Security devices
Athena Security Weapons Detection System, a global provider of advanced, AI-enabled security solutions, has launched its newly created 'Workforce Multiplier' weapons detection system with integrated AI X-ray scanning technology (patent pending). Together, Athena’s AI-powered weapons detection and AI X-ray provide unparalleled accuracy and efficiency in identifying potential threats. The new AI X-ray scanning technology fully integrates into Athena’s WDS system and requires only one...
Auguria, Inc., a pioneer in AI-powered security operations solutions announced the latest version of its Security Knowledge Layer™ Platform. The newly enhanced platform can integrate with some of today's biggest data sources, including SentinelOne, CrowdStrike, Palo Alto Networks, and Microsoft Windows Event Logs. Auguria also unveiled its Explainability Graph Feature, a trailblazing tool that provides visual, context-rich threat data for security teams. Expanded integrations Secur...
iDenfy, a global RegTech company specialising in Know Your Customer (KYC), Anti-Money Laundering (AML), and Know Your Business (KYB) verification solutions, has announced its achievement of SOC II certification with the submission of an independent auditor’s report. New office This milestone confirms iDenfy’s position as a trusted partner in the US market, ensuring that its data handling practices meet rigorous standards of security and confidentiality. The certification coi...
Allegion US, a pioneer in security products and solutions, is the first to support mobile credentials in Google Wallet™ on Wear OS smartwatches. Available starting December 9, 2024, for all Schlage® mobile credentials currently offered in Google Wallet on Android™, such as student IDs and employee badges, the solution equips Wear OS smartwatch users with convenience, enhanced security, and seamless access. Secure access "We are privileged to be the first security sol...
Node4, a cloud-led digital transformation Managed Services Provider (MSP), has announced the appointment of Richard Moseley as Chief Executive Officer (CEO), with Founder and previous CEO, Andy Gilbert becoming President and Board Member. Growth strategy The announcement is part of a strategy to strengthen Node4’s executive team as the company embarks on the next phase of its growth journey. Moseley will work closely with Gilbert to complete an in-depth induction and handover, after w...
Sensitive data exposure is a top concern given the volume and types of data consumed by generative AI (Gen AI). Inadequate sensitive data controls and resulting data leakage can halt the use of innovative AI tools. DSPM helps accelerate AI adoption by quickly and easily identifying data risks, which is why Rubrik, Inc. is announcing Rubrik DSPM in RSC. Available in early 2025, organisations can rapidly enable DSPM for increased data visibility and sensitive data control across cloud, SaaS, and...
News
DNAKE, a global pioneer in IP video intercom and smart home solutions, is proud to announce the launch of its latest innovation: H616 8” Indoor Monitor. This cutting-edge smart intercom is designed to enhance communication and home security while offering a premium user experience. H616 combines a sleek design with advanced technology, making it ideal for both residential and commercial applications. Key features of the H616 Vertical Installation: The H616 can be easily rotated 90° to suit the installation environment, with an option to select a portrait UI mode. This flexibility is perfect for areas with limited space, such as narrow hallways or near entrance doors, without compromising on functionality. The vertical orientation maximises the device’s efficiency and ease of use in tight spaces. Wall-Cling Design: The embedded bracket in the back cover allows the H616 to cling to the wall, creating a streamlined, elegant, and clean appearance that adds a touch of sophistication to any room. Its slim profile ensures a modern, minimalistic aesthetic that complements contemporary interiors. Choice of Colour Variants: To suit different interior styles, the H616 is available in two timeless colour options, classic black and elegant silver. This variety ensures the device can seamlessly blend into any environment, whether it's a residential living room, office space, or commercial establishment. Android 10 Operating System: The H616 operates on the reliable and robust Android 10, offering fast performance, smooth navigation, and compatibility with a broad range of applications. Whether for home automation, security control, or other smart device management, Android 10 ensures the H616 is highly functional and adaptable to users' needs. User-friendly intercom and smart home solutions “We are thrilled to introduce the H616 as part of our ongoing efforts to bring innovative, user-friendly intercom and smart home solutions to our customers,” said Alex, Vice President at DNAKE. “Driven by customer demand, H616 marks the first 8” indoor monitor in our product lineup. With its powerful operating system, vertical design, and premium features, we believe the H616 will provide users with an enhanced, secure communication experience that fits seamlessly into modern living and working spaces.”
The solar system has fascinated mankind for thousands of years. Astronomical research is looking for answers to the big questions of human existence. How big is the universe? How did it come into being? Astronomers all over the world are casting their gaze into space. However, it is not only huge space telescopes that provide spectacular images, smaller telescopes equipped with standard industrial cameras also allow backyard astronomers to look far and gain new insights. Image sensors However, in addition to versatile camera software, the right sensors are crucial for the quality of the images. Australian amateur astronomer Anthony Wesley has found the uEye XCP camera from IDS, equipped with Sony Starvis 2 sensors, to be an excellent choice for capturing high-resolution pictures of the neighbouring planets including Venus, Mars, Jupiter, and Saturn. Astrophotography Astrophotography has to overcome special challenges in two respects, both technical and natural. This applies in particular to telescopic images of planets. Technical challenges Seeing leads to a flickering or blurring of the objects, especially when observing through earthbound telescopes Firstly, the Earth's atmosphere is constantly in motion, creating turbulence that distorts the light coming from the stars or planets. This so-called ‘seeing’ leads to a flickering or blurring of the objects, especially when observing through earthbound telescopes. This blurring and distortion caused by atmospheric turbulence makes it difficult to capture detailed images. Natural challenges Secondly, the earth's atmosphere absorbs and scatters visible or short-wave blue light. Near-infrared light, on the other hand, is scattered less, which leads to clearer and sharper images. This is particularly important in regions with poor ‘seeing’ conditions caused by air turbulence. In addition, infrared light penetrates thin clouds and dust particles better than visible light. NIR-sensitive sensors By using a NIR-sensitive camera, astronomers can look behind these interstellar dust clouds and recognise structures that remain hidden in visible light. This applies, for example, to young stars and star-forming regions, which are usually surrounded by dense dust clouds. But the same applies to capturing images of large planets such as Saturn or Jupiter: the more powerful the camera in the low-light range, the more informative the images will be. Not to be neglected: Infrared light is less influenced by artificial light sources on Earth. This means that NIR-sensitive sensors also offer better conditions for observing the sky in areas with moderate light pollution. Application U3-38C0XCP-M-NO which is equipped with the IMX662 monochrome sensor, delivers excellent results Cameras with particularly high NIR sensitivity are therefore in high demand. In this context, amateur astronomer Anthony Wesley has investigated the performance of IDS cameras from the XCP family with Starvis 2 class sensors and their suitability for planetary photography - with success: The IDS camera model U3-38C0XCP-M-NO which is equipped with the IMX662 monochrome sensor, delivers excellent results. One- to two-minute video segments "The IDS camera is the imaging element for a telescope with an aperture of 415 millimetres and a focal length of 6000 millimetres," he explains the camera's function. "It records one- to two-minute video segments of planets such as Jupiter and Saturn at a speed of around 60 frames per second through interchangeable filters, both in visible light and in the infrared range." Barlow lens To form a single optical unit that fits into the eyepiece socket of the telescope, Anthony Wesley screwed the IDS camera, filter wheel, and Barlow lens directly together. The Barlow lens between the eyepiece and the telescope extends the focal path of the telescope and thus increases the magnification without the need for an additional eyepiece. "The IDS camera base has been modified to allow mounting at a low distance, as I don't need the standard C/CS distance," he explains the design. Higher image quality U3-38C0XCP Rev.1.2 model with the 2.16 MPixel IMX662 rolling shutter sensor achieves exceptional images But what features make the camera particularly suitable for this application? "Light sensitivity that goes far beyond the human eye - that's what sensors with Starvis 2 technology from Sony stand for," says Jürgen Hejna, Product Manager of uEye cameras at IDS, summarising the strength of the sensors. For example, the U3-38C0XCP Rev.1.2 model with the 2.16 MPixel IMX662 rolling shutter sensor achieves exceptional image quality with a particularly high dynamic range thanks to the pixel technology. USB3 camera The USB3 camera delivers a fast 88 images per second and is particularly strong in low-light applications where high sensitivity and low resolution are required. The 1/3’’ sensor also minimises distracting reflections within the camera thanks to so-called “Anti-Reflection Coating”. Advantages For Anthony Wesley, the compact camera has further advantages: "The compact, lightweight uEye XCP is well suited for amateur telescopes. The uEye cameras are inexpensive, but offer almost all the functions that amateur astronomers want for this application." He was also impressed by the easy integration of the IDS cameras via the IDS peak software development kit. "I am the developer and maintainer of the IDS camera module in the FireCapture software, which is popular with amateur astronomers. The IDS module is written in C with Microsoft Visual Studio and is compiled into a DLL that can be easily loaded into FireCapture to enable the use of the comprehensive software features." Image processing The video segments recorded using FireCapture are then further processed using Autostakkert The video segments recorded using FireCapture are then further processed using Autostakkert, a Windows software programme that automatically aligns and merges the images of the night sky. "The software combines and averages the individual images and corrects for blurring and distortion caused by the Earth's atmosphere," explains Anthony Wesley. These blurs can appear as blurring or image noise and obscure important details in the images. Method of deconvolution In astronomical imaging, the method of deconvolution is therefore used to optimise the image quality of telescope images and to correct blurred or distorted images. In this case, the Astra Image and Registax software packages are used for deconvolution and image sharpening. In the next step, the observed rotation of the target object during the recording time must be corrected. Winjupos software "For example, Jupiter rotates by one degree every 90 seconds," says Anthony. The Winjupos software is used for this, which can be used to superimpose, derogate and adjust time-shifted images and videos and to merge red/green/blue images into one colour image. "The final image clean-up is done with Gimp. In this way, the post-processing of the video can compensate for the blurring effect of the earth's atmosphere and drastically reduce it so that a clear image of the target object is created," says Anthony, summarising the final image processing procedure. Software The IDS cameras are easily integrated using the IDS peak software development kit To guarantee all this, however, perfect interaction between hardware and software is required. The IDS cameras are easily integrated using the IDS peak software development kit (SDK). "IDS peak is perfectly matched to our hardware, allowing users to get the most out of our cameras. It includes programmeming interfaces and software tools that ensure an intuitive programmeming experience, quick and easy installation, and versatile application options," emphasises Damien Wang, Area Sales Manager at IDS. This makes it possible to utilise the extensive features of the FireCapture software specially developed for astrophotography. Sensitivity in the infrared range "With the uEye XCP models, we are not only offering something new in our portfolio but are also once again among the pioneers in the industrial camera market. The current sensor technology of these cameras ensures high frame rates, and remarkably high image quality - and impresses with its high sensitivity in the infrared range, even when used in low-light situations such as planetary photography." "With the components used here, not only professional but also amateur astronomers can take particularly high-resolution images of celestial objects," emphasises Jürgen Hejna. Class 2 Sony Starvis sensors Anthony Wesley has been observing planets as well as the camera market very closely for over twenty years. "Cameras and technology made an evolutionary step forward from the past, in either NIR sensitivity or low noise." "The technology of the uEye XCP in combination with the class 2 Sony Starvis sensors are undoubtedly among the best currently available," he concludes. Outlook "Cameras based on the Sony Starvis 2 sensors will be popular with amateur astronomers in the planetary imaging community due to their high sensitivity, great depth of field, and low noise," says Anthony Wesley. "Especially in the NIR range between 700 nm and 1000 nm, where very interesting work can be achieved that will advance our understanding of other planets in our solar system." However, the field of application of the cameras does not only extend into space. "Many of the techniques used can also be applied to other areas with similar challenges, such as underwater imaging in low-light environments," recommends the Australian. Camera: uEye XCP - The industry's smallest housed camera with C-mount. Model used: U3-38C0XCP-M-NO Camera Family: uEye XCP
Innodisk, a global AI solution and industrial-grade memory provider, has received the 2025 Taiwan Excellence Award for three of its innovative products. The award recognises Innodisk’s strengths in product innovation, R&D, and quality control. Award-winning products The three award-winning products are the CXL Memory Module, DDR5 Air/Immersive Dual Cooling Memory, and E1.S 4TS2-P SSD. These products highlight Innodisk’s focus on providing stable and long-term solutions for the industrial market. They also show how Innodisk designs its products to meet the needs of next-generation standards. CXL Memory Module It also uses a PCIe interface to overcome the bandwidth limits of traditional memory channels The CXL Memory Module delivers a single 64GB capacity and up to 32GB/s bandwidth. It is designed for flexible and cost-effective expansion in server systems. It enables "memory resource sharing" by using memory pooling technology. It also uses a PCIe interface to overcome the bandwidth limits of traditional memory channels. DDR5 Air/Immersive Dual Cooling Memory The DDR5 Air/Immersive Dual Cooling Memory is designed to work in different cooling environments. It features a unique fin design that covers all heat-generating components with thermal materials. It supports both air and liquid cooling modes, which helps address the cooling challenges in modern AI servers. With a single memory capacity of 128GB and high-speed transmission of 5600 MT/s, it meets the high-efficiency computing needs of AI servers. E1.S 4TS2-P SSD It is suited for edge server environments and includes wide-temperature technology The other award-winning product, the E1.S 4TS2-P SSD, offers better performance, cooling, storage density, and maintenance convenience compared to traditional M.2 and U.2 SSDs. It is suited for edge server environments and includes wide-temperature technology that works between -40 and 85°C. It helps solve overheating problems in edge servers. It also contains hot-swappable functionality and multiple capacity options, making it a strong choice as a boot drive for data centres. RoHS standards The enclosures of all three products are made of recyclable aluminum alloy, and all materials meet RoHS standards. This ensures the products align with environmental and safety requirements. Innodisk stays in step with global trends in product design, quality control, research and development, and manufacturing. It aims to bring fresh energy to the growth of industrial development.
Ipsotek, a global pioneer in AI-powered video analytics, has announced the appointment of Sean Grimm as US Country Manager. This strategic move underscores the company’s commitment to expanding its presence in the United States and investing in market growth. Sean Grimm Sean brings over 25 years of expertise in physical and electronic security, with a distinguished career spanning computer vision, AI, and sales leadership. Most recently, he served as VP of AIoT Sales at EPIC iO Technologies, where he led a team focused on on-site security and computer vision for critical infrastructure. Before that, Sean successfully led sales teams for the Eastern US and Canada at BriefCam and held key roles at industry pioneers, including Hitachi, Hanwha Vision, Diebold Nixdorf, Johnson Controls, and Verint. Talent and innovation investment "Sean’s extensive experience in computer vision and AI, combined with his proven leadership in building teams and driving revenue growth, makes him the ideal pioneer to expand Ipsotek’s presence in the US," said Dr. Boghos Boghossian, CTO & Sales Director at Ipsotek. He adds, "His appointment reinforces our commitment to investing in talent and innovation as we continue to deliver cutting-edge solutions to meet the growing demand in this market." AI-powered video analytics Commenting on his new role, Sean Grimm said, "I am excited to join Ipsotek at such a pivotal time in its growth journey." He adds, "The company’s innovative approach to AI-powered video analytics is transforming industries, and I am eager to bring these solutions to our US customers." Goals in computer vision Sean Grimm continues, "I look forward to working with the talented Ipsotek team to expand our reach, foster strong partnerships, and help organisations achieve their goals in computer vision and AI implementation." Sean’s appointment represents an important milestone for Ipsotek in the US, as the company leverages his expertise to drive growth, build new partnerships, and strengthen its position as a pioneer of AI-powered solutions.
Integrated Access Control and Security manufacturer - TDSi announces it will be joining forces with fellow Vitaprotech Group companies - Harper Chalice, PRYSM, and Hirsch for its forthcoming appearance at Intersec 2025, which takes place from 14th – 16th January in Dubai, UAE. The combined stand, S3 B32, will offer visitors a comprehensive insight into the best access control, perimeter intrusion detection, and intelligent monitoring solutions. Secure access control Thibaut Galland, Vitaprotech Group’s Chief Operating Officer (COO) for the UK commented, "TDSi has been a fixture at Intersec in Dubai for many years, showcasing the best in secure access control with a well-deserved reputation for technical excellence and outstanding service." He adds, "With our group members working in close collaboration to deliver the best-integrated security solutions on the market, this event is the ideal opportunity for visitors to meet the Harper Chalice, PRYSM, and Hirsch teams, who will be providing expert assistance and advice on specific security requirements and projects, all in one place." GARDiS v3.0 GARDiS is perfect for any secure access control application, including ACaaS and easily adapting access control TDSi will be discussing the latest and largest upgrade to its GARDiS Software platform, GARDiS v3.0, and giving visitors to Intersec the first preview of its extensively expanded features list. The company will also be on hand to talk about its extensive range of GARDiS hardware, which delivers a highly scalable browser-based solution that utilises browser-based software for ease of installation and use. GARDiS is perfect for any secure access control application, including Access Control as a Service (ACaaS), and easily adapting access control to the security needs of a rapidly evolving world. TriSecure solution, AppVision™ Hypervision platform Meanwhile, Harper Chalice is set to showcase its products, including the NPSA (CPNI) approved TriSecure solution, which combines FenceSecure PIDS and PulseSecure electric fence, along with the NPSA (CPNI) approved HatchSecure detection system. PRYSM will present its AppVision™ Hypervision platform, designed for security, safety, and technical management systems. Open, scalable, and neutral, it ensures the integration and management of equipment and applications within a single interface, no matter the project’s size or complexity. ScrambleFactor SF.3 Reader Hirsch’s solutions are designed for the most secure facilities and span physical access control New Vitaprotech members Hirsch will showcase its range of Secure Access Control Units and Readers, including the award-winning ScrambleFactor SF.3 Reader. Hirsch’s solutions are designed for the most secure facilities and span physical access control, video intelligence, and identity and smart card reader solutions. Intersec 2025 Intersec 2025 follows on from the event’s celebration of 25 years of success in 2024, where it attracted over 47,000 trade buyers from 141 countries, drawing in visitors from the Middle East and well beyond to see the latest and best in security solutions. TDSi, Harper Chalice, PRYSM, and Hirsch will appear at Intersec 2025, on Stand S3 B32, at the Dubai World Trade Centre from 14th – 16th January 2025.
Brady Corporation offers a new, more cost-efficient solution to quickly detect unstable Li-ion batteries in storage. Able to automatically measure 0,5°C temperature differences per second, the solution provides the accuracy and speed needed to isolate unstable batteries before they become a safety risk. Brady’s new battery temperature monitoring solution involves three components: self-adhesive battery-free UHF RFID labels with embedded temperature sensors, RFID readers with up to 16 antennas, and a customisable RFID software platform. RFID software platform RFID antennas and readers automatically power all labels and sensors in range to pile temperature readings The self-adhesive UHF RFID-embedded labels can be applied inside battery cell boxes for fast temperature change detection. Alternatively, every battery cell can be labelled with Brady’s on-metal, printable UHF RFID labels to enable more elaborate advantages in Li-ion battery supply chains. Every second, the RFID antennas and readers automatically power all labels and sensors in range to collect temperature readings with 0.5°C accuracy. Every temperature reading, and matching battery storage location, is collected by the RFID software platform. When customisable temperature thresholds are reached, the software platform triggers third-party devices via standard API. Brady’s software platform API With almost continuous, automated and accurate temperature monitoring, warehouse stakeholders can receive early warnings via sms, email or even racking warning lights. They can be guided in time to specific warehouse locations for unstable Li-ion battery isolation. Alternatively, Brady’s software platform API can also trigger an autonomous vehicle to automatically remove an unstable battery. RFID tags or IR cameras Battery-free UHF RFID labels with embedded sensors are a more cost-effective battery temperature monitoring solution than powered RFID tags or IR cameras. UHF RFID labels and their temperature sensors receive power wirelessly from RFID antennas and readers in range. They are available at significantly lower costs - up to five times less than battery-powered RFID tags-and do not require maintenance. Temperature monitoring solution Brady connects up to 16 antennas to a single RFID reader that provides high accuracy and high-speed The number of RFID readers needed to completely cover storage locations in a warehouse heavily depends on warehouse setup, racking height and storage volume per racking compartment. Brady can connect up to 16 antennas to a single RFID reader that provides high accuracy, high-speed temperature monitoring for all storage locations in 12-metre-wide and 4-metre high racking. The automated, and almost continuous, nature of the temperature monitoring solution enables Li-ion battery manufacturers and logistics companies to significantly increase safety and reduce risk at advantageous costs. Brady’s RFID readers By adding an RFID reader gate at designated warehouse exits, Brady’s solution can also enable automated, real-time warehouse inventories. RFID labelled items are read by Brady’s RFID readers the moment their label enters reader range. When they pass through a designated RFID reader gate, these items can easily be subtracted from the inventory by the RFID software platform. When used in this way, the solution can provide cost-effective battery track & trace inside the warehouse from entry to exit, complete with battery cell box or battery cell temperature fluctuation in between.
Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Challenges with existing CCTV Daniel Chappell, Technical Account Manager at North takes up the story, “Historically, South Shields had an existing public safety CCTV system, which was mainly street-focused." "However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate a new surveillance solution, to cover its twelve town centre car parks." New solution requirements “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirements and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation." “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibreoptic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive." TX streaming camera “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling." "Taking up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross-referenced with network operators to provide the best quality of signal at each specific camera location.” Invictus PTZ TX cameras Authorised operatives in the field can view selected Invictus TX camera images using a laptop browser Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Car park safety and security Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said, “This investment forms part of wider improvements to our CCTV provision which is a vital tool in helping to keep our residents and visitors safe." “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security, and management of the car parks." Real-time monitoring "Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real-time more quickly and effectively." "The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness, and surveillance.” Camera features Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision Featuring a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available,” Daniel explains. Comprehensive coverage “This advanced functionality offers peace of mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras provide comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Ultra-low light technology Adrian Kirk, Business Development Director at 360 Vision Technology commented, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks." "For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper, and more defined colour images, even at night time. We are proud to have delivered a practical Invictus TX-based camera solution as part of the STC CCTV network upgrade.”
Nestled in the scenic countryside near Umberleigh, Northcote Manor Country House Hotel & Spa combines award-winning accommodation, fine dining, and a tranquil spa. This 18th-century country house is devoted to providing elegance and security for its guests. Partnering with local locksmith experts, Keyhole Surgery upgraded its security management by installing a Mul-T-Lock MTL™300 master key suite. MTL™300 master key system Mul-T-Lock’s MTL™300 master key system offers ideal security for Northcote Manor’s 16 guest rooms. The suite enhances safety across the hotel, giving management precise control over key access while ensuring guests' peace of mind. Richie Herkes, General Manager of Northcote Manor Country House Hotel & Spa, commented, “At our beautiful Georgian manor, dating back to Tudor times, we’re committed to providing our guests with a serene and secure environment. We trusted David to deliver an upgrade to our room security’s existing system that could accommodate." Additional security layer With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure "He recommended the Mul-T-Lock MTL™300 master key suite as a secure yet discreet access management across all rooms and common areas, improving our operations without compromising style.” With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure, ensuring only those with the appropriate permissions can enter restricted room areas at any given time. The capability to manage multiple permission levels adds a critical layer of security, minimising unauthorised access and enhancing operational efficiency. Easy installation improves overall management David Pearcy of Keyhole Surgery explained why the MTL™300 was the ideal choice for the upgrade, “For a distinguished property like Northcote Manor, it was essential to implement a high-security solution that wouldn’t interfere with the building’s stunning historic appeal." "The Mul-T-Lock MTL™300 suite provides the right balance with a cylinder design that is easy to install on existing doors. The master key system allows staff to access essential areas quickly and efficiently, reducing the need for multiple keys and improving overall management.” Secure and flexible access management system The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor, while maintaining a secure, flexible, and efficient access management system specifically designed to give authorised personnel-controlled access to the hotel’s rooms and facilities. Ian Thresher, Mul-T-Lock regional sales manager for the South-West, shared his thoughts on the partnership, “Northcote Manor’s decision to work with Keyhole Surgery as an established Mul-T-Lock authorised dealer and to implement the MTL™300 master key suite reflects a forward-thinking approach to hospitality security." Precise security management "MTL™300 offers an elegant, streamlined solution that aligns perfectly with the hotel’s dedication to both guest comfort and operational excellence." "By reducing key clutter and enabling precise security management, this system helps Northcote Manor retain its renowned beauty and charm safely for many, many years to come.”
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
HID, a worldwide pioneer in trusted identity and access control solutions, announced that Deskbee, a global provider of corporate space management solutions, has integrated HID Mobile Access and Identity Positioning technologies into its platform. With an already robust workplace management application, Deskbee wanted to enhance security and optimise operational efficiencies by integrating digital credentials and real-time positioning into its platform. HID Mobile Access With HID Mobile Access, Deskbee app users can employ their smartphones and tablets to securely access facilities, eliminating the need for physical cards and reducing the risks associated with lost or misused credentials. This implementation not only enhances convenience and security but also seamlessly integrates with existing systems, simplifying the issuance and revocation of credentials from a single platform. Identity Positioning technology By analysing occupancy data, managers can optimise space planning, improve resource allocation Furthermore, Identity Positioning technology enables building managers to track employee and visitor locations in real-time, providing valuable insights for optimising space planning and resource allocation. By analysing occupancy data, managers can optimise space planning, improve resource allocation (such as energy, water, and HVAC), and enhance overall operational efficiency. Secure, efficient, and personalised experience “The integration of HID’s Mobile Identities solutions demonstrates the enormous potential that application development companies have to transform access control systems and workplace management,” said Rogerio Coradini, HID’s Commercial Director of Physical Access Control in Latin America. “Through collaboration with HID, developers of mobile platforms and applications can adapt to the changing needs of the market and provide a more secure, efficient, and personalised experience for their clients.” Detailed monitoring and improved access management Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage Due to HID mobile identity technologies, Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage, providing accurate data on occupancy, location, and duration of stay. “The ability to automate the registration process and improve access management has been a significant change. HID's reliability and support have been fundamental to these advancements, and we are seeing how these results are positively impacting our clients. The trust in the brand and its support has been essential to our success,” said Gorguet. Employee badge integration Headquartered in Brazil, Deskbee has experienced rapid growth, consolidating its position in the Brazilian market and expanding its operations to more than 25 countries, including Mexico, Chile, Argentina, the United States, Portugal, Spain, Germany, and the United Kingdom. Still this year, the company will offer employee badge integration with Google Wallet, also powered by HID technology.
Midland Heart’s ongoing drive to improve community safety for residents has been boosted thanks to a new, state-of-the-art IP video surveillance system that utilises approximately 900 Hanwha Vision Q series cameras alongside X series network video recorders (NVRs). The video system provides enhanced building coverage, higher-quality images, and live monitoring to improve safety, security, and resident peace of mind. A new video system needed After a highly competitive tender process, TIS was awarded a five-year contract worth more than £1 million in October 2023 to replace the existing analogue video surveillance system at over 75 sites across Midland Heart’s housing association portfolio. The project was executed in partnership with Advancis, TIS’s integration partner. Real-time insights The system needed to cover communal areas such as entrances, exits, lift lobbies, circulation spaces Properties that needed coverage ranged from small, multi-dwelling units, to high and low-rise purpose-built blocks, with multiple sites requiring upwards of 50 cameras. The system needed to cover communal areas such as entrances, exits, lift lobbies, circulation spaces, and stairwells, along with monitoring car parks for real-time insights that could be delivered back to control room operators. The solution TIS, the independent life safety, security, and communications systems integrator, designed and installed the new end-to-end IP video system using Hanwha Vision solutions, as well as providing an extended warranty period followed by service and maintenance. The installation included approximately 900 Hanwha Vision Q series cameras, chosen for their exceptional image clarity, reliability, and adaptability across a variety of environments. Bullet, vandal-resistant dome, and PTZ cameras have been utilised for this project, to give Midland Heart the flexibility needed to monitor buildings inside and outside, hallways, and car parks. Enhanced security Vicki Brownhill, Director of Housing at Midland Heart, said, “The new system offers residents value for money as well as enhanced safety and security." "Midland Heart will benefit from the significantly reduced time required to operate the system and the streamlined, cost-effective approach to maintenance across such a large portfolio of buildings.” Video quality and coverage Operators in Midland Heart’s newly constructed control room can access any of the sites and cameras in real-time The new video system has transformed how Midland Heart manages its security operations. The enhanced video quality and coverage have improved the ability to monitor activities across all sites, leading to quicker responses to security incidents and greater overall resident safety. Furthermore, operators in Midland Heart’s newly constructed control room can access any of the sites and cameras in real-time, or download recorded footage for potential evidence needs. Streamlined and efficient James Twigg, CEO at TIS described how the video system supports Midland Heart, stating, “Our engagement with Midland Heart is a perfect example of how innovative technology solutions can address complex challenges in community safety." "The new video system not only enhances security but also brings efficiency and sustainability to Midland Heart’s operations, allowing them to provide a better service to their residents.” Advanced video surveillance systems John Lutz Boorman, Head of Product and Marketing at Hanwha Vision Europe stated, “Hanwha Vision’s collaboration with TIS, Advancis, and Midland Heart perfectly illustrates how advanced video surveillance systems can rapidly improve resident safety." "With industry-leading image clarity, reliability, and an intuitive user interface, the Q series cameras and X series NVRs make it simple for operators to understand and respond to events across the Midland Heart portfolio.”
Ohio’s Nationwide Arena, home of the Columbus Blue Jackets of the National Hockey League (NHL), is protected by an outdated, end-of-life security system. The cost to maintain and repair it was becoming unsustainable. The system is composed of multiple disparate systems with different interfaces and management systems, and multiple requirements for software updates and support. Situational awareness The Security Director of the Arena wanted to modernise the system to enable proactive alerts for situational awareness and a unified platform to manage and visualise all 350 cameras installed across the venue. Offering a camera-agnostic solution, Hive Logic chose to keep the existing camera deployment and retrofit it with a powerful video management system. A 3-cluster enterprise server is used to manage all video streams and access control systems, empowered by Hailo’s AI accelerators for high-computer workloads. The Product The Hive software enables video management, access control, and AI video analytics running applications such as: People count to monitor the entrance and exit of the venue. Zone management for high traffic/dwell time. Security forensics to identify regulation violations and crime. Storage and search to identify past events and provide video evidence. Iron Link servers from Velasea are used in a cluster, sharing data to distribute workload and uptime. Each server is equipped with a HailoCentury 0804 PCIe acceleration card with 104 TOPS. Why Hailo? Lower Cost: The previous system did not include AI capabilities. GPUs were considered in the past but were too expensive to deploy at such scale. Hailo brought the most cost-effective solution while maintaining high computing capabilities. Scalability: Hailo’s scalability allows more cameras without overloading the central processing infrastructure while maintaining high accuracy in detecting and identifying objects. AI/ML pipeline “Hailo is the ideal choice for our product because it enables real-time analytics on camera streams, without relying on a central analytics server. This enhances bandwidth efficiency and overall performance while reducing power consumption." "Now we have a very robust AI/ML pipeline to rapidly deploy new AI models onto our edge devices," said Nate Green, Hive Logic, CEO. Effective and simple “I am grateful for HIVE and the wonderful technologies they offer as a standard package," Barry Kirby Security Director, Nationwide Arena. "The introduction of Hailo then makes it a highly effective and simple system to navigate.”
Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Products
White papers
Safeguard Students With New Techniques And Technology
Download5 ways to strengthen physical security with an integrated system
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadSmart security cameras: excellence in retail
DownloadIs access control in the cloud more cost effective?
DownloadInnovative edge storage solutions for the video surveillance industry
DownloadEnhanced Ethernet Technology (ePoE)
DownloadDo you know the weakest link of your access control system?
DownloadVideos
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Hanwha Vision Security devices
- Aritech Security devices
- Parabit Security devices
- VIVOTEK Security devices
- LILIN Security devices
- Hikvision Security devices
- BCDVideo Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- AV Costar Security devices
- HID Security devices
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download