Security communication
OPSWAT, a global pioneer in critical infrastructure protection established in the U.S., announced its acquisition of Fend Incorporated. Fend is a pioneering data pipeline and cybersecurity company dedicated to securing operational technology (OT) against cyber threats, ransomware, and other evolving risks. Based in Arlington, Virginia, Fend is known for its expertise in protecting U.S. government agencies, utilities, oil and gas, manufacturing, and other critical industries where air-gappe...
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security...
Matrix Comsec, a pioneer in Security and Telecommunication solutions, was honoured with the CII Industrial Innovation Award 2024, recognising Matrix as one among the Top 75 Most Innovative Companies in India. The award was presented at the CII Industrial Innovation Awards ceremony held in New Delhi on 13th December 2024. Instituted by CII in 2014, the CII Industrial Innovation Awards celebrate visionary enterprises across various industry segments. These prestigious awards aim to recognise and...
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. Regulatory approvals The tran...
North Yorkshire and Devon & Cornwall are the latest police forces to become ECHO-connected, having joined in August and November 2024, respectively. Their addition brings the total number of ECHO-connected police forces in the UK to 13, with ECHO enabling the efficient handling of over 70,000 Intruder and Hold-up Alarms incidents annually, improving police response times and outcomes for victims. Pioneering Echo-connected alarm receiving centres (ARCs) including ADT, Secom, Cougar/K-SOC and...
HackerOne, the cybersecurity company dedicated to eliminating vulnerabilities through continuous testing, announced updates to its intelligent copilot Hai. Hai’s new program insights synthesise data across a customer’s programs, giving them instant understanding and actionable summaries of performance, results, and trends. Now more seamlessly integrated into workflows, Hai continues to help customers save time by making it easy to understand comprehensive program data, imp...
News
VIVOTEK (3454-TW), the global pioneering security solution provider, has once again demonstrated its outstanding commitment to sustainability. Participating for the first time in the 17th Taiwan Corporate Sustainability Awards (TCSA), VIVOTEK emerged victorious, earning the Sustainability Report Award for the Information, Communication, and Broadcasting Industry and the Taiwan Corporate Sustainability Excellence Award. These recognitions showcase VIVOTEK's remarkable success in corporate governance, environmental protection, and social responsibility, affirming its dedication to sustainable growth. Pioneering sustainability with dual recognition “For over seven years, VIVOTEK has independently published sustainability reports, actively driving and disclosing our internal sustainability initiatives,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the Global Marketing Division. “These awards not only recognise our integrity and efforts in presenting operational performance, environmental data, and social impact but also serve as a strong motivation for us to continue advancing on the path of sustainable development.” Driving sustainability through AI innovation VIVOTEK has advanced AI-powered security keys built on cutting-edge AI and computing technologies VIVOTEK delivers advanced AI-powered security solutions built on cutting-edge AI and edge computing technologies. Beyond innovation, the company drives green initiatives, reduces its carbon footprint, and fosters a sustainable, supportive workplace. Committed to social responsibility, VIVOTEK leads the security industry’s sustainability efforts through its ‘Safety Map’ initiative. For four years, employees have formed security teams to enhance safety in neighbourhoods, care centres, and schools with on-site assessments and improvement plans. In 2024, VIVOTEK will expand its efforts to Hualien’s Dacheng Village, where it will help improve local safety environments and support cultural preservation and tourism revitalisation. These actions reflect its dedication to sustainability, community well-being, and lasting societal contributions. Security sustainability as a foundation for social impact VIVOTEK proudly received two prestigious honours at the Taiwan Corporate Sustainability Awards, highlighting its dedication to sustainable practices. These accolades inspire the company to deepen its internal efforts and mark the start of an exciting new chapter. Building on this achievement, VIVOTEK aims to strengthen its mission of becoming the world’s most trusted smart security brand. By aligning with global market needs and fostering collaboration with customers, partners, and employees, VIVOTEK is committed to shaping a sustainable future founded on mutual trust and shared success.
SecurityBridge, the Cybersecurity Command Centre for SAP, announced a strategic partnership with Altum Strategy Group (Altum), a pioneering advisory firm specialising in Responsible Transformation, Intelligence, Data & Technology, Operational Excellence, and Risk Management. This partnership will empower Altum’s small to mid-sized clients with SecurityBridge’s comprehensive SAP-native cybersecurity platform, providing a holistic approach to solving their SAP security challenges. Benefits from Altum’s clients By adding SecurityBridge’s solution, Altum will now offer its customers the ability to address SAP security with Altum’s deep expertise and strategic thinking and SecurityBridge’s cybersecurity solution. Altum’s clients will benefit from: A comprehensive approach to SAP security, ensuring that strategic and technical elements are effectively addressed. Access to SAP security senior pioneers and a highly experienced team that can implement real-world, actionable solutions. Closing critical control gaps, enabling organisations to meet compliance goals while implementing best practices to mitigate risks associated with SAP security gaps. SAP security challenges “SecurityBridge expands Altum’s cybersecurity offering,” said Matthew Gantner, CEO of Altum Strategy Group. “Their solution perfectly complements our advisory services, addressing the urgent need for advanced SAP security in today’s threat landscape." "Our clients can now leverage an industry-pioneering solution to overcome SAP security challenges, enhance resilience, and ensure business continuity.” Challenges and mitigate risks Combined solution will help organisations overcome challenges and mitigate risks in business operations Integrating SecurityBridge’s SAP-native cybersecurity platform into Altum’s advisory services also supports Altum’s Risk, Resilience, and Governance framework. This combined solution will help organisations overcome challenges and mitigate risks in business operations and IT systems, ensuring business continuity and fostering enterprise-wide resilience in an ever-changing cybersecurity landscape. SAP security solution “We are proud to partner with Altum Strategy Group,” said Bill Oliver, Managing Director, Americas, SecurityBridge. “Our SAP security solution perfectly aligns with Altum’s focus on helping businesses achieve responsible transformation and operational excellence." "Together, we will provide a comprehensive solution that addresses the strategic and technical sides of SAP security.”
Optalysys, a company enabling the future of secure computing, has partnered with Zama, the open-source cryptography company building state-of-the-art FHE solutions for blockchain and AI, to advance the development of Fully Homomorphic Encryption (FHE). The partnership will see the integration of Zama’s FHE solution with Optalysys’ hardware acceleration product range, Enable, to expedite FHE adoption for its customers. Zama’s software solutions Zama’s software solutions provide powerful tools that enable a wide range of cutting-edge applications for FHE Zama’s software solutions provide powerful tools that enable a wide range of cutting-edge applications for FHE, including encrypted machine learning and advanced confidentiality in blockchain smart contracts. As sectors worldwide, such as financial services, healthcare and defence, adopt and integrate more digital technologies, the risks associated with cyber threats grow significantly. Cybersecurity solutions Current cybersecurity solutions have significant limitations in protecting data in use, which is why the adoption of privacy-enhancing technologies (PETs) such as FHE, are fundamental for companies in protecting sensitive data. FHE is an advanced, quantum-resilient cryptography method that allows encrypted data to be processed without ever needing to be decrypted. It allows organisations to process data whilst maintaining privacy, opening up opportunities for safe collaboration across industries, even in untrusted environments. Use of Zama products The alliance aims to bridge the gap in FHE adoption by managing its high computational demands The partnership aims to bridge the gap in FHE adoption by addressing its historically high computational demands. Integrating Zama’s software solutions with Optalysys’ Enable technology will maintain the ease of use of Zama products for developers while providing access to faster and more scalable FHE application deployments. It will allow the use of encrypted data for high-security applications across various sectors. Dr Nick New, CEO of Optalysys, said, “Our partnership with Zama is a significant step for us as we continue to accelerate the development of FHE. Historically, scaling FHE applications has been a challenge due to its demand for specialist infrastructure and computing power. Our work with Zama aims to overcome this barrier and enable us to develop this revolutionary technology at a rapid pace.” Benefits of machine learning applications Rand Hindi, CEO, Zama, said, “At Zama, our mission is to equip developers with the best FHE tools — tools that are easy to use, practical, and fast. Our collaboration with Optalysys is an exciting step toward making FHE faster, a crucial milestone in our journey to make this technology ubiquitous." “We believe that this acceleration benefits machine learning applications and is equally transformative in the blockchain space, a key focus for us, where FHE has the unique ability to resolve the long-standing tension between transparency and confidentiality, unlocking new possibilities for privacy-preserving innovation onchain."
Datamatics, a global Digital Technologies, Operations, and Experiences company, has achieved the Cyber Essentials and Cyber Essentials Plus certifications. Backed by the UK Government's National Cyber Security Centre (NCSC), these certifications validate Datamatics' robust security practices and position the company as a preferred partner for enterprises seeking trusted and secure solutions. Datamatics' proactive approach The process involved a specific evaluation of Datamatics' defences against various scenarios As cybersecurity becomes increasingly vital in maintaining trust and ensuring business continuity, these certifications reflect Datamatics' proactive approach to addressing common cyber threats. Audited by Techforce Cyber, an independent third-party auditor, the process involved a thorough evaluation of Datamatics' defences against various cyber-attack scenarios, confirming the company's adherence to stringent security standards. Key highlights: Comprehensive Security Audit: The certification process assessed over 100 criteria across five key areas: Firewalls, Secure Configuration, Security Update Management, User Access Control, and Malware Protection. Global Coverage: The certifications apply to Datamatics' operations in both the UK and India, ensuring consistent security practices across regions. Preferred Partner Eligibility: Achieving these certifications enhances Datamatics' credibility as a trusted partner, giving clients greater confidence in the company's ability to deliver secure, reliable services. Highest cybersecurity standards Rahul Kanodia, Vice Chairman and CEO of Datamatics, said: "Cybersecurity is not just a necessity — it is essential to maintaining business integrity. Achieving the Cyber Essentials and Cyber Essentials Plus certifications reinforces our commitment to safeguarding customer data and maintaining the highest levels of security across our global operations. This recognition strengthens Datamatics' position as a trusted, secure partner for businesses worldwide." Gopal Ranjan, Global Head-Quality and DPO at Datamatics, added: "This recognition follows a detailed assessment by Techforce Cyber, covering more than 100 technical controls to ensure we meet the highest cybersecurity standards. It highlights our dedication to protecting client data and reinforces the trust our customers place in us to deliver secure, dependable solutions." Implementation of the AIMS framework Additionally, Datamatics has recently become one of the first global organisations to receive the ISO 42001:2023 certification, recognising its implementation of the Artificial Intelligence Management System (AIMS) framework. By attaining these certifications, Datamatics sets a benchmark for cybersecurity excellence, reinforcing its position as a preferred partner for enterprises that prioritise secure and trusted digital solutions.
inter airport Southeast Asia, the premier trade exhibition and conference for airport innovation and technology in Asia, will return to Singapore from 25 to 27 March 2025 at the Marina Bay Sands. The 8th edition is expected to bring together over 3,500 representatives of the aviation industry in Asia, influencers in the airports and airlines community, and 150+ exhibitors, including world-class solution providers and airport equipment suppliers, to connect, find synergies, build partnerships, and innovate. Groundbreaking innovations As the aviation industry advances and new airport projects and investments surge globally, groundbreaking innovations are essential to drive its transformation. Themed “Airport Operations for Tomorrow” conversations at the exhibition and conference will highlight innovation, technology, and sustainable solutions to optimise terminal and ramp operations of the future. Asia driving majority in airport projects APAC now boasts 575 existing or new airport projects, valued at a staggering USD 488 billion With visitor arrivals projected to reach 564 million in the Asia Pacific, the region is now positioned at the forefront of significant airport development, pioneering the global aviation recovery. APAC currently boasts 575 existing or new airport projects, valued at a staggering USD 488 billion, while the investment at existing airports amounts to 170 projects, valued at USD 217 billion. Construction of new airports “Thailand is one of the high growths in emerging aviation market in Asia-Pacific. The passenger volume is expected to double by 2032, and Thailand will be one of the top 10 markets in total passenger traffic by 2042." "To manage the increased passenger capacity, AOT developed a strategic master plan that includes the construction of new airports, expansion of existing facilities, and upgrades to key infrastructure to enhance capacity to accommodate 240 million annual passengers (MAP) by 2032,” said Latchida Apaphant, EVP, Foreign Affair, Airports of Thailand PLC (AOT). Complexity of airport operations Apaphant added: “To make Thailand a regional aviation hub, and a goal to bring Suvarnabhumi International Airport rank among the top airport operators by 2037, massive investments are also be made to procure automated technology and biometric identification system to reduce international passenger processing times." "Given the increasing complexity of airport operations and the need to innovate, inter airport Southeast Asia conference offers timely discussions and an exhibition to explore emerging technologies for the future of airports.” C-suite speakers Ms Latchida will join some of the C-suite speakers confirmed at inter airport Southeast Asia conference: Ricia Montejo, Head, Customer Experience, Aboitiz GMR-Megawide Cebu Airport Corporation Ibrahim Mohd Salleh, Chief Operating Officer, Aerodarat Services Sdn Bhd - a wholly owned subsidiary of Malaysia Aviation Group Lye Teck Tan, EVP, Safety & Security, Changi Airport Group Saurabh Dalvi, Head of Operations, Mumbai, Goa, Hyderabad, Celebi Nas Musdalifa Abdullah, CEO, GTR Malaysia Megat Ardian, Senior General Manager, Strategy, Malaysia Airports Raymond Lo, CEO, Menzies CNAC Aviation Services Ltd Simon Lotter, Head of Market for Asia & Pacific, Munich Airport International Tatsuya Izumi, Deputy General Manager, Narita International Airport Corporation Ranjiv Ramanathan, SVP, SG Hub Transformation & Development, SATS Ltd Brad Moore, CEO APAC, Swissport International AG Innovative approaches According to Airports Council International (ACI), global passenger volume is foreseen to reach 9.5 billion in 2024, while the Asia-Pacific region is said to lead in year-on-year (YoY) growth in 2024, with a 13% increase, reaching 3.4 billion passengers by year-end. With air travel playing a vital role in global trade and tourism, the sector must adopt innovative approaches to make airport more sustainable and resilient. Global and regional solutions inter airport Southeast Asia 2025 will highlight global and regional solutions that support the scaling up inter airport Southeast Asia 2025 will highlight global and regional solutions that support the scaling up of airport tech to boost operation efficiency and greener solutions in ground operations to reduce carbon emissions. Prominent exhibitors on the exhibition front include ADB Safegate, Alstef Group, BSLBatt, Charlatte Manutention – FAYAT Group, Dynell GmbH, ElectroAir, Fastcharge GSE, ITW GSE, JBT AeroTech, Runway Safe Group, Roypow, Smith Detection, TLD Asia Ltd, Weihai Guangtai Airport Equipment, just to name a few. Advancements in GSE technology “Ground support equipment is a critical component of driving airport operations, and the advancements in GSE technology are paramount for driving sustainability and efficiency. By embracing advanced GSE technologies, such as electric and autonomous vehicles, we can reduce emissions and improve operational efficiency, all while enhancing safety." "It’s important to discuss how we can reimagine ground handling operations to establish new benchmarks in turnaround efficiency, and I’m excited to discuss this with fellow panellists at the upcoming inter airport SEA,” said Brad Moore, CEO – APAC, Swissport. Focus on innovation and safety Japan pavilion will also be showcased for the first time at inter airport Southeast Asia Japan pavilion will also be showcased for the first time at inter airport Southeast Asia. The pavilion will present a dynamic line-up of companies, including NEC, Japan Radio Co., Ltd (JRC), RION, ShinMaywa Industries, Ltd., Sugie Seito Co., Ltd., and Toyota Industries Corporation as they showcase cutting-edge airport equipment for ground operation and touchless technology to enhance airport experiences. In line with the industry's focus on innovation and safety, Singapore is also taking steps to advance aerospace manufacturing standards. New standard: SS 708 AM for aviation A Working Group on Additive Manufacturing for Aerospace Manufacturing, established under the Singapore Standards Council, will launch a new standard: SS 708 Additive Manufacturing (AM) for Aviation – Filament Layer Manufacturing (FLM) Process Specifications. The standard seeks to establish a comprehensive framework for FLM parts producers supplying to the aerospace industry, covering process control and qualification of hardware, facility, materials, and operations. New industry entrants The standardisation of terminology and processes will also facilitate procurement officers of FLM parts to better evaluate new industry entrants to the FLM supply chain, ultimately contributing to enhanced safety in both commercial and military aircraft operations. More details will be made available at the event in March. All registered professionals for inter airport Southeast Asia 2025 will be granted free access to both the exhibition and conference floors. For the latest information on inter airport Southeast Asia.
2025 marks the half-way point of the decade and over ten years since they introduced the flagship Codelocks NetCode® Technology. The innovative, award-winning technology has driven a lot of the growth and change at Codelocks since its introduction. This got them to thinking; what will be the direction of travel for access control over the next 10 years? NetCode® didn’t emerge out of nowhere 10 years ago. It was intentionally developed to meet the demand for greater control and the convenience to grant access remotely. New generation of consumers Codelocks’ product technicians have been adapting and refining the technology ever since then to support more products and applications developed to meet evolving global customer needs. As product innovators, it's important to expand the view and look outside of the world of access control and architectural ironmongery. This helps them understand the prevailing trends and what is driving change to people’s behaviours when it comes to access control. It also helps them to think about what the access control landscape might look like in the coming decade, when there will be a new generation of consumers with a different set of demands. Preparing for a sustainable future As they progress along the Net Zero pathway, the 2030 and 2050 horizons are getting closer and closer One of the major trends of the past few years is sustainability. As they progress along the Net Zero pathway, the 2030 and 2050 horizons are getting closer and closer. People, especially younger generations, are rightly concerned about the environmental footprint of the products and services they use. Their concerns are driving moves towards greater shared ownership and rental, rather than outright purchase. This means that less material and energy is used to build items like bicycles and even electric vehicles that can be easily shared, there’s also less to dispose of at the end of the item’s life. This will call for ways to control access to the shared facilities with remotely enabled locks and timing mechanisms to ensure their fair and equal use. Electronic access control systems Several Codelocks products are already being used in integrated projects like shared-spaces and click and collect lockers. One of the customers offers shared bike storage spaces that can be accessed via their app, for example. Continuing the sustainability theme, they are actively looking to extend battery life to last the lifespan of the product to reduce waste. Looking further ahead, there will be greater innovation in terms of powering electronic access control systems from energy sources like personal devices to operate battery-free locks more sustainably. The impatience economy The growing rise of control and comfort plays into the trend that has become known as the impatience economy The growing rise of control and convenience plays into the trend that has become known as the ‘impatience economy’. This is where people (understandably) prefer quick solutions to traditional methods. Increasing digitalisation means that users expect self-service applications and automated access control without having to think about them – especially as AI will anticipate their usage, but more on that later. Now, this isn’t exactly new. Being sent an access code to unlock a gym locker or tennis court, for example, is much faster than having to collect and return a physical key. It’s something they have become accustomed to. Multi-factor authentication The convenience/impatience factor inevitably extends into other mechanisms, like connecting access control to payment technologies to streamline the entire process. Multi-factor authentication is something they are all familiar with when making online purchases, and this will likely be used more and more to prevent fraudulent access to facilities. The impatience economy also fuels a behavioural change to a 24-7 expectation. Particularly in the creative industries when they never know when inspiration will hit, round-the-clock access to facilities like recording studios is expected. Getting personal The data paints a picture of the user that can be used to create a profile and anticipate their access needs Greater digitalisation and self-service applications involve data. These apps will collect data about who is accessing locked facilities, when they use them, what they use them for and for how long, etc. The data paints a picture of the user that can be used to create a profile and anticipate their access needs. This is essentially how AI will be used to improve the customer’s overall experience. They can apply this to future innovations like an upcoming ‘do-not-disturb’ feature that they are excited about. More on this in 2025. Looking towards the future By looking forward and exploring the implications of some of these mega-trends, they get a sense of how the business adds value to their customers’ lives. They are not just reacting to changes; they are actively anticipating them. As the decade enters its second half, they will see lifestyles and behaviours become increasingly bespoke, integrated and personalised. It's up to access control innovators to remain agile and responsive to these behavioural shifts and welcome the lightbulb moments that will spark new innovations.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
A premier cancer research and treatment institute in India, renowned for advancing oncology, serves as a national centre for specialised healthcare. Committed to delivering innovative treatments and holistic care, the institute integrates state-of-the-art technology with a highly skilled medical team. It emphasises comprehensive patient management, pioneering research, and educational initiatives to enhance oncology expertise. The institute's cutting-edge facilities are tailored to support groundbreaking research, driving progress in cancer treatment and care. Challenges/requirements The research institute relied on a legacy network setup that gradually introduced multiple challenges: Integration with Existing Infrastructure: The institute sought a Unified Communication System that could effortlessly adapt to its intricate legacy setup. Maintaining compatibility was essential to preserve seamless connectivity and ensure the continuity of critical daily operations. Scalability for Future Growth: With plans for expansion, the institute foresaw growing communication needs, including enhanced connectivity and advanced functionalities. Matrix was entrusted to provide a solution that not only resolves present challenges but is also designed to scale effortlessly for future requirements. Secure Communication: With the critical sensitivity of medical communications, ensuring data security and compliance with healthcare standards was paramount. Matrix was tasked with delivering a robust solution designed to safeguard privacy and protect against security risks. Solution The Matrix Unified Communication System incorporated a VoIP-PRI gateway and an embedded IP-PBX server, effectively integrating with third-party IP phones. This configuration bridged modern communication technology with the institute's legacy systems, ensuring seamless functionality. The solution highlights are as follows: Integration with Legacy Network: The Matrix Unified Communication System incorporated two SETU VTEP1P VoIP-PRI gateways, seamlessly connecting with the existing legacy PRI network to ensure smooth integration and enhanced communication capabilities. IP Network: The embedded IP-PBX server, PRASAR UCS-SPARK200, facilitates the IP network connection via a router, enabling seamless communication across the system. Integration with Third-Party IP Phones: The IP-PBX server, connected via the LAN, powers the IP network to support over 300 third-party IP phones, creating a comprehensive and unified communication system. Results The implementation of the Matrix Unified Communication System significantly enhanced the Cancer Research Institute's communication infrastructure. The key outcomes were: Smooth Transition with Legacy Infrastructure: The system effortlessly connected with the institute’s existing PRI network, allowing the retention of its current setup while introducing modern VoIP capabilities. This ensured operational continuity and efficient workflows without the need for costly upgrades or disruptions. Future-Ready Scalability: The IP-PBX server, capable of supporting up to 2100 users, provides the institute with a flexible and adaptable communication solution. Designed to accommodate future growth, the system ensures increased connectivity and the integration of advanced features, aligning seamlessly with the institute’s expanding needs. Optimized Licencing Structure: The deployment of the Matrix SIP server enabled the institute to reduce licencing costs by up to 20%, delivering significant savings while maintaining high-quality communication capabilities. Enhanced Device Connectivity: Reliable IP connectivity across over 300 third-party IP phones has streamlined internal communication within the institute. This seamless integration allows staff to collaborate efficiently across departments, enabling quicker decision-making and more unified operations. The Matrix Unified Communication System empowered the Cancer Research Institute to transition to a scalable and integrated communication infrastructure. This solution not only supports current operations but also accommodates future growth, effectively resolving core challenges with a seamless and sustainable approach.
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
As a real estate development firm’s facility was nearing completion, the firm identified potential concerns with limitations in the facility’s control infrastructure. Before the building reached full occupancy, the firm engaged with Wesco Anixter’s entroCIM team for a comprehensive cybersecurity and use-case audit. As a result, the facility pivoted to a cloud-hosted instance of the entroCIM platform to deliver on the organisation’s lofty vision for a truly connected space. Solution Constant commissioning with site-specific scripting means operators know the moment The entroCIM platform helps bring their vision to life among operational technology as well; disparate technologies with unique communication protocols come together in a single interface, providing stakeholders with mission-critical actionable insight. As all commercial real estate of this type has changed in the past several years, entroCIM has changed with it, offering direct, API-based connection to detailed predictive utility data to leverage the site’s flexibility in maximising efficiency. Constant commissioning with site-specific scripting means operators know the moment a system begins to show signs of decline. Since initial deployment, the depth of actionable insight through analytics has more than doubled, with more than 130 analytical rules running continuously to give operators the upper hand in the management of occupant comfort, energy efficiency and proactive maintenance Scope Cloud-based entroCIM licence access Dashboarding and graphics Analytics and reporting Preventative maintenance Investigation API-based utility integration Commissioning Global remote access Use-case gap analysis Cybersecurity audit New construction consulting Subject matter expert support Project stakeholders C-suite IT Organisation-level engineering Site-level mechanical Site-level engineering Tenant program management Communication protocols BACnet Modbus Integrated services Automated Logic Semco Lutron Siemens Honeywell York
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution is deployed at the University of New Haven. This integration marks the first time a Connecticut university has adopted ZeroEyes, enhancing the safety and security measures across the campus and surrounding areas. University of New Haven The University of New Haven, located on a suburban campus near New Haven, Connecticut, serves a community of over 10,000 students, faculty, and staff. Its comprehensive, multilayered safety and security strategy ensures protection 24/7/365 with features such as electronic card access gates, CCTV cameras, emergency phones, and the LiveSafe app, which facilitates real-time communication with the University Police Department that patrols the entire campus. Threat identify, assess, and respond With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify With the deployment of ZeroEyes, the campus's security infrastructure is even better equipped to identify, assess, and respond to potential gun-related threats. “The security of our campus and the safety of our students, faculty, staff, and visitors are our paramount priority,” said Adam Brown, chief of the University of New Haven Police Department. AI-based gun-detection system “From our first conversations with ZeroEyes, it was clear they could help enrich the safety and security of our community by offering an AI-based gun-detection system that uses the most advanced technology – supported by a specially trained operations center – to identify and analyze the presence of a firearm." "Testing, implementing, and integrating ZeroEyes into our safety and security systems and protocols has been seamless. ZeroEyes’ expertise in this critical area of public safety provides an important tool that enhances the safety and security of our community.” Situational awareness software If a gun is identified, images are instantly shared with the ZOC which is staffed 24/7/365 ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location, to local law enforcement and university security as quickly as 3 to 5 seconds from detection. Campus safety “Our collaboration with the University of New Haven underscores their unwavering dedication to campus safety in Connecticut,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “By integrating our AI gun detection solution, the university is taking a significant step forward in safeguarding its students, faculty, and staff. We are honored to support their mission to create a secure educational environment.”
Baydale Control Systems has taken control of its stock management using a BigChange 6-in-1 system. Specialising in electronic security and fire alarm systems, Baydale moved to the cloud-based solution to improve its client record management, provide visibility of the mobile workforce, and offer digital certification. Since implementing, BigChange has allowed Baydale to improve profitability by allocating routine jobs and ad-hoc call-outs 80 percent faster and boosting engineer productivity by 33 percent. Security design, installation, and integration Established in 1999, Baydale is at the forefront of security system design, installation, and integration. Working primarily with public and community sector organisations such as Local Authorities, Police Forces, Educational Institutions, NHS Trusts, and Housing Associations, Baydale’s core services include CCTV, door entry, security doors, gates and barriers, and fire detection and alarms. Baydale operates a 24-hour-a-day, 7-day-a-week engineering operation with more than 40 specialists operating nationwide. Digital certification “Our previous system, a server-based platform, had served us well for almost 20 years, however, as we expanded and our client base expected more, it just wasn’t keeping pace,” commented Tina Lunnon, Service Admin Manager and BigChange ambassador within Baydale. “We knew we wanted a system that was cloud-based, we also knew we wanted a system that would allow us to keep track of stock, have visibility of engineers’ movements, and offer digital certification.” BigChange job management system BigChange job management system, which incorporates a mobile workforce app, CRM, job scheduling One of Baydale’s primary objectives for implementing the BigChange job management system, which incorporates a mobile workforce app, customer relationship management (CRM), job scheduling, live tracking, financial management, and business intelligence tools in one system, was control and visibility of its mobile workforce. “We reviewed several systems before we looked at BigChange and fell in love!” she continued. Colour-coded job progress icon “Being able to see where our engineers are, in real-time, alongside a colour-coded job progress icon, means it’s much easier to pick up work and allocate an appropriate and available resource." "This means each engineer can complete more jobs per day making them on average 33 percent more productive.” Stock control Another driver for the big change in job management at Baydale was stock control. “Having our stock records managed digitally has taken some time to get up and running but we are seeing a clear benefit of those hours invested as knowing what an engineer has on their vehicle means jobs can be allocated 80 percent faster.” CRM features Baydale has also transformed up to 95 percent of its workflows to digital, improving the speed Baydale has also transformed up to 95 percent of its workflows to digital, improving the speed of customer updates and reducing the admin resource required to duplicate information from paper to digital. The CRM features are clear and simple to navigate, and, being able to add custom fields allows Baydale to share detailed customer and site information between the back office and field teams. The ability to add notes and link to quotes and additional documents and actions such as text messages sent, provides evidence for audit trails and customer clarification if required. Job cards “Overall, we have noticed a vast improvement in the way we communicate with our clients." "The job cards produced by BigChange are clearer, holding just the right information including time and date stamped photos, and the ability to set up auto send has made a massive difference in the number of emails we generate and calls we make.” Job completion reporting Using the BigChange booking site, some of Baydale’s larger clients can also self-serve information Digital certification and job completion reporting is important for Bedale’s clients and these have boosted customer service as worksheets and certificates can be shared with the client as soon as a job has been completed. Using the BigChange booking site, some of Baydale’s larger clients can also self-serve information and schedule routine appointments. Control and awareness “BigChange has transformed the management of our mobile operation,” Lunnon concluded. “We now have much more control and awareness, we have seen an improvement in our compliance obligations, and we achieved our most profitable year ever – some of which can, without doubt, be attributed to the use of BigChange.”
The building, constructed in 2005, consists of three 12-story towers with a total of 309 residential units. Residents have been experiencing issues with noise and unclear sound, which hinder effective communication and lead to frustration. Additionally, there is an increased need for remote unlocking capabilities. The existing 2-wire system, which supports only basic intercom functions, fails to meet the current needs of the residents. Solution highlights Easy Intercom Retrofitting with Existing Cables Tenant’s Own Choice on Answering Units Installed products S615 4.3” Facial Recognition Android Door Station E211 Audio Indoor Monitor 290M-S8 7” Linux Indoor Monitor (2-wire Version) 902C-A Master Station Cloud Solution - Smart Pro Solution benefits For Installer DNAKE 2-wire IP intercom solution leverages existing wiring, which allows for a quicker and more efficient installation process. This solution helps avoid the costs associated with new cabling and extensive rewiring, keeping project costs down and making the retrofit more economically attractive. For Property Manager The Central Management System (CMS) is an on-premises software solution for managing video intercom systems via the LAN, which has greatly improved the efficiency of property managers. Additionally, with the 902C-A master station, property managers can receive security alarms to take immediate action, and remotely unlock doors for visitors. For Residence Residents can choose their preferred answering unit based on their needs. Options include Linux-based or Android-based indoor monitors, audio-only indoor monitors, or even app-based services without a physical indoor monitor. With DNAKE's cloud service, residents can unlock doors from anywhere, at any time.
Round table discussion
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly, but they can also be misused or misunderstood. Within a specific industry, such as security, buzzwords can create a sense of shared understanding and belonging. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the security industry?
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
Products
Videos
Security communication: Manufacturers & Suppliers
- Bosch Security communication
- Senstar Security communication
- Honeywell Security Security communication
- DSC Security communication
- Dahua Technology Security communication
- RISCO Group Security communication
- Climax Technology Security communication
- MOBOTIX Security communication
- Paxton Access Security communication
- Panasonic Security communication
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download