gun-related threats.”
KA Beveren is a sports school located in Belgium, known for providing sports education and nurturing many student-athletes. Recently KA Beveren underwent a significant upgrade to its security infrastructure, aiming to improve the safety of students, staff, and facilities. VIVOTEK, the pioneering security solution provider, played a pivotal role in the project. In collaboration with distributor Optima Networks and integrator Educorner bvba, VIVOTEK’s advanced AI solutions, helped KA Beveren achieve a state-of-the-art security system, offering superior monitoring and AI-driven analytics. Challenge KA Beveren faced the challenge of achieving total range across indoor and outdoor spaces KA Beveren faced the challenge of achieving comprehensive coverage across both indoor and outdoor spaces, eliminating blind spots and ensuring continuous security. The security solution was designed to deter vandalism and unauthorised access, creating a safer environment for both students and staff. Additionally, it plays a crucial role in monitoring and reducing incidents of bullying and physical altercations, aiding in the identification of individuals involved in such events. The solution was required to detect security threats in real time, providing actionable insights to administrators and security personnel. Due to the school's large size and dynamic environment, the solution had to offer both wide-ranging and detailed security coverage. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. Provide comprehensive coverage with minimal blind spots. Solutions VIVOTEK partnered with Educorner bvba to implement a customised solution centred around advanced camera which included Fixed Dome, Fisheye, Multi-Sensor Panoramic cameras, and integration with Network Optix VMS. Placed Fixed Dome cameras in key locations such as entry points, hallways, and high-traffic areas, these cameras ensure robust monitoring of critical areas. Their design is built to withstand the harsh environmental conditions typical of sports facilities. With VIVOTEK’s AI analytics, these cameras can distinguish between humans and vehicles, effectively reducing false alarms and improving reliability. Fisheye Cameras were strategically mounted at the corners of buildings, maximising coverage while minimising the number of cameras required. Their wide-angle design allows the school to reduce installation complexity and cost. These fisheye cameras, in combination with Network Optix’s dewarping technology, provide multiple views from a single device, offering comprehensive coverage of large areas. This innovative setup replaces the need for multiple Fixed Dome cameras or even PTZ cameras, enhancing efficiency while maintaining high-quality coverage. Multi-Sensor Panoramic Cameras offers a 180-degree view, and ideal for monitoring expansive outdoor areas such as sports fields and parking lots. With their multi-sensor design, the cameras deliver a seamless panoramic image, ensuring every corner is covered. Built-in AI analytics enable real-time detection of unusual activities, further enhancing the system’s effectiveness. To maximise the utility of VIVOTEK’s surveillance system, the project incorporated the Network Optix video management system (VMS). The VMS’s intuitive interface, paired with the Deep Search Plugin, enhances the security team’s ability to quickly locate specific individuals or incidents across the network. The AI-driven search tool filters video based on attributes such as gender, age group (adult/kid), or even body parts, allowing for more efficient and accurate investigations. Benefits VIVOTEK’s AI solution has significantly enhanced the security of KA Beveren Sports School, offering several key benefits: Enhanced Safety: The advanced AI analytics integrated into VIVOTEK cameras provide real-time threat detection, allowing security personnel to swiftly address potential security incidents. Comprehensive Coverage: With a strategic mix of Fixed Dome, Fisheye and Multi-Sensor Panoramic cameras, the school enjoys full coverage, ensuring that no area is left unmonitored. Efficient Monitoring: The Network Optix VMS, enriched with the Deep Search Plugin, simplifies the monitoring process, enabling the security team to respond rapidly with accurate and specific information. Future-Proofing: The scalability of the system ensures that KA Beveren’s security infrastructure can evolve with future needs and challenges, providing a long-term solution that grows with the institution. Results and customer feedback "As TAC at KA Beveren Sports School, my focus is on ensuring a secure and supportive learning environment for both students and staff. With VIVOTEK’s surveillance system now in place, we’ve significantly raised the level of safety on campus. The system is reliable and easy for our team to manage, which lets us focus on what we do best: providing quality education. Working with Educorner bvba on this project was smooth from start to finish, and we now have full confidence that our school is well-protected," Pascal Verleyen, Technisch Adviseur-Coördinator, KA Beveren Sports School. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
Battery Energy Storage Systems (BESS) are essential for storing renewable energy and ensuring grid stability. However, their implementation comes with inherent risks, particularly related to lithium-ion battery fires. BESS fires can start from thermal runaway, where one cell failure can trigger a cascade of overheating, leading to fires that are difficult to extinguish and can last for hours or even days. Should a fire breakout, hazardous gases would release from the batteries, posing health risks to nearby communities and causing environmental damage through soil and water contamination. Traditional detection methods BESS fires have the potential for huge disruptions to locals via property damage and even evacuations In severe cases, BESS fires have the potential for huge disruptions to locals through property damage and even evacuations. Traditional detection methods such as flame detectors often fail in the early stages of a BESS fire due to their reliance on visible flames or smoke, which might not be immediately present. Where flame detectors fall short, thermal imaging cameras can significantly improve protection and prevent fires before they ever reach combustion. Advantages of thermal cameras for BESS Thermal cameras detect the heat signature from the onset of thermal runaway long before visible flames or smoke appear, allowing for preemptive action to mitigate risks. While flame detectors react to events that have already happened, a fixed thermal camera such as the FLIR A700F Advance Smart Sensor provides 24/7 surveillance by continuously monitoring for temperature anomalies that could indicate an impending fire, thus enabling early intervention. FLIR cameras are designed for easy integration into broader safety and control systems, allowing for automated responses such as activating suppression systems that enhance response times and efficiency. Comparison with other detection methods FLIR thermal imaging cameras can detect heat in low light and see the start of embers as they heat up While flame detectors are designed to detect visible fire, they may miss smouldering or hidden fires—meaning an alert may not be tripped until the fire has escalated to a dangerous level. FLIR thermal imaging cameras can detect heat in low light and see the beginnings of embers as they heat up surrounding materials, even when there's no visible sign of fire. This early detection can prevent escalation or at least minimise damage by providing critical time for action before fires get out of control. Another advantage of thermal cameras is their ability to monitor large areas or multiple battery racks simultaneously, providing comprehensive coverage which is often challenging for point-specific flame detectors. Conclusion Incorporating FLIR thermal monitoring into BESS installations not only addresses the critical safety concerns associated with battery fires but also offers a proactive, reliable, and technologically advanced solution. By choosing a FLIR fixed thermal solution, they ensure that the energy storage systems are safeguarded with the industry's pioneering thermal imaging technology, protecting both the investment and the community from the devastating effects of BESS fires.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announces that its proactive gun detection and intelligent situational awareness solution has been deployed by Berrien Springs Public Schools (BSPS) in Michigan to mitigate gun-related violence. The company and district are also partnering to present ‘Lunch & Learn: Protecting Schools from Active Shooter Events,’ an in-depth safety and security seminar, ZeroEyes demo for surrounding schools, and Q&A to take place May 12th at 11:30 am in the STEM Central Building. Safe learning environment Located in the southwestern corner of the state, BSPS’ main campus sits in the heart of Berrien County and includes six schools: Mars Elementary, Sylvester Elementary, Berrien Springs Middle School, Berrien Springs High School, Virtual Academy, and Discovery Academy. Additionally, beyond its main campus, the district supports 28 additional learning centers statewide through an alternative learning program that helps students earn their high school diploma under the Michigan Merit Curriculum guidelines. The district has implemented ZeroEyes to further strengthen its multilayered security approach Serving approximately 7,000 students and employing 600 staff members in total, BSPS prioritises safety across all its campuses. Each school features secure vestibules and locked entry points, while the main campus is staffed with a dedicated school resource officer (SRO). The district has implemented ZeroEyes to further strengthen its multilayered security approach and ensure a safe learning environment for students and staff statewide. Engaging educational environment “At Berrien Springs Public Schools, student and staff safety are a priority as we continuously improve attendance, achievement, and engagement,” said Superintendent Dr. Thomas Bruce. “Implementing ZeroEyes allows us to take a proactive approach to security, ensuring that students and staff can focus on teaching and learning without distraction. This technology aligns with our commitment to creating an outstanding safe and engaging educational environment.” If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational awareness software layers onto BSPS’ existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Secure learning environment According to the incidents analysed by the ZeroEyes Gun Violence Research Center, Michigan has seen more gun-related incidents than the national average in the past 365 days. “We are extremely proud to work with Berrien Springs Public Schools to further protect students and teachers throughout the state of Michigan,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “The district’s dedication to student success is showcased by its unwavering commitment to safety. I applaud their decision to implement proactive measures to create a secure learning environment.”
Dubai Taxi Corporation (DTC) Limousine Service offers a luxury chauffeur-driven vehicle designed to cater to the needs of visitors, business professionals, and the tourism industry. Their services prominently support hotels, tour operators, airlines, corporate clients, and government agencies. Operating 24/7, they aim to offer enriched transport services across Dubai and other Emirates. Challenges With the increasing demand for hygiene and touchless services amid the pandemic, DTC required solutions that: Provided touchless access for enhanced safety Ensured quick and seamless service Allowed tracking of drivers accessing accommodations Solution To address these concerns, Matrix recommended a Face Recognition-based Access Control Solution that seamlessly integrated with IP cameras. This setup not only provided contactless access but also ensured efficient tracking of driver movements within the facility. Products Offered: COSEC VEGA CAX: Advanced Face Recognition-based Door Controller SATATYA IP Camera: High-quality surveillance for monitoring access points COSEC CENTRA Platform: Centralised access control and monitoring system COSEC CENTRA FR: Facial Recognition Users’ Database Management COSEC CENTRA ACM: Access Control Software Module for streamlined operations Key Features Implemented: Touchless Access Control: Enhanced hygiene and safety Seamless Integration with IP Cameras: For real-time monitoring Turnstile Integration: Prevents unauthorised tailgating Swift and Efficient Access Control: Ensures smooth entry and exit Results By deploying Matrix's Contactless Access Control Solutions, Dubai Taxi Corporation successfully achieved the following: Hygienic and secure access control with face recognition technology Faster and more efficient entry management Accurate tracking of driver accommodations Minimised unauthorised access risks
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Union Community School District (UCSD) across La Porte City and Dysart, Iowa to protect students and staff from gun-related violence. Formed through the merger of the La Porte City Community School District and the Dysart-Geneseo Community School District, UCSD serves communities covering Benton, Black Hawk, and Tama counties, including Buckingham, Dysart, Garrison, Geneseo, La Porte City, and Mount Auburn. Multilayered approach ZeroEyes is the latest addition to the district’s security methods, enhancing its multilayered approach The district educates approximately 965 students across a preschool, two elementary schools, a middle school, and a high school. ZeroEyes is the latest addition to the district’s security methods, enhancing its multilayered approach to protecting students and staff from gun-related threats and ensuring a safe learning environment. Safety and security "It is a privilege for the Union Community School district to be the only district in eastern Iowa to collaborate with a well-known, respected company like ZeroEyes to enhance our school environments,” said John Howard, superintendent of UCSD. “Our number one goal has always been and will continue to be, the safety and security of our staff and students. Adding the equipment, technology, and personal expertise associated with ZeroEyes to our current measures further helps us achieve this goal on a daily basis. I am proud of all those who made this possible." Digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto UCSD’s cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto UCSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Advanced security methods “Every student deserves a safe learning environment,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “It's inspiring to see communities such as Union Community School District emphasise the importance of advanced security methods through the deployment of proactive measures such as ZeroEyes.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness platform has been deployed by the Modesto Police Department (PD) in strategic locations throughout the city. This partnership reflects the Modesto Police Department’s commitment to utilising the latest tools to improve public safety and reduce crime in the community. Firearms and instant alerts “We want our community members to feel secure in their work, leisure, and daily lives,” said Cat McFadon, Police Civilian Manager of Modesto PD. “ZeroEyes’ ability to detect firearms and trigger instant alerts will allow us to respond more quickly and efficiently to gun-related threats. With this additional technology in our toolbelt, we’re reinforcing our efforts to drive down crime and make Modesto a safer place for everyone.” Effectiveness of ZeroEyes technology Pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions Modesto, a city of 216,000 residents in Northern California, is known for its progressive law enforcement efforts. The department has a long-standing dedication to equipping its officers with the most advanced technology to support their mission to protect life and property. This pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions, with the goal of expanding its use in key areas such as local schools and the city’s shopping mall. ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to Modesto PD as quickly as 3 to 5 seconds from detection. Modesto PD’s expectations “The Modesto PD’s commitment to increasing public safety through innovative technology aligns perfectly with our mission, and we look forward to the collaboration,” said Mike Lahiff, CEO of ZeroEyes. “We’re confident that ZeroEyes will not only meet but exceed Modesto PD’s expectations, enhancing response times and reducing the impact of gun-related threats.”
KA Beveren is a sports school located in Belgium, known for providing sports education and nurturing many student-athletes. Recently KA Beveren underwent a significant upgrade to its security infrastructure, aiming to improve the safety of students, staff, and facilities. VIVOTEK, the pioneering security solution provider, played a pivotal role in the project. In collaboration with distributor Optima Networks and integrator Educorner bvba, VIVOTEK’s advanced AI solutions, helped KA Beveren achieve a state-of-the-art security system, offering superior monitoring and AI-driven analytics. Challenge KA Beveren faced the challenge of achieving total range across indoor and outdoor spaces KA Beveren faced the challenge of achieving comprehensive coverage across both indoor and outdoor spaces, eliminating blind spots and ensuring continuous security. The security solution was designed to deter vandalism and unauthorised access, creating a safer environment for both students and staff. Additionally, it plays a crucial role in monitoring and reducing incidents of bullying and physical altercations, aiding in the identification of individuals involved in such events. The solution was required to detect security threats in real time, providing actionable insights to administrators and security personnel. Due to the school's large size and dynamic environment, the solution had to offer both wide-ranging and detailed security coverage. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. Provide comprehensive coverage with minimal blind spots. Solutions VIVOTEK partnered with Educorner bvba to implement a customised solution centred around advanced camera which included Fixed Dome, Fisheye, Multi-Sensor Panoramic cameras, and integration with Network Optix VMS. Placed Fixed Dome cameras in key locations such as entry points, hallways, and high-traffic areas, these cameras ensure robust monitoring of critical areas. Their design is built to withstand the harsh environmental conditions typical of sports facilities. With VIVOTEK’s AI analytics, these cameras can distinguish between humans and vehicles, effectively reducing false alarms and improving reliability. Fisheye Cameras were strategically mounted at the corners of buildings, maximising coverage while minimising the number of cameras required. Their wide-angle design allows the school to reduce installation complexity and cost. These fisheye cameras, in combination with Network Optix’s dewarping technology, provide multiple views from a single device, offering comprehensive coverage of large areas. This innovative setup replaces the need for multiple Fixed Dome cameras or even PTZ cameras, enhancing efficiency while maintaining high-quality coverage. Multi-Sensor Panoramic Cameras offers a 180-degree view, and ideal for monitoring expansive outdoor areas such as sports fields and parking lots. With their multi-sensor design, the cameras deliver a seamless panoramic image, ensuring every corner is covered. Built-in AI analytics enable real-time detection of unusual activities, further enhancing the system’s effectiveness. To maximise the utility of VIVOTEK’s surveillance system, the project incorporated the Network Optix video management system (VMS). The VMS’s intuitive interface, paired with the Deep Search Plugin, enhances the security team’s ability to quickly locate specific individuals or incidents across the network. The AI-driven search tool filters video based on attributes such as gender, age group (adult/kid), or even body parts, allowing for more efficient and accurate investigations. Benefits VIVOTEK’s AI solution has significantly enhanced the security of KA Beveren Sports School, offering several key benefits: Enhanced Safety: The advanced AI analytics integrated into VIVOTEK cameras provide real-time threat detection, allowing security personnel to swiftly address potential security incidents. Comprehensive Coverage: With a strategic mix of Fixed Dome, Fisheye and Multi-Sensor Panoramic cameras, the school enjoys full coverage, ensuring that no area is left unmonitored. Efficient Monitoring: The Network Optix VMS, enriched with the Deep Search Plugin, simplifies the monitoring process, enabling the security team to respond rapidly with accurate and specific information. Future-Proofing: The scalability of the system ensures that KA Beveren’s security infrastructure can evolve with future needs and challenges, providing a long-term solution that grows with the institution. Results and customer feedback "As TAC at KA Beveren Sports School, my focus is on ensuring a secure and supportive learning environment for both students and staff. With VIVOTEK’s surveillance system now in place, we’ve significantly raised the level of safety on campus. The system is reliable and easy for our team to manage, which lets us focus on what we do best: providing quality education. Working with Educorner bvba on this project was smooth from start to finish, and we now have full confidence that our school is well-protected," Pascal Verleyen, Technisch Adviseur-Coördinator, KA Beveren Sports School. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
Battery Energy Storage Systems (BESS) are essential for storing renewable energy and ensuring grid stability. However, their implementation comes with inherent risks, particularly related to lithium-ion battery fires. BESS fires can start from thermal runaway, where one cell failure can trigger a cascade of overheating, leading to fires that are difficult to extinguish and can last for hours or even days. Should a fire breakout, hazardous gases would release from the batteries, posing health risks to nearby communities and causing environmental damage through soil and water contamination. Traditional detection methods BESS fires have the potential for huge disruptions to locals via property damage and even evacuations In severe cases, BESS fires have the potential for huge disruptions to locals through property damage and even evacuations. Traditional detection methods such as flame detectors often fail in the early stages of a BESS fire due to their reliance on visible flames or smoke, which might not be immediately present. Where flame detectors fall short, thermal imaging cameras can significantly improve protection and prevent fires before they ever reach combustion. Advantages of thermal cameras for BESS Thermal cameras detect the heat signature from the onset of thermal runaway long before visible flames or smoke appear, allowing for preemptive action to mitigate risks. While flame detectors react to events that have already happened, a fixed thermal camera such as the FLIR A700F Advance Smart Sensor provides 24/7 surveillance by continuously monitoring for temperature anomalies that could indicate an impending fire, thus enabling early intervention. FLIR cameras are designed for easy integration into broader safety and control systems, allowing for automated responses such as activating suppression systems that enhance response times and efficiency. Comparison with other detection methods FLIR thermal imaging cameras can detect heat in low light and see the start of embers as they heat up While flame detectors are designed to detect visible fire, they may miss smouldering or hidden fires—meaning an alert may not be tripped until the fire has escalated to a dangerous level. FLIR thermal imaging cameras can detect heat in low light and see the beginnings of embers as they heat up surrounding materials, even when there's no visible sign of fire. This early detection can prevent escalation or at least minimise damage by providing critical time for action before fires get out of control. Another advantage of thermal cameras is their ability to monitor large areas or multiple battery racks simultaneously, providing comprehensive coverage which is often challenging for point-specific flame detectors. Conclusion Incorporating FLIR thermal monitoring into BESS installations not only addresses the critical safety concerns associated with battery fires but also offers a proactive, reliable, and technologically advanced solution. By choosing a FLIR fixed thermal solution, they ensure that the energy storage systems are safeguarded with the industry's pioneering thermal imaging technology, protecting both the investment and the community from the devastating effects of BESS fires.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announces that its proactive gun detection and intelligent situational awareness solution has been deployed by Berrien Springs Public Schools (BSPS) in Michigan to mitigate gun-related violence. The company and district are also partnering to present ‘Lunch & Learn: Protecting Schools from Active Shooter Events,’ an in-depth safety and security seminar, ZeroEyes demo for surrounding schools, and Q&A to take place May 12th at 11:30 am in the STEM Central Building. Safe learning environment Located in the southwestern corner of the state, BSPS’ main campus sits in the heart of Berrien County and includes six schools: Mars Elementary, Sylvester Elementary, Berrien Springs Middle School, Berrien Springs High School, Virtual Academy, and Discovery Academy. Additionally, beyond its main campus, the district supports 28 additional learning centers statewide through an alternative learning program that helps students earn their high school diploma under the Michigan Merit Curriculum guidelines. The district has implemented ZeroEyes to further strengthen its multilayered security approach Serving approximately 7,000 students and employing 600 staff members in total, BSPS prioritises safety across all its campuses. Each school features secure vestibules and locked entry points, while the main campus is staffed with a dedicated school resource officer (SRO). The district has implemented ZeroEyes to further strengthen its multilayered security approach and ensure a safe learning environment for students and staff statewide. Engaging educational environment “At Berrien Springs Public Schools, student and staff safety are a priority as we continuously improve attendance, achievement, and engagement,” said Superintendent Dr. Thomas Bruce. “Implementing ZeroEyes allows us to take a proactive approach to security, ensuring that students and staff can focus on teaching and learning without distraction. This technology aligns with our commitment to creating an outstanding safe and engaging educational environment.” If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational awareness software layers onto BSPS’ existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Secure learning environment According to the incidents analysed by the ZeroEyes Gun Violence Research Center, Michigan has seen more gun-related incidents than the national average in the past 365 days. “We are extremely proud to work with Berrien Springs Public Schools to further protect students and teachers throughout the state of Michigan,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “The district’s dedication to student success is showcased by its unwavering commitment to safety. I applaud their decision to implement proactive measures to create a secure learning environment.”
Dubai Taxi Corporation (DTC) Limousine Service offers a luxury chauffeur-driven vehicle designed to cater to the needs of visitors, business professionals, and the tourism industry. Their services prominently support hotels, tour operators, airlines, corporate clients, and government agencies. Operating 24/7, they aim to offer enriched transport services across Dubai and other Emirates. Challenges With the increasing demand for hygiene and touchless services amid the pandemic, DTC required solutions that: Provided touchless access for enhanced safety Ensured quick and seamless service Allowed tracking of drivers accessing accommodations Solution To address these concerns, Matrix recommended a Face Recognition-based Access Control Solution that seamlessly integrated with IP cameras. This setup not only provided contactless access but also ensured efficient tracking of driver movements within the facility. Products Offered: COSEC VEGA CAX: Advanced Face Recognition-based Door Controller SATATYA IP Camera: High-quality surveillance for monitoring access points COSEC CENTRA Platform: Centralised access control and monitoring system COSEC CENTRA FR: Facial Recognition Users’ Database Management COSEC CENTRA ACM: Access Control Software Module for streamlined operations Key Features Implemented: Touchless Access Control: Enhanced hygiene and safety Seamless Integration with IP Cameras: For real-time monitoring Turnstile Integration: Prevents unauthorised tailgating Swift and Efficient Access Control: Ensures smooth entry and exit Results By deploying Matrix's Contactless Access Control Solutions, Dubai Taxi Corporation successfully achieved the following: Hygienic and secure access control with face recognition technology Faster and more efficient entry management Accurate tracking of driver accommodations Minimised unauthorised access risks
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Union Community School District (UCSD) across La Porte City and Dysart, Iowa to protect students and staff from gun-related violence. Formed through the merger of the La Porte City Community School District and the Dysart-Geneseo Community School District, UCSD serves communities covering Benton, Black Hawk, and Tama counties, including Buckingham, Dysart, Garrison, Geneseo, La Porte City, and Mount Auburn. Multilayered approach ZeroEyes is the latest addition to the district’s security methods, enhancing its multilayered approach The district educates approximately 965 students across a preschool, two elementary schools, a middle school, and a high school. ZeroEyes is the latest addition to the district’s security methods, enhancing its multilayered approach to protecting students and staff from gun-related threats and ensuring a safe learning environment. Safety and security "It is a privilege for the Union Community School district to be the only district in eastern Iowa to collaborate with a well-known, respected company like ZeroEyes to enhance our school environments,” said John Howard, superintendent of UCSD. “Our number one goal has always been and will continue to be, the safety and security of our staff and students. Adding the equipment, technology, and personal expertise associated with ZeroEyes to our current measures further helps us achieve this goal on a daily basis. I am proud of all those who made this possible." Digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto UCSD’s cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto UCSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Advanced security methods “Every student deserves a safe learning environment,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “It's inspiring to see communities such as Union Community School District emphasise the importance of advanced security methods through the deployment of proactive measures such as ZeroEyes.”


Round table discussion
A software platform designed to centralise and manage various physical security systems within an organisation used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favour because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
Products


White papers

Unlocking wide-angle camera dewarping
Download
Levelling up with campus safety
Download
The future of healthcare security is connectivity
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Video technology: making cities safer & improving lives
Download
11 advantages of a combined system for access control and intrusion
Download
Assessing the total cost of ownership (TCO) of VMS and NVR systems
Download
2025 Trends in video surveillance
Download
The role of artificial intelligence to transform video imaging
Download
Are you ready for an on-site emergency?
Download
Troubleshooting IP video systems
Download
AI in security solution
Download
VSS - Top 4 questions to get you started
Download
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download
Unlocking wide-angle camera dewarping
Download
Levelling up with campus safety
Download
The future of healthcare security is connectivity
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Video technology: making cities safer & improving lives
Download
11 advantages of a combined system for access control and intrusion
Download
Assessing the total cost of ownership (TCO) of VMS and NVR systems
Download
2025 Trends in video surveillance
Download
The role of artificial intelligence to transform video imaging
Download
Are you ready for an on-site emergency?
Download
Troubleshooting IP video systems
Download
AI in security solution
Download
VSS - Top 4 questions to get you started
Download
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download
Unlocking wide-angle camera dewarping
Download

Videos
Security cameras: Manufacturers & Suppliers
- Hikvision Security cameras
- Dahua Technology Security cameras
- Hanwha Vision Security cameras
- LILIN Security cameras
- AV Costar Security cameras
- Bosch Security cameras
- Visionhitech Security cameras
- Pelco Security cameras
- Axis Communications Security cameras
- eneo Security cameras
- Vicon Security cameras
- Messoa Security cameras
- Avigilon Security cameras
- Sony Security cameras
- Panasonic Security cameras
- VIVOTEK Security cameras
- Verkada Security cameras
- Honeywell Security Security cameras
- FLIR Systems Security cameras
- Bolide Security cameras

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download