Security devices
Hikvision has partnered with specialist Swiss real-time condition monitoring solution provider, DAPONA. The collaboration enables DAPONA to incorporate intelligent thermal cameras into their real-time condition monitoring solution, which protects industrial sites such as sawmills and wood processing companies. This enables DAPONA to further reduce the risks associated with fire, smoke, and excessive heat. DAPONA solution The DAPONA solution is a simple and intuitive cloud-based system for cr...
ODVA celebrated its 30th anniversary at its 23rd Annual Meeting of Members in Clearwater, Florida, USA on March 20, 2025. Since ODVA’s founding in 1995, the core Common Industrial Protocol (CIP) technology has evolved significantly and serves as the backbone of the pioneering EtherNet/IP automation network. The Annual Meeting was attended by over 100 industry pioneers from almost 40 companies and included keynotes from Pedro Umbelino, Principal Research Scientist, Bitsight Technologies on...
RISCO has announced the release of its revolutionary wireless LuNAR FireWatch, a three-in-one smoke, heat and PIR detector designed for optimum safety and security. The device signifies a breakthrough for the security industry, as it combines the functions of three individual functions into one cohesive, streamlined detection solution. safety and security device The wireless LuNAR FireWatch is designed for ceiling mounting, prioritising improved detection coverage and minimising blind spots....
Magenta Security Services, a pioneer in high-quality security solutions and sustainability in the industry, is proud to celebrate its 30th anniversary. Over the past three decades, Magenta has set the benchmark for exceptional security services, environmental responsibility, and ethical business practices, solidifying its position as a pioneer in the sector. Founded in 1995, Magenta Security was built on the principles of professionalism, integrity, and a commitment to corporate social responsi...
Nozomi Networks, the pioneer in operational technology (OT), internet-of-things (IoT) and cyber-physical systems (CPS) security, has been named in Fast Company’s prestigious list of the World’s Most Innovative Companies of 2025. Nozomi earned the number three position in the security category. Nozomi Networks addresses the often-unmet cybersecurity needs of the industrial organisations they rely on daily, including water, electricity, transportation and hospitals. Mission-critical...
As the threat landscape continuously evolves, the call for robust data security solutions has never been more urgent. Rubrik, a cyber-security company, is proud to announce a strategic alliance with Deloitte. Together, the companies will collaborate to deliver advanced data security and management solutions, designed to help organisations to safeguard their data assets, helping business continuity and cyber resilience. Enterprise-wide data management "Our alliance with Rubrik reinforces our...
News
Allegion plc, a global security products and solutions provider, through one of its subsidiaries, has recently acquired the business and operations of privately held Next Door Company, including its brands and other assets. Based in Miami, Florida, and founded in 1993, Next Door is a U.S. manufacturer of stainless steel and hollow metal doors, specialising in custom configurations for industrial, commercial and institutional buildings. Next Door complements Allegion’s existing hollow metal doors and frames portfolio and enhances Allegion's specialty offerings. Deep-rooted expertise Next Door will report into the Allegion Americas segment, led by Allegion Senior Vice President Dave Ilardi. “We’re very excited to welcome Next Door to Allegion – they’ve been a close partner of ours for more than a decade now,” Ilardi said. “Much like our own team, Next Door has deep-rooted expertise in complex environments. Their custom doors and frames will further expand the Allegion portfolio and will benefit from our specification capabilities and scale in manufacturing and distribution across the U.S.” Justin Schechter, owner of Next Door, will join Allegion to facilitate a smooth transition and support accelerated growth for the combined businesses. “Next Door has a strong reputation in our industry,” said Schechter. “We’re known for delivering high-quality solutions and customer satisfaction. We’re confident we share this passion for excellence with Allegion. We’ll build from that foundation and drive growth through shared resources and expertise.” Terms of the transaction were not disclosed.
ETA International, the authority in certifying Land Mobile Radio (LMR) communications technicians, is proud to introduce the DAS Master Specialty Certification, CETms(D); a groundbreaking credential designed to validate expertise in Distributed Antenna Systems (DAS). This prestigious certification sets a new benchmark for professionals responsible for designing, installing, optimising, and maintaining DAS solutions critical to public safety and commercial wireless communications. Combined electronics training To achieve the DAS Master Specialty Certification, an individual must have six or more years combined electronics training and/or work experience and successfully attain: Associate CET (CETa) or General Communications Technician – Level 1 (GCT1) (Foundation Level) Distributed Antenna Systems Installer (DASI) or NICET IB-PSC Level 1 (rollover) Distributed Antenna Systems Technician (DAST) or NICET IB-PSC Levels 2 & 3 (rollover) General Communications Technician – Level 2 (GCT1) or Wireless Communications (WCM) (Advanced RF and System Concepts) Line Antenna Sweep (LAS) or Antenna Systems Commissioning (ASC) RF Interference and Mitigation (RFIM) PLUS one additional certification from any ETA certification category. Optimised DAS systems The DAS Master Specialty Certification is designed to ensure that professionals possess the knowledge and hands-on expertise to mitigate the risks associated with improperly optimised DAS systems. A misconfigured DAS can severely impair radio system infrastructure, leading to critical communication failures. In addition, it is highly recommended that professionals attain the FCC General Radio Operator License (GROL) as many Authority Having Jurisdiction (AHJ) require it in order to work with in-building wireless communications systems. DAS certification excellence “As in-building wireless communications evolve to meet increasing demands for public safety and commercial coverage, the DAS Master Specialty Certification ensures professionals have the technical proficiency to design, install, troubleshoot, and maintain high-performance DAS solutions,” said Bryan Allen, CSM, CSS, ETA International President. “This certification establishes a rigorous standard for the public safety industry and raises the bar for DAS certification excellence.” ETA International sets the bar for quality and expertise in wireless communications Recognised as a pioneer for certifying LMR communications technicians, ETA International sets the bar for quality and expertise in wireless communications. The DAS Master Specialty Certification is particularly relevant for professionals working on in-building Emergency Responder Communication Enhancement System (ERCES) and other mission-critical DAS applications. Real-world problem-solving Ira Wiesenfeld P.E., subject matter expert for the NFPA 1225 Public Emergency Service Communication committee, adds: “The impact of an improperly designed or installed DAS system extends beyond a single building. When BDAs oscillate between structures due to incorrect design or operational parameters, they create widespread RF interference. Without a solid foundational understanding of RF propagation and infrastructure integrity, jurisdictions risk exacerbating the problem by deploying more DAS systems instead of addressing the root cause.” A well-executed DAS design ensures that public safety and commercial wireless networks operate reliably in all environments. The DAS Master Specialty Certification provides the comprehensive knowledge required for professionals to troubleshoot, optimise, and maintain these systems effectively. Mastery in DAS requires a deep understanding of RF engineering, regulatory compliance, interference mitigation, and real-world problem-solving. The DAS Master Specialty credential encompasses the full scope of industry standards and best practices needed to be successful in today’s in-building wireless communications profession.
i-PRO Americas Inc. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the launch of VideoInsight™ version 8.0, the latest release of its powerful video management system (VMS). Designed to meet the evolving security needs of school administrators, IT directors and security teams, VideoInsight 8.0 simplifies campus safety with an intuitive, cost-effective platform that delivers seamless integration, advanced AI tools and unmatched reliability. VideoInsight platform Educational institutions face ongoing challenges such as limited budgets, complex security infrastructures and fragmented security tools that hinder real-time response. The VideoInsight platform directly addresses budget concerns by not requiring camera licencing when using i-PRO cameras; this drives down upfront costs and lowers reoccurring costs. Intuitive dashboards and features VideoInsight 8.0 reduces administrative burdens, saving both time and resources With intuitive dashboards and automated maintenance features, VideoInsight 8.0 reduces administrative burdens, saving both time and resources. Built-in self-diagnostics, health monitoring and database optimisation ensure system reliability with 24/7 fault tolerance, minimising IT oversight and lowering maintenance costs, freeing up valuable resources for other critical school operations. It also offers cloud-based storage options without requiring additional middleware, allowing schools to reduce expensive hardware costs while maintaining easy access to video footage for investigations and compliance. Key benefits Scalable Security: VideoInsight 8.0 is designed to adapt to evolving security requirements in schools without adding complexity. Its open-platform design seamlessly integrates with i-PRO hardware and third-party solutions from Triton Ultra (vape detection), ZeroEyes (weapons detection), Wasabi (cloud storage), and Zenitel (video intercom), reducing upfront costs and long-term ownership expenses. Schools can integrate it effortlessly with existing systems while benefiting from cost-effective licencing and a future-ready security platform. Faster Forensic Searches with Built-In i-PRO Active Guard: i-PRO Active Guard is now natively integrated into the VideoInsight 8.0 platform, enabling forensic searches directly within the camera pane – eliminating the need for separate plugins. Schools can consolidate all security devices, including indoor, outdoor, and transportation cameras, into a single, user-friendly platform. i-PRO Active Guard extends across servers, clients, web and mobile platforms, enabling AI-triggered searches without switching between multiple applications. Unified Access Control and Video Management: VideoInsight 8.0 integrates seamlessly with i-PRO’s MonitorCast access control platform, creating a single-pane-of-glass view for access control events tied to video footage. This integration streamlines workflows, saving time and providing a comprehensive, real-time security overview. Whether on campus or off-site, security teams can monitor school security remotely with AI-triggered searches, instant alerts and mobile access, ensuring swift response to incidents. Enhanced Transit Solutions: VideoInsight 8.0 improves transit monitoring with native video offloading and durable storage technology, ensuring reliable video performance for buses and other school transportation systems—all within a single platform. Cost-Effective Body-Worn Camera Deployment: The i-PRO BWC4000 body-worn camera includes a bundled camera licence, allowing direct connectivity to VideoInsight 8.0 without additional licencing costs. Advanced accessible security solution “Our goal is to provide educational institutions with an advanced yet accessible security solution that provides an end-to-end offering with options for access control, vape and weapons detection, intercom, cloud storage and more,” said Adam Lowenstein, Product Director at i-PRO Americas, Inc. “VideoInsight 8.0 stands out by offering a unique combination of affordability, high-performance features and open infrastructure. Unlike other VMS solutions, it seamlessly integrates with existing hardware and software while reducing or even eliminating recurring licencing fees, ensuring institutions get maximum value without hidden expenses.”
At ISC West 2025, Hanwha Vision (Booth 14025) is defining its vision for the future of surveillance, highlighting the potential for security devices to move beyond monitoring and protection and become true business transformation tools. Hanwha is featuring its Wisenet 9 System on Chip (SoC), unique camera design collaborations delivering unprecedented AI functionality and business intelligence software generating enhanced data-driven insights. Managing surveillance resources In Hanwha’s booth, ISC West attendees will see new applications of AI analytics in IP cameras enabling precise detection, robust search, elevated data analysis, and enhanced image quality. Hanwha is also demonstrating new cloud-based capabilities giving security professionals the highest level of flexibility for managing their surveillance resources. ISC West attendees will see new applications of AI analytics in IP cameras enabling precise detection “AI and cloud platforms are redefining surveillance operations with new ways to create automation, efficiencies, and customisation,” said Tom Cook, Executive Vice President of Sales, Marketing & Operations, North America, Hanwha Vision America. “Surveillance now has a seat at the table as a true driver of business transformation. Everyone’s asking, ‘How do we go beyond security, turn analytics into data, and generate real business insights about the future direction of our organisation?’ Hanwha Vision is giving our customers those answers.” Immersive visual presentation Hanwha Vision will feature several new technologies at ISC West, all showcased in a newly designed booth with a new layout for easier navigation and updated graphics for a more immersive visual presentation. The new products on display include: Wisenet 9 System on Chip (SOC) Designed and made in-house since its first version, this chip is the secure foundation of all Hanwha Vision devices. With advancements in AI-enhanced compression, low-light performance, and cybersecurity using FIPS 140-3 Level 3 security. Wisenet 9 will be demonstrated at ISC West powering Hanwha’s 2nd generation of P series and X series cameras, and highlighting key features such as: Enhanced AI noise reduction to minimise noise and maximise detail AI-Driven Extreme Wide Dynamic Range to maintain details in bright or dark areas Advanced AI Analytics for intelligent detection of color, age, and gender attributes Hanwha Vision Cloud Portal A centralised resource for managing an organisation’s surveillance assets and capabilities, the Cloud Portal showcases Hanwha’s growing ecosystem of unified cloud-based devices and apps. These solutions offer a full range of capabilities to help organisations fully reimagine their surveillance operations: OnCloud direct-to-cloud Video Surveillance as a Service (VSaaS) HealthPro for device maintenance and total system health monitoring SightMind real-time analytics visualisation software DesignPRO - Surveillance system planning software Multi-sensor camera devices This uniquely designed camera is the first Hanwha Vision model to use the power of the NVIDIA Jetson™ platform, providing Hanwha AI multi-sensor camera devices with up to an additional 100 Tera Operations Per Second (TOPS), plus immediate access to the NVIDIA AI app ecosystem. An embedded instance of Wisenet WAVE VMS delivers reliable serverless recording, on-board storage, and intelligent camera performance. Record up to 16 camera streams to 4TB of onboard storage (2 x 2TB SSD) WiseNRII and Preferred Shutter Speed features eliminate noise and motion blur for clear imagery in all conditions AI-based monitoring of people and vehicles with loitering and line-crossing analytics Video analytics platform 4-channel AI Multi-sensor camera with Lumeo Analytics - This new camera supports the Lumeo all-in-one video analytics platform giving users easy drag-and-drop access to pre-built, edge-based analytics, plus the flexibility to create entirely new AI models tailored to their business. Lumeo platform supports intuitive dashboard views that aggregate media, data and remote live streams from multiple cameras across several sites for centralised surveillance system management. Proactive incident detection DERQ traffic analytics: users can access real-time safety and traffic insights, applying data for intelligent video monitoring, proactive incident detection and smart traffic data-driven optimisation. Derq provides a comprehensive framework to efficiently identify and prioritise safety issues across road networks. City-wide analysis - Gain insights to inform city planning. Event data management - Organise and monitor critical traffic events Statistical reports - Access detailed metrics for decision-making In-depth analysis and reports - Dive deeper into trends and root causes. AI-powered recognition technology Scylla Weapon Detection: users can improve response times and implement proactive measures in critical situations by leveraging military-grade weapon AI-powered recognition technology with machine learning models that evolve continuously through ongoing training. Long-range detection with 100 PPM accuracy at a 15-meter range on standard Full HD cameras and even greater distances with higher-resolution cameras. Operates seamlessly in dense environments with moving backgrounds for consistent reliability and versatility. Ultra-low false positive rate - 0.1 per day per camera Detects a wide range of firearms - recognises various types of firearms, including revolvers, assault rifles, shotguns and more Both sets of analytics offer flexible deployment options either on-premise or in the cloud, as well as easy integration with VMS platforms, including Hanwha’s Wisenet Wave VMS.
ASSA ABLOY Entrance Systems is proud to announce the launch of ecoLOGIC, an innovative AI-driven solution designed to optimise energy savings and enhance the indoor environment through intelligent door management. This cutting-edge solution integrates advanced AI algorithms with real-time weather and customer flow data to dynamically adjust door settings, significantly reducing energy consumption and carbon footprint. Smarter sustainable buildings By balancing door operations, ecoLOGIC enables energy-efficiency without compromising on customer comfortecoLOGIC represents a major leap forward in sustainable building management. By intelligently balancing door operation parameters such as hold-open times and door speeds, ecoLOGIC enables energy-efficiency without compromising on customer comfort. This innovative approach can save a street-facing, medium-sized retail store on average 14,000 kWh per year, translating to substantial cost savings and reduced environmental impact. Driving eco-friendly innovation "ecoLOGIC is a testament to our commitment to innovation and sustainability. By leveraging AI technology, we can provide our customers with a solution that not only enhances their operational efficiency but also contributes to a greener planet," said Floris van Hooft, VP Marketing & Digital Services at ASSA ABLOY Entrance Systems. "We are excited to see the positive impact ecoLOGIC will have on both our customers' bottom line and the environment." Dynamic Door Control ecoLOGIC uses ASSA ABLOY Insight to intelligently adapt door settings based on real-time local conditionsecoLOGIC builds on the ASSA ABLOY Insight platform, which provides customers with the ability to manage and monitor their entrance doors from anywhere, at any time. This platform connects the doors in a facility to the cloud and allows ecoLOGIC to use local conditions to dynamically adjust door settings. Key Features of ecoLOGIC Intelligent adjustment Utilises AI to dynamically adjust door settings based on temperature, weather and customer traffic. Energy efficiency Helps reduce energy costs and carbon footprint by minimising unnecessary door open times. Indoor environmental quality By optimising hold open times and door speed, air is more effectively exchanged, stabilising temperature and reducing noise Enhanced lifespan Reduces door wear and tear by 2-7%, extending the operational life of the doors. High security ISO 27001 certified, ensuring the highest standards of security for the cloud-based AI solution. Supported door models ecoLOGIC is currently compatible with ASSA ABLOY SL500 doors manufactured after 2016, ensuring that a wide range of businesses can benefit from the energy-saving and customer experience enhancements provided by ecoLOGIC.
Building Intelligence, a provider of solutions that securely streamline vendor, vehicle, and visitor access, announces a pioneer transition to support its next phase of growth. The new pioneer structure will help the company scale operations and refine its organizational strategy to pursue new growth opportunities. Focusing on expansion Championing innovation and partnership with strategic growth and market-defining innovationFounder Jeffrey Friedman will assume the role of Chief Evangelist, focusing on business development, innovation, and strategic partnerships. Marc Rubner has been appointed CEO and will lead the company's strategic growth, driving market-defining innovation, financial performance, and expansion. Advancing security solutions "We're grateful for Jeff's leadership and dedication to Building Intelligence. His vision has driven the company's growth and supported the development of vehicle, vendor, and visitor management solutions that ensure higher levels of security and drive efficiencies,” said Warren Haber, Chairman of the Board of Building Intelligence. “As we move into this next chapter, we're excited to welcome Marc to the business. With expertise in technology and strong leadership skills, he has a track record of creating long-term value. Under his direction, we'll continue innovating and strengthening our market position to meet the evolving needs of our clients and partners." Shaping secure solutions Building Intelligence will drive innovation, enhance safety, and shape the future of secure, scalable solutions worldwideUnder Rubner’s leadership, Building Intelligence will continue to deliver secure, scalable, and cutting-edge solutions that enhance safety and efficiency for clients worldwide. Friedman will amplify the company’s vision further, deepen engagement with clients and partners, and spearhead new opportunities that will drive industry advancements. A vision for growth “This transition represents a strategic step forward and ensures that Building Intelligence continues to lead the industry while strengthening our foundation for long-term success,” Friedman said. “I am excited to focus on expanding our market reach, driving innovation, and supporting Marc as he leads the company into the future.” Experienced leadership With more than 30 years of leadership experience, Rubner has guided organizations through transformation across multiple industries. He previously served as Founder and CEO of GreenStation Consulting and as CEO of DonorDrive. Market strategies expert Earlier, as Vice President, Product Management and Marketing, Community Engagement and Campus Enablement at Blackboard, he led go-to-market strategies for the organization, a pioneering provider of access control and identity management in the higher education segment. Building the next phase "I'm honored to join Building Intelligence at such an exciting time,” Rubner said. “Businesses continue to face challenges with securing and optimizing their facilities, from the lobby to the loading dock, and there is a significant opportunity to solve these problems through technology.” “I'm eager to drive the company forward, unlock significant value, and collaborate with our customers and partners as we embark on building our next phase of acceleration."
Allegion plc, a global security products and solutions provider, through one of its subsidiaries, has recently acquired the business and operations of privately held Next Door Company, including its brands and other assets. Based in Miami, Florida, and founded in 1993, Next Door is a U.S. manufacturer of stainless steel and hollow metal doors, specialising in custom configurations for industrial, commercial and institutional buildings. Next Door complements Allegion’s existing hollow metal doors and frames portfolio and enhances Allegion's specialty offerings. Deep-rooted expertise Next Door will report into the Allegion Americas segment, led by Allegion Senior Vice President Dave Ilardi. “We’re very excited to welcome Next Door to Allegion – they’ve been a close partner of ours for more than a decade now,” Ilardi said. “Much like our own team, Next Door has deep-rooted expertise in complex environments. Their custom doors and frames will further expand the Allegion portfolio and will benefit from our specification capabilities and scale in manufacturing and distribution across the U.S.” Justin Schechter, owner of Next Door, will join Allegion to facilitate a smooth transition and support accelerated growth for the combined businesses. “Next Door has a strong reputation in our industry,” said Schechter. “We’re known for delivering high-quality solutions and customer satisfaction. We’re confident we share this passion for excellence with Allegion. We’ll build from that foundation and drive growth through shared resources and expertise.” Terms of the transaction were not disclosed.
ETA International, the authority in certifying Land Mobile Radio (LMR) communications technicians, is proud to introduce the DAS Master Specialty Certification, CETms(D); a groundbreaking credential designed to validate expertise in Distributed Antenna Systems (DAS). This prestigious certification sets a new benchmark for professionals responsible for designing, installing, optimising, and maintaining DAS solutions critical to public safety and commercial wireless communications. Combined electronics training To achieve the DAS Master Specialty Certification, an individual must have six or more years combined electronics training and/or work experience and successfully attain: Associate CET (CETa) or General Communications Technician – Level 1 (GCT1) (Foundation Level) Distributed Antenna Systems Installer (DASI) or NICET IB-PSC Level 1 (rollover) Distributed Antenna Systems Technician (DAST) or NICET IB-PSC Levels 2 & 3 (rollover) General Communications Technician – Level 2 (GCT1) or Wireless Communications (WCM) (Advanced RF and System Concepts) Line Antenna Sweep (LAS) or Antenna Systems Commissioning (ASC) RF Interference and Mitigation (RFIM) PLUS one additional certification from any ETA certification category. Optimised DAS systems The DAS Master Specialty Certification is designed to ensure that professionals possess the knowledge and hands-on expertise to mitigate the risks associated with improperly optimised DAS systems. A misconfigured DAS can severely impair radio system infrastructure, leading to critical communication failures. In addition, it is highly recommended that professionals attain the FCC General Radio Operator License (GROL) as many Authority Having Jurisdiction (AHJ) require it in order to work with in-building wireless communications systems. DAS certification excellence “As in-building wireless communications evolve to meet increasing demands for public safety and commercial coverage, the DAS Master Specialty Certification ensures professionals have the technical proficiency to design, install, troubleshoot, and maintain high-performance DAS solutions,” said Bryan Allen, CSM, CSS, ETA International President. “This certification establishes a rigorous standard for the public safety industry and raises the bar for DAS certification excellence.” ETA International sets the bar for quality and expertise in wireless communications Recognised as a pioneer for certifying LMR communications technicians, ETA International sets the bar for quality and expertise in wireless communications. The DAS Master Specialty Certification is particularly relevant for professionals working on in-building Emergency Responder Communication Enhancement System (ERCES) and other mission-critical DAS applications. Real-world problem-solving Ira Wiesenfeld P.E., subject matter expert for the NFPA 1225 Public Emergency Service Communication committee, adds: “The impact of an improperly designed or installed DAS system extends beyond a single building. When BDAs oscillate between structures due to incorrect design or operational parameters, they create widespread RF interference. Without a solid foundational understanding of RF propagation and infrastructure integrity, jurisdictions risk exacerbating the problem by deploying more DAS systems instead of addressing the root cause.” A well-executed DAS design ensures that public safety and commercial wireless networks operate reliably in all environments. The DAS Master Specialty Certification provides the comprehensive knowledge required for professionals to troubleshoot, optimise, and maintain these systems effectively. Mastery in DAS requires a deep understanding of RF engineering, regulatory compliance, interference mitigation, and real-world problem-solving. The DAS Master Specialty credential encompasses the full scope of industry standards and best practices needed to be successful in today’s in-building wireless communications profession.
i-PRO Americas Inc. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the launch of VideoInsight™ version 8.0, the latest release of its powerful video management system (VMS). Designed to meet the evolving security needs of school administrators, IT directors and security teams, VideoInsight 8.0 simplifies campus safety with an intuitive, cost-effective platform that delivers seamless integration, advanced AI tools and unmatched reliability. VideoInsight platform Educational institutions face ongoing challenges such as limited budgets, complex security infrastructures and fragmented security tools that hinder real-time response. The VideoInsight platform directly addresses budget concerns by not requiring camera licencing when using i-PRO cameras; this drives down upfront costs and lowers reoccurring costs. Intuitive dashboards and features VideoInsight 8.0 reduces administrative burdens, saving both time and resources With intuitive dashboards and automated maintenance features, VideoInsight 8.0 reduces administrative burdens, saving both time and resources. Built-in self-diagnostics, health monitoring and database optimisation ensure system reliability with 24/7 fault tolerance, minimising IT oversight and lowering maintenance costs, freeing up valuable resources for other critical school operations. It also offers cloud-based storage options without requiring additional middleware, allowing schools to reduce expensive hardware costs while maintaining easy access to video footage for investigations and compliance. Key benefits Scalable Security: VideoInsight 8.0 is designed to adapt to evolving security requirements in schools without adding complexity. Its open-platform design seamlessly integrates with i-PRO hardware and third-party solutions from Triton Ultra (vape detection), ZeroEyes (weapons detection), Wasabi (cloud storage), and Zenitel (video intercom), reducing upfront costs and long-term ownership expenses. Schools can integrate it effortlessly with existing systems while benefiting from cost-effective licencing and a future-ready security platform. Faster Forensic Searches with Built-In i-PRO Active Guard: i-PRO Active Guard is now natively integrated into the VideoInsight 8.0 platform, enabling forensic searches directly within the camera pane – eliminating the need for separate plugins. Schools can consolidate all security devices, including indoor, outdoor, and transportation cameras, into a single, user-friendly platform. i-PRO Active Guard extends across servers, clients, web and mobile platforms, enabling AI-triggered searches without switching between multiple applications. Unified Access Control and Video Management: VideoInsight 8.0 integrates seamlessly with i-PRO’s MonitorCast access control platform, creating a single-pane-of-glass view for access control events tied to video footage. This integration streamlines workflows, saving time and providing a comprehensive, real-time security overview. Whether on campus or off-site, security teams can monitor school security remotely with AI-triggered searches, instant alerts and mobile access, ensuring swift response to incidents. Enhanced Transit Solutions: VideoInsight 8.0 improves transit monitoring with native video offloading and durable storage technology, ensuring reliable video performance for buses and other school transportation systems—all within a single platform. Cost-Effective Body-Worn Camera Deployment: The i-PRO BWC4000 body-worn camera includes a bundled camera licence, allowing direct connectivity to VideoInsight 8.0 without additional licencing costs. Advanced accessible security solution “Our goal is to provide educational institutions with an advanced yet accessible security solution that provides an end-to-end offering with options for access control, vape and weapons detection, intercom, cloud storage and more,” said Adam Lowenstein, Product Director at i-PRO Americas, Inc. “VideoInsight 8.0 stands out by offering a unique combination of affordability, high-performance features and open infrastructure. Unlike other VMS solutions, it seamlessly integrates with existing hardware and software while reducing or even eliminating recurring licencing fees, ensuring institutions get maximum value without hidden expenses.”
At ISC West 2025, Hanwha Vision (Booth 14025) is defining its vision for the future of surveillance, highlighting the potential for security devices to move beyond monitoring and protection and become true business transformation tools. Hanwha is featuring its Wisenet 9 System on Chip (SoC), unique camera design collaborations delivering unprecedented AI functionality and business intelligence software generating enhanced data-driven insights. Managing surveillance resources In Hanwha’s booth, ISC West attendees will see new applications of AI analytics in IP cameras enabling precise detection, robust search, elevated data analysis, and enhanced image quality. Hanwha is also demonstrating new cloud-based capabilities giving security professionals the highest level of flexibility for managing their surveillance resources. ISC West attendees will see new applications of AI analytics in IP cameras enabling precise detection “AI and cloud platforms are redefining surveillance operations with new ways to create automation, efficiencies, and customisation,” said Tom Cook, Executive Vice President of Sales, Marketing & Operations, North America, Hanwha Vision America. “Surveillance now has a seat at the table as a true driver of business transformation. Everyone’s asking, ‘How do we go beyond security, turn analytics into data, and generate real business insights about the future direction of our organisation?’ Hanwha Vision is giving our customers those answers.” Immersive visual presentation Hanwha Vision will feature several new technologies at ISC West, all showcased in a newly designed booth with a new layout for easier navigation and updated graphics for a more immersive visual presentation. The new products on display include: Wisenet 9 System on Chip (SOC) Designed and made in-house since its first version, this chip is the secure foundation of all Hanwha Vision devices. With advancements in AI-enhanced compression, low-light performance, and cybersecurity using FIPS 140-3 Level 3 security. Wisenet 9 will be demonstrated at ISC West powering Hanwha’s 2nd generation of P series and X series cameras, and highlighting key features such as: Enhanced AI noise reduction to minimise noise and maximise detail AI-Driven Extreme Wide Dynamic Range to maintain details in bright or dark areas Advanced AI Analytics for intelligent detection of color, age, and gender attributes Hanwha Vision Cloud Portal A centralised resource for managing an organisation’s surveillance assets and capabilities, the Cloud Portal showcases Hanwha’s growing ecosystem of unified cloud-based devices and apps. These solutions offer a full range of capabilities to help organisations fully reimagine their surveillance operations: OnCloud direct-to-cloud Video Surveillance as a Service (VSaaS) HealthPro for device maintenance and total system health monitoring SightMind real-time analytics visualisation software DesignPRO - Surveillance system planning software Multi-sensor camera devices This uniquely designed camera is the first Hanwha Vision model to use the power of the NVIDIA Jetson™ platform, providing Hanwha AI multi-sensor camera devices with up to an additional 100 Tera Operations Per Second (TOPS), plus immediate access to the NVIDIA AI app ecosystem. An embedded instance of Wisenet WAVE VMS delivers reliable serverless recording, on-board storage, and intelligent camera performance. Record up to 16 camera streams to 4TB of onboard storage (2 x 2TB SSD) WiseNRII and Preferred Shutter Speed features eliminate noise and motion blur for clear imagery in all conditions AI-based monitoring of people and vehicles with loitering and line-crossing analytics Video analytics platform 4-channel AI Multi-sensor camera with Lumeo Analytics - This new camera supports the Lumeo all-in-one video analytics platform giving users easy drag-and-drop access to pre-built, edge-based analytics, plus the flexibility to create entirely new AI models tailored to their business. Lumeo platform supports intuitive dashboard views that aggregate media, data and remote live streams from multiple cameras across several sites for centralised surveillance system management. Proactive incident detection DERQ traffic analytics: users can access real-time safety and traffic insights, applying data for intelligent video monitoring, proactive incident detection and smart traffic data-driven optimisation. Derq provides a comprehensive framework to efficiently identify and prioritise safety issues across road networks. City-wide analysis - Gain insights to inform city planning. Event data management - Organise and monitor critical traffic events Statistical reports - Access detailed metrics for decision-making In-depth analysis and reports - Dive deeper into trends and root causes. AI-powered recognition technology Scylla Weapon Detection: users can improve response times and implement proactive measures in critical situations by leveraging military-grade weapon AI-powered recognition technology with machine learning models that evolve continuously through ongoing training. Long-range detection with 100 PPM accuracy at a 15-meter range on standard Full HD cameras and even greater distances with higher-resolution cameras. Operates seamlessly in dense environments with moving backgrounds for consistent reliability and versatility. Ultra-low false positive rate - 0.1 per day per camera Detects a wide range of firearms - recognises various types of firearms, including revolvers, assault rifles, shotguns and more Both sets of analytics offer flexible deployment options either on-premise or in the cloud, as well as easy integration with VMS platforms, including Hanwha’s Wisenet Wave VMS.
ASSA ABLOY Entrance Systems is proud to announce the launch of ecoLOGIC, an innovative AI-driven solution designed to optimise energy savings and enhance the indoor environment through intelligent door management. This cutting-edge solution integrates advanced AI algorithms with real-time weather and customer flow data to dynamically adjust door settings, significantly reducing energy consumption and carbon footprint. Smarter sustainable buildings By balancing door operations, ecoLOGIC enables energy-efficiency without compromising on customer comfortecoLOGIC represents a major leap forward in sustainable building management. By intelligently balancing door operation parameters such as hold-open times and door speeds, ecoLOGIC enables energy-efficiency without compromising on customer comfort. This innovative approach can save a street-facing, medium-sized retail store on average 14,000 kWh per year, translating to substantial cost savings and reduced environmental impact. Driving eco-friendly innovation "ecoLOGIC is a testament to our commitment to innovation and sustainability. By leveraging AI technology, we can provide our customers with a solution that not only enhances their operational efficiency but also contributes to a greener planet," said Floris van Hooft, VP Marketing & Digital Services at ASSA ABLOY Entrance Systems. "We are excited to see the positive impact ecoLOGIC will have on both our customers' bottom line and the environment." Dynamic Door Control ecoLOGIC uses ASSA ABLOY Insight to intelligently adapt door settings based on real-time local conditionsecoLOGIC builds on the ASSA ABLOY Insight platform, which provides customers with the ability to manage and monitor their entrance doors from anywhere, at any time. This platform connects the doors in a facility to the cloud and allows ecoLOGIC to use local conditions to dynamically adjust door settings. Key Features of ecoLOGIC Intelligent adjustment Utilises AI to dynamically adjust door settings based on temperature, weather and customer traffic. Energy efficiency Helps reduce energy costs and carbon footprint by minimising unnecessary door open times. Indoor environmental quality By optimising hold open times and door speed, air is more effectively exchanged, stabilising temperature and reducing noise Enhanced lifespan Reduces door wear and tear by 2-7%, extending the operational life of the doors. High security ISO 27001 certified, ensuring the highest standards of security for the cloud-based AI solution. Supported door models ecoLOGIC is currently compatible with ASSA ABLOY SL500 doors manufactured after 2016, ensuring that a wide range of businesses can benefit from the energy-saving and customer experience enhancements provided by ecoLOGIC.
Building Intelligence, a provider of solutions that securely streamline vendor, vehicle, and visitor access, announces a pioneer transition to support its next phase of growth. The new pioneer structure will help the company scale operations and refine its organizational strategy to pursue new growth opportunities. Focusing on expansion Championing innovation and partnership with strategic growth and market-defining innovationFounder Jeffrey Friedman will assume the role of Chief Evangelist, focusing on business development, innovation, and strategic partnerships. Marc Rubner has been appointed CEO and will lead the company's strategic growth, driving market-defining innovation, financial performance, and expansion. Advancing security solutions "We're grateful for Jeff's leadership and dedication to Building Intelligence. His vision has driven the company's growth and supported the development of vehicle, vendor, and visitor management solutions that ensure higher levels of security and drive efficiencies,” said Warren Haber, Chairman of the Board of Building Intelligence. “As we move into this next chapter, we're excited to welcome Marc to the business. With expertise in technology and strong leadership skills, he has a track record of creating long-term value. Under his direction, we'll continue innovating and strengthening our market position to meet the evolving needs of our clients and partners." Shaping secure solutions Building Intelligence will drive innovation, enhance safety, and shape the future of secure, scalable solutions worldwideUnder Rubner’s leadership, Building Intelligence will continue to deliver secure, scalable, and cutting-edge solutions that enhance safety and efficiency for clients worldwide. Friedman will amplify the company’s vision further, deepen engagement with clients and partners, and spearhead new opportunities that will drive industry advancements. A vision for growth “This transition represents a strategic step forward and ensures that Building Intelligence continues to lead the industry while strengthening our foundation for long-term success,” Friedman said. “I am excited to focus on expanding our market reach, driving innovation, and supporting Marc as he leads the company into the future.” Experienced leadership With more than 30 years of leadership experience, Rubner has guided organizations through transformation across multiple industries. He previously served as Founder and CEO of GreenStation Consulting and as CEO of DonorDrive. Market strategies expert Earlier, as Vice President, Product Management and Marketing, Community Engagement and Campus Enablement at Blackboard, he led go-to-market strategies for the organization, a pioneering provider of access control and identity management in the higher education segment. Building the next phase "I'm honored to join Building Intelligence at such an exciting time,” Rubner said. “Businesses continue to face challenges with securing and optimizing their facilities, from the lobby to the loading dock, and there is a significant opportunity to solve these problems through technology.” “I'm eager to drive the company forward, unlock significant value, and collaborate with our customers and partners as we embark on building our next phase of acceleration."


Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
Comelit-PAC has partnered with Harrold Jones Services Limited to deliver a stylish and secure access control solution at Warmstry Court, resolving security concerns and ensuring residents' safety and independence. Situated near Worcester’s city centre and next to the River Severn, Warmstry Court is an esteemed housing development, offering high-quality living for older residents while providing peace of mind through secure and comfortable surroundings. Unique security challenges The complex includes several general needs properties rented by Sanctuary Housing The complex includes several general needs properties rented by Sanctuary Housing. Its central location has posed unique security challenges, particularly regarding access control for the building’s car park and residential areas. Sanctuary Housing sought the expertise of Harrold Jones Services to address issues with their existing access control system. After a detailed risk assessment of the site’s needs, Harrold Jones Services collaborated with Comelit-PAC to design and install a tailored access control solution. The new system incorporates Comelit-PAC’s New Housing Central Product combined with High-Security Anti-Cloning Credentials, enabling site managers to monitor and control access from any PC or smart device, regardless of their location. Integrated with Comelit-PAC’s 512 series controllers Says Sanctuary Housing Scheme Manager Kim Tolnai: “The upgraded access control system has completely transformed how we manage the site. Residents now feel much more secure, and we have full control over who can enter the building and use the car park. The ability to monitor the system remotely has also been embraced by our management team. It gives us peace of mind, knowing we can monitor the site wherever we are.” The installation included high-frequency vandal-resistant readers on both the car park barrier and main entry points, integrated with Comelit-PAC’s 512 series controllers and the Housing Central Gateway. This combination delivers total security and reliability, ensuring only authorised residents can access the property and its parking facilities. Comelit-PAC solution A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents Says Danny Wallis, Director of Harrold Jones Services: “We worked closely with the team at Warmstry Court from early specification to ensure the access control system met the bespoke security requirements of the site. The Comelit-PAC solution has been instrumental in providing a comprehensive, future-proof system that seamlessly blends with surroundings with no impact on the aesthetics of the site. The result not only meets but exceeds the expectations of the residents and management team.” A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents. These secure tokens ensure that only authorised individuals can gain access, putting an end to the cloning issues that had previously plagued the site. Installation of the Comelit-PAC access control system Lloyd Palmer, Comelit-PAC’s Regional Sales Manager, provided on-site support to assist with the system’s setup and programming. He also ensured the management team at Warmstry Court was fully trained on the system’s features. Lloyd concluded: “The installation of the Comelit-PAC access control system has transformed security management at Warmstry Court. Sanctuary Housing now benefits from a robust system that ensures only authorised individuals have access to the building and its facilities. The advanced anti-cloning technology and the ability to manage the system remotely provide the ultimate in convenience, security and peace of mind for both residents and management.”
Durham, UK-based Northumbrian Water Group (NWG) has announced that it has selected global connected safety technology pioneer Blackline Safety Corp. to help uncover safety hazards and protect lone workers at two of its water treatment sites. The water company – which provides clean water and wastewater treatment services to nearly five million people across northeast and southeast England – is the eighth of the UK’s 12 water companies to choose Blackline’s safety devices. G7c personal gas monitor Blackline’s pioneering cloud-connected G7c personal gas wearable and EXO area monitor The technology includes Blackline’s pioneering cloud-connected G7c personal gas wearable and EXO area monitor, enabling NWG to consolidate gas detection, communication, and lone worker connectivity into a single device. NWG’s decision to turn to Blackline was spurred by the risks inherent in its operations, including exposure to gases, hazardous or contaminated water, explosions from hot work or combustible gas, confined space entry and lone work. Robust and versatile safety solution An explosion at a different company’s treatment plant within the wider water industry, where four workers died, also prompted the company to invest in a robust and versatile safety solution. “Feedback we were getting from the team on-site was that they just want to do their jobs but had too many devices, apps and things to think about, and anything we could do to simplify the process would be beneficial for everyone,” said Dan Woodward, Process Safety Business Partner at NWG. Mobile phones to maintain communication Workers had walkie-talkies, adding both complexity and cost with an additional device to manage Woodward added: “We were looking for a solution that addressed the need for gas detection and lone working features within one device and could significantly improve our safety and operational efficiency.” While NWG had in the past used portable gas monitors to detect hazardous gases, and mobile phones to maintain communication with workers, these devices had limitations – from cross-sensitivity issues that led to missed or faulty detection, operational downtime due to needing to send the devices off-site for calibrations, and mobile phones posing an ignition hazard in biogas-rich environments. Workers also had walkie-talkies, adding both complexity and cost with an additional device to manage. Remotely monitor gas levels Blackline’s all-in-one solution has significantly simplified the process for the water company. The EXO monitors, for example, remotely monitor gas levels in known high-risk areas. The G7 wearables enable multi-gas detection and reduce downtime as they can be calibrated on site. The personal devices’ integrated capabilities – such as remote monitoring and instant worker location identification – significantly boost lone worker safety, and push-to-talk capabilities (using the device like a walkie-talkie) means workers now have reliable communication while only needing to carry one device. Benefits of Blackline’s solution NWG was able to respond immediately by issuing a ‘stop work’ order, notifying workers NWG is already seeing the benefits of Blackline’s solution. With the help of EXO, they discovered a previously unidentified hazardous area on-site, reaching 75% of the explosive limit during operations. Upon receiving a high gas alert from EXO, NWG was able to respond immediately by issuing a ‘stop work’ order, notifying workers and safely evacuating the area. Preventative measures were then able to be implemented. Integrated into daily operations NWG also noted that the Blackline devices have seamlessly integrated into their daily operations, staying connected even in underground environments where cellular signal strength can be problematic. Analytics reports from collected device data highlight areas of concern, such as previously unknown high-gas exposure zones. Northumbrian Water will join Blackline Safety at the Health & Safety Event in Birmingham, UK, on April 9, 2025, to share insights on their decision to enhance worker safety through connected technology.
The university encountered a significant challenge with the competitor’s attendance tracking solution for its teaching staff. Seeking a more precise and seamless method of capturing daily attendance across multiple campuses, the institution aimed to establish a centralised platform for attendance management. The key objectives included enhancing ease of access for employees to view their attendance records and efficiently manage leave requests. A notable consideration was the need for a specialised provision to accommodate professors who frequently moved across campuses for lecture commitments. This case study delves into the university’s pursuit of a robust attendance management solution for 3000 users to address these specific challenges and optimise operational efficiency. Challenges The major challenges that the university faced for the smooth operation of Its Attendance Management System were: Inefficient Existing Attendance Management Solution: The university encountered difficulties with a competitor’s attendance management system, which proved more cumbersome than facilitative. Managing attendance across various faculties became a challenge, exacerbating complications in understanding university-level payroll processing. Irregularity in Daily Attendance Marking for Teaching Staff: A critical requirement for the university was the seamless daily marking of professors’ attendance. The need for effective channelisation of attendance arose to ensure precise tracking and streamlined payroll management. Improper Attendance Management across Multiple Campuses: Given the multi-location setup of the campuses, there was an urgent need for centralising attendance data. This centralised approach was essential for easily managing attendance across all locations. Delayed Data Transmission from Devices: The existing solution faced challenges as punch data from devices was not transmitted to the system in a timely manner. This delay resulted in complications, necessitating manual synchronisation efforts to address the issue. Inability for Employees to Access Attendance Data and Leave Management Issues: Staff faced limitations in checking their attendance data using the current system. Additionally, the absence of support for leave request submissions led to improper leave management practices, creating a need for more efficient solutions. These operational challenges prompted the university to seek innovative solutions, aiming to enhance the overall efficiency and effectiveness of its attendance management processes. Solution To tackle the pressing issues confronted by the client, Matrix successfully deployed a thorough solution that efficiently resolved the organisational issues they were facing. Matrix Implemented its Attendance Management System to achieve: Implementation of Comprehensive Attendance Management System: Matrix successfully deployed an Enterprise-grade Time-Attendance Solution, effectively addressing the client’s organisational challenges in attendance management. This solution streamlined the entire attendance process, eliminating complexities across diverse campuses. Effortless Attendance Marking for Teaching Staff: Matrix introduced biometric devices across various faculties, enabling seamless attendance punching for teaching staff. The widespread availability of devices ensured precise tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix implemented a centralised solution for attendance management, consolidating data from multiple campuses. This centralised approach facilitated efficient control and management of attendance across diverse locations. Automatic Data Transmission from Devices: Matrix Time-Attendance terminals were deployed with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal allowed users to view attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. The innovative solutions offered by Matrix not only addressed the client’s challenges but also significantly improved attendance operations, fostering enhanced efficiency throughout the organisation. This case study underscores Matrix’s ability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient control Matrix’s deployment of its Enterprise-grade Time-Attendance Solution remarkably transformed the operations of the historic Vadodara-based university. Overcoming challenges posed by an inefficient attendance management system, Matrix streamlined the entire process, offering clarity in payroll processing and easing attendance tracking across diverse faculties. Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient payroll management. Centralised attendance management system The introduction of a centralised attendance management system across multiple campuses enhanced control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals with automated data push technology, eliminating manual synchronisation. The implementation also included a user-friendly Employee Self-Service Portal, enabling staff to effortlessly view attendance data and submit leave requests. Matrix provided a hierarchy-based approval system that helped to streamline the client’s leave management requirements. The tailored solutions significantly improved operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix’s success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients.
Interface Systems, a managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, announced that Nicker Management, a fast-food franchise operator in the Los Angeles area, has successfully implemented Interface’s Virtual Security Guard solution. By deploying Interface’s advanced security technology, Nicker Management has enhanced safety, reduced operational costs, and provided a secure environment for employees and customers. Nicker Management Nicker Management, led by sisters Nicole Harper Rawlins (CEO) and Kerri Harper-Howie (Co-owner), operates 24 fast-food restaurants across South LA, Compton, Lynwood, and Carson. Faced with persistent security challenges, including loitering, panhandling, and criminal activity, the company sought a modern, cost-effective solution to protect its employees and guests. Addressing critical security concerns Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants “We’re faced with lots of challenges with crime, unhoused people, and individuals suffering from mental and/or substance abuse issues,” said Harper Rawlins. “It creates significant risk at our restaurants. Over the years, we experimented with a range of security solutions, and hiring on-site guards quickly became costly and unsustainable.” After evaluating various options, Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants, ensuring a proactive and scalable approach to security. How can Virtual Guard Solution help? 24/7 Monitoring & Rapid Response – Trained intervention specialists continuously monitor restaurant locations to deter loitering, panhandling, and aggressive behavior in real time. Automated Voice-Downs – Proactive announcements throughout the day signal active monitoring and reinforce security presence. Virtual Tours – Scheduled and unscheduled remote video assessments help identify threats, suspicious activities, and compliance issues. Employee Security Escorts – Live monitoring ensures employees' safe passage to and from their vehicles during vulnerable times such as shift changes, and opening, and closing hours. Secure working environment “Knowing there’s a professionally trained security team on standby gives us confidence that we can maintain a secure working environment at all hours,” said Harper Rawlins. The deployment of Virtual Guard has streamlined security operations at Nicker Management’s restaurant, allowing staff to focus on providing excellent customer service without the burden of handling security incidents. 24/7 monitoring With 24/7 monitoring by Virtual Guard, employees and customers feel safer, and staff no longer have to handle security threats alone. In addition, automated alerts also remind employees of key procedures during shift changes. The system's effectiveness was demonstrated during a recent incident when a loiterer refused to leave the restaurant lobby. The staff triggered a silent alarm, and the Virtual Guard team immediately responded with a voice-down, prompting the individual to leave without further incident. Optimises costs “Interface’s Virtual Guard solution empowers franchise businesses like Nicker Management to address security risks effectively while optimising operational costs,” said Sean Foley, Chief Revenue Officer at Interface Systems. “Our innovative approach allows employees to focus on delivering excellent service, knowing their safety is in trusted hands.”
Managing access to and around Helsinki Airport is a complex task. Around 15,000 people work there daily pre-pandemic passenger numbers hovered around 60,000 to 70,000. Challenges faced Only authorised people should have access to many areas at an airport. The management of movement — by passengers, staff, and contractors— is critical to Finavia’s mission to deliver an efficient service. They sought new access solutions to help. Finavia staff and customer safety is paramount. In addition, every new access control device must: Facilitate the move to keyless security at the airport, which aims to enhance user convenience. Offer compatibility so Finavia can secure all types of openings, from doors and cabinets to fences and cargo. Integrate seamlessly with the existing access control system and software used at Helsinki Airport. Meet essential requirements for securing such a sensitive site: safety, functionality, durability and usability. Solution With Aperio H100 battery-powered handles, all types of airport doors are connected Partnering with ASSA ABLOY gave Finavia a vast choice of solutions to meet its complex security needs. With Aperio H100 battery-powered handles, all types of airport doors are connected to their access control system. This Aperio solution with inbuilt RFID capability was easy to install without the cabling that traditional devices require. “We see in real-time who will open the lock and when, and we can modify and grant access rights, remotely,” explains Kari Mäkinen. Programmable, secure ID cards Authorised building users come and go with programmable, secure ID cards. It’s much more convenient than a mechanical key, “The access cards of both Finavia personnel and staff of other companies are easily programmed with necessary access rights,” he adds. “When employees change, their access is disabled. Or if the card gets lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” Durability, security of supply, and usability Multiple compatible ASSA ABLOY solutions are deployed alongside wireless Aperio and CLIQ door devices. Keyless, mobile-operated padlocks secure fencing and cargo. An antimicrobial coating on door handles helps to prevent germ spread and reassures staff. The availability of all these solutions from a single manufacturer helped Finavia to create a unified, integrated system at Helsinki Airport. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” said Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
Comelit-PAC has partnered with Harrold Jones Services Limited to deliver a stylish and secure access control solution at Warmstry Court, resolving security concerns and ensuring residents' safety and independence. Situated near Worcester’s city centre and next to the River Severn, Warmstry Court is an esteemed housing development, offering high-quality living for older residents while providing peace of mind through secure and comfortable surroundings. Unique security challenges The complex includes several general needs properties rented by Sanctuary Housing The complex includes several general needs properties rented by Sanctuary Housing. Its central location has posed unique security challenges, particularly regarding access control for the building’s car park and residential areas. Sanctuary Housing sought the expertise of Harrold Jones Services to address issues with their existing access control system. After a detailed risk assessment of the site’s needs, Harrold Jones Services collaborated with Comelit-PAC to design and install a tailored access control solution. The new system incorporates Comelit-PAC’s New Housing Central Product combined with High-Security Anti-Cloning Credentials, enabling site managers to monitor and control access from any PC or smart device, regardless of their location. Integrated with Comelit-PAC’s 512 series controllers Says Sanctuary Housing Scheme Manager Kim Tolnai: “The upgraded access control system has completely transformed how we manage the site. Residents now feel much more secure, and we have full control over who can enter the building and use the car park. The ability to monitor the system remotely has also been embraced by our management team. It gives us peace of mind, knowing we can monitor the site wherever we are.” The installation included high-frequency vandal-resistant readers on both the car park barrier and main entry points, integrated with Comelit-PAC’s 512 series controllers and the Housing Central Gateway. This combination delivers total security and reliability, ensuring only authorised residents can access the property and its parking facilities. Comelit-PAC solution A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents Says Danny Wallis, Director of Harrold Jones Services: “We worked closely with the team at Warmstry Court from early specification to ensure the access control system met the bespoke security requirements of the site. The Comelit-PAC solution has been instrumental in providing a comprehensive, future-proof system that seamlessly blends with surroundings with no impact on the aesthetics of the site. The result not only meets but exceeds the expectations of the residents and management team.” A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents. These secure tokens ensure that only authorised individuals can gain access, putting an end to the cloning issues that had previously plagued the site. Installation of the Comelit-PAC access control system Lloyd Palmer, Comelit-PAC’s Regional Sales Manager, provided on-site support to assist with the system’s setup and programming. He also ensured the management team at Warmstry Court was fully trained on the system’s features. Lloyd concluded: “The installation of the Comelit-PAC access control system has transformed security management at Warmstry Court. Sanctuary Housing now benefits from a robust system that ensures only authorised individuals have access to the building and its facilities. The advanced anti-cloning technology and the ability to manage the system remotely provide the ultimate in convenience, security and peace of mind for both residents and management.”
Durham, UK-based Northumbrian Water Group (NWG) has announced that it has selected global connected safety technology pioneer Blackline Safety Corp. to help uncover safety hazards and protect lone workers at two of its water treatment sites. The water company – which provides clean water and wastewater treatment services to nearly five million people across northeast and southeast England – is the eighth of the UK’s 12 water companies to choose Blackline’s safety devices. G7c personal gas monitor Blackline’s pioneering cloud-connected G7c personal gas wearable and EXO area monitor The technology includes Blackline’s pioneering cloud-connected G7c personal gas wearable and EXO area monitor, enabling NWG to consolidate gas detection, communication, and lone worker connectivity into a single device. NWG’s decision to turn to Blackline was spurred by the risks inherent in its operations, including exposure to gases, hazardous or contaminated water, explosions from hot work or combustible gas, confined space entry and lone work. Robust and versatile safety solution An explosion at a different company’s treatment plant within the wider water industry, where four workers died, also prompted the company to invest in a robust and versatile safety solution. “Feedback we were getting from the team on-site was that they just want to do their jobs but had too many devices, apps and things to think about, and anything we could do to simplify the process would be beneficial for everyone,” said Dan Woodward, Process Safety Business Partner at NWG. Mobile phones to maintain communication Workers had walkie-talkies, adding both complexity and cost with an additional device to manage Woodward added: “We were looking for a solution that addressed the need for gas detection and lone working features within one device and could significantly improve our safety and operational efficiency.” While NWG had in the past used portable gas monitors to detect hazardous gases, and mobile phones to maintain communication with workers, these devices had limitations – from cross-sensitivity issues that led to missed or faulty detection, operational downtime due to needing to send the devices off-site for calibrations, and mobile phones posing an ignition hazard in biogas-rich environments. Workers also had walkie-talkies, adding both complexity and cost with an additional device to manage. Remotely monitor gas levels Blackline’s all-in-one solution has significantly simplified the process for the water company. The EXO monitors, for example, remotely monitor gas levels in known high-risk areas. The G7 wearables enable multi-gas detection and reduce downtime as they can be calibrated on site. The personal devices’ integrated capabilities – such as remote monitoring and instant worker location identification – significantly boost lone worker safety, and push-to-talk capabilities (using the device like a walkie-talkie) means workers now have reliable communication while only needing to carry one device. Benefits of Blackline’s solution NWG was able to respond immediately by issuing a ‘stop work’ order, notifying workers NWG is already seeing the benefits of Blackline’s solution. With the help of EXO, they discovered a previously unidentified hazardous area on-site, reaching 75% of the explosive limit during operations. Upon receiving a high gas alert from EXO, NWG was able to respond immediately by issuing a ‘stop work’ order, notifying workers and safely evacuating the area. Preventative measures were then able to be implemented. Integrated into daily operations NWG also noted that the Blackline devices have seamlessly integrated into their daily operations, staying connected even in underground environments where cellular signal strength can be problematic. Analytics reports from collected device data highlight areas of concern, such as previously unknown high-gas exposure zones. Northumbrian Water will join Blackline Safety at the Health & Safety Event in Birmingham, UK, on April 9, 2025, to share insights on their decision to enhance worker safety through connected technology.
The university encountered a significant challenge with the competitor’s attendance tracking solution for its teaching staff. Seeking a more precise and seamless method of capturing daily attendance across multiple campuses, the institution aimed to establish a centralised platform for attendance management. The key objectives included enhancing ease of access for employees to view their attendance records and efficiently manage leave requests. A notable consideration was the need for a specialised provision to accommodate professors who frequently moved across campuses for lecture commitments. This case study delves into the university’s pursuit of a robust attendance management solution for 3000 users to address these specific challenges and optimise operational efficiency. Challenges The major challenges that the university faced for the smooth operation of Its Attendance Management System were: Inefficient Existing Attendance Management Solution: The university encountered difficulties with a competitor’s attendance management system, which proved more cumbersome than facilitative. Managing attendance across various faculties became a challenge, exacerbating complications in understanding university-level payroll processing. Irregularity in Daily Attendance Marking for Teaching Staff: A critical requirement for the university was the seamless daily marking of professors’ attendance. The need for effective channelisation of attendance arose to ensure precise tracking and streamlined payroll management. Improper Attendance Management across Multiple Campuses: Given the multi-location setup of the campuses, there was an urgent need for centralising attendance data. This centralised approach was essential for easily managing attendance across all locations. Delayed Data Transmission from Devices: The existing solution faced challenges as punch data from devices was not transmitted to the system in a timely manner. This delay resulted in complications, necessitating manual synchronisation efforts to address the issue. Inability for Employees to Access Attendance Data and Leave Management Issues: Staff faced limitations in checking their attendance data using the current system. Additionally, the absence of support for leave request submissions led to improper leave management practices, creating a need for more efficient solutions. These operational challenges prompted the university to seek innovative solutions, aiming to enhance the overall efficiency and effectiveness of its attendance management processes. Solution To tackle the pressing issues confronted by the client, Matrix successfully deployed a thorough solution that efficiently resolved the organisational issues they were facing. Matrix Implemented its Attendance Management System to achieve: Implementation of Comprehensive Attendance Management System: Matrix successfully deployed an Enterprise-grade Time-Attendance Solution, effectively addressing the client’s organisational challenges in attendance management. This solution streamlined the entire attendance process, eliminating complexities across diverse campuses. Effortless Attendance Marking for Teaching Staff: Matrix introduced biometric devices across various faculties, enabling seamless attendance punching for teaching staff. The widespread availability of devices ensured precise tracking and efficient payroll management. Centralised Attendance Management Across Multiple Campuses: Matrix implemented a centralised solution for attendance management, consolidating data from multiple campuses. This centralised approach facilitated efficient control and management of attendance across diverse locations. Automatic Data Transmission from Devices: Matrix Time-Attendance terminals were deployed with automated data push technology. This feature ensured timely and automated data transfer from devices to the server, eliminating the need for manual synchronisation and enhancing operational efficiency. User-Friendly Employee Self-Service Portal: Matrix provided a comprehensive solution, including an Employee Self-Service portal. This portal allowed users to view attendance data on their devices and submit leave requests. With its hierarchy-based approval system, Matrix streamlined the leave management process. The innovative solutions offered by Matrix not only addressed the client’s challenges but also significantly improved attendance operations, fostering enhanced efficiency throughout the organisation. This case study underscores Matrix’s ability to tailor solutions to meet unique client needs, ultimately optimising business processes. Results Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient control Matrix’s deployment of its Enterprise-grade Time-Attendance Solution remarkably transformed the operations of the historic Vadodara-based university. Overcoming challenges posed by an inefficient attendance management system, Matrix streamlined the entire process, offering clarity in payroll processing and easing attendance tracking across diverse faculties. Matrix biometric devices facilitated seamless marking for teaching staff, ensuring efficient payroll management. Centralised attendance management system The introduction of a centralised attendance management system across multiple campuses enhanced control and efficiency in handling attendance data. Matrix addressed delays in data transmission by deploying terminals with automated data push technology, eliminating manual synchronisation. The implementation also included a user-friendly Employee Self-Service Portal, enabling staff to effortlessly view attendance data and submit leave requests. Matrix provided a hierarchy-based approval system that helped to streamline the client’s leave management requirements. The tailored solutions significantly improved operational efficiency, resulting in a more streamlined, accurate, and transparent organisational operation. Matrix’s success in optimising attendance processes underscores its commitment to delivering innovative solutions tailored to the unique requirements of its clients.
Interface Systems, a managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, announced that Nicker Management, a fast-food franchise operator in the Los Angeles area, has successfully implemented Interface’s Virtual Security Guard solution. By deploying Interface’s advanced security technology, Nicker Management has enhanced safety, reduced operational costs, and provided a secure environment for employees and customers. Nicker Management Nicker Management, led by sisters Nicole Harper Rawlins (CEO) and Kerri Harper-Howie (Co-owner), operates 24 fast-food restaurants across South LA, Compton, Lynwood, and Carson. Faced with persistent security challenges, including loitering, panhandling, and criminal activity, the company sought a modern, cost-effective solution to protect its employees and guests. Addressing critical security concerns Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants “We’re faced with lots of challenges with crime, unhoused people, and individuals suffering from mental and/or substance abuse issues,” said Harper Rawlins. “It creates significant risk at our restaurants. Over the years, we experimented with a range of security solutions, and hiring on-site guards quickly became costly and unsustainable.” After evaluating various options, Nicker Management chose Interface Systems to implement the Virtual Guard solution at one of its restaurants, ensuring a proactive and scalable approach to security. How can Virtual Guard Solution help? 24/7 Monitoring & Rapid Response – Trained intervention specialists continuously monitor restaurant locations to deter loitering, panhandling, and aggressive behavior in real time. Automated Voice-Downs – Proactive announcements throughout the day signal active monitoring and reinforce security presence. Virtual Tours – Scheduled and unscheduled remote video assessments help identify threats, suspicious activities, and compliance issues. Employee Security Escorts – Live monitoring ensures employees' safe passage to and from their vehicles during vulnerable times such as shift changes, and opening, and closing hours. Secure working environment “Knowing there’s a professionally trained security team on standby gives us confidence that we can maintain a secure working environment at all hours,” said Harper Rawlins. The deployment of Virtual Guard has streamlined security operations at Nicker Management’s restaurant, allowing staff to focus on providing excellent customer service without the burden of handling security incidents. 24/7 monitoring With 24/7 monitoring by Virtual Guard, employees and customers feel safer, and staff no longer have to handle security threats alone. In addition, automated alerts also remind employees of key procedures during shift changes. The system's effectiveness was demonstrated during a recent incident when a loiterer refused to leave the restaurant lobby. The staff triggered a silent alarm, and the Virtual Guard team immediately responded with a voice-down, prompting the individual to leave without further incident. Optimises costs “Interface’s Virtual Guard solution empowers franchise businesses like Nicker Management to address security risks effectively while optimising operational costs,” said Sean Foley, Chief Revenue Officer at Interface Systems. “Our innovative approach allows employees to focus on delivering excellent service, knowing their safety is in trusted hands.”


Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Products


White papers

Is access control in the cloud more cost effective?
Download
Innovative edge storage solutions for the video surveillance industry
Download
Enhanced Ethernet Technology (ePoE)
Download
Do you know the weakest link of your access control system?
Download
Safeguard Students With New Techniques And Technology
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Smart security cameras: excellence in retail
Download
Is access control in the cloud more cost effective?
Download
Innovative edge storage solutions for the video surveillance industry
Download
Enhanced Ethernet Technology (ePoE)
Download
Do you know the weakest link of your access control system?
Download
Safeguard Students With New Techniques And Technology
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Smart security cameras: excellence in retail
Download

Videos
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Hanwha Vision Security devices
- Aritech Security devices
- Parabit Security devices
- VIVOTEK Security devices
- LILIN Security devices
- Hikvision Security devices
- BCDVideo Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- AV Costar Security devices
- HID Security devices

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download