Security devices
Aetina, a pioneering provider of edge AI solutions, announces its comprehensive support for Super Mode, a feature introduced in the latest NVIDIA® Jetson Orin™ NX and Jetson Orin™ Nano modules. This enhancement, set to be enabled by the NVIDIA JetPack™ software development kit’s 6.2 release this month, delivers up to 2x boost in generative AI inference performance, reinforcing powerful applications in computer vision, robotics, and local AI deployment. Ideal for dem...
Door entry and access control manufacturer Videx Security has announced the appointment of Dan Kennerley as Head of Sales and Business Development for the UK and Ireland. With 25 years at Videx, Dan brings a wealth of experience and a strong understanding of the door entry and access control industry to his new role. Secure entry solutions As Head of Sales and Business Development, Dan will focus on strengthening Videx’s position as a market pioneer and spearhead growth initiatives acr...
Nice, a global pioneer in home and building management solutions, proudly announces the launch of Juno, a sleek and powerful gate operator designed to redefine residential gate automation. As the market increasingly demands compact yet feature-rich solutions, Juno offers a breakthrough design that blends style, performance, and ease of use, delivering unparalleled value for both installers and end users. Aesthetic and functional demands “Our partners need reliable, easy-to-install solut...
Zenitel, a global pioneer in Unified Critical Communication solutions, proudly announces the launch of a new range of IP Speakers, further strengthening its market leadership position within safety and security communications. The addition of new IP Speakers, together with Zenitel Connect Pro — the industry's first Unified Critical Communication Platform — paves the way for unifying communication technologies to address life safety, security, and operational communication needs under...
TOA Canada's D5000 Series provides unprecedented speech clarity, delivering the presenter’s voice to audiences in any speaking scenario. Whether for the classroom, office meeting rooms, banquet halls, courthouses, or multipurpose halls, the D-5000 delivers audio with clarity and ease of use. To this point, this series has been a special-order product, but TOA Canada are happy to announce that they are now officially bringing it into the extensive catalogue of sound solutions. Suite...
At the BAU 2025 trade fair in Munich, dormakaba is presenting MotionIQ, an innovative technology that significantly reduces energy loss through automatic doors. Due to precise door control, MotionIQ minimises the time that doors are held open and, depending on the application scenario, enables energy savings of up to 50% compared to standard solutions. This also contributes to reducing a building's carbon footprint. An assessment of the savings potential for each use case is made possible by do...
News
OSI Systems, Inc. announced that its Security division received an order valued at approximately $23 million to assist in the deployment and integration of long-range radio frequency (RF) critical communication systems. As part of the award, the Company is expected to provide critical hardware as well as technical services designed to enhance the long-term availability of US government strategic RF communications capability in critical regions of the world. Protecting people and infrastructure OSI Systems’ President and CEO, Ajay Mehra, commented, “With our recent acquisition of an RF-based critical solutions business serving defence customers, the Security division further expanded its product portfolio for the protection of people and infrastructure." "We are pleased with this notable award and look forward to supporting this long-standing customer’s efforts to upgrade and enhance US secure communications.”
Gunnebo Entrance Control has launched a downloadable white paper investigating why businesses should encourage active commuting. With active transport (walking and cycling) making it onto the decarbonisation agenda for the first time at COP29, ‘Encouraging Healthier Commuting’, looks at the positive environmental and health benefits of cycle commuting and how employers can encourage it as a way of travelling to work. Secure entrance control solutions Revealing the boost to heath, well-being and productivity that cycle commuting has on the workforce, the white paper also looks at the factors stopping people from cycling, such as theft, access and storage. The SpeedStile FL Bike, from a global pioneer in secure entrance control solutions, is a smart solution that addresses the growing demand for secure and user-friendly access control systems tailored to sustainable transport users. This advanced speed gate ensures smooth and safe transit for bicycles and scooters while protecting personal mobility devices with its sleek tempered glass wings. Advanced induction loop technology At the core of the SpeedStile FL Bike is its avant induction loop technology, which accurately detects bicycles At the core of the SpeedStile FL Bike is its advanced induction loop technology, which accurately detects bicycles and scooters to prevent collisions and enhance user safety. Says Tina Hughan, Global Marketing and Sustainability Director at Gunnebo Entrance Control: "Our new white paper reveals just how beneficial cycle commuting can be for businesses but also takes a look at the challenges they face in encouraging employees to make the switch." Innovative access solutions Hughan added: "As cities globally embrace cycling as a sustainable mode of transport, we’ve prioritised delivering innovative access solutions that address this shift. The SpeedStile FL Bike is a testament to our commitment to safety, security, and sustainability, enhancing urban mobility and the need for more connected environments." Constructed for both indoor and outdoor use, the gate features brushed stainless steel, black glass, and Z-shaped tempered glass barriers, delivering durability alongside a sleek, contemporary aesthetic. This robust design ensures reliable performance in external conditions while seamlessly integrating with modern architectural spaces. Latest technology and user-focused innovation With the latest technology and user-focused invention, the gate is an ideal key for office complexes Safety and security are paramount in the SpeedStile FL Bike’s design. Equipped with 36 infrared sensors, it detects tailgating and wrong-way access, guaranteeing efficient and secure operation even in high-traffic environments. With the latest technology and user-focused innovation, the gate is an ideal solution for office complexes, public bike parking facilities, and residential spaces, supporting the global shift toward greener mobility. Role of innovative entrance control systems Tina concludes: “Through the white paper, we aim to engage industry pioneers and stakeholders in a conversation about the role of innovative entrance control systems in creating safer, more sustainable urban environments." "The SpeedStile FL Bike is an important step forward in making cities more inclusive and adaptable to the needs of cyclists, scooter users, and pedestrians alike.”
Shelly Group, a global pioneer of IoT and smart building solutions, announces the expanded Shelly Wave lineup for the U.S. market, enhanced with Z-Wave® Long Range (ZWLR) technology. This development represents a significant advancement in smart home connectivity, delivering extended transmission range, robust network scalability, and improved energy efficiency. Benefits by ZWLR technology The expanded lineup features eleven Shelly Wave solutions super-charged with support for ZWLR The Shelly Wave product portfolio, built on the Z-Wave 800 Series, includes new products that have been purpose-built to support ZWLR functionality as well as existing UL-certified Z-Wave devices that have been upgraded to take full advantage of the benefits offered by ZWLR technology. The expanded lineup features eleven Shelly Wave solutions super-charged with support for ZWLR and includes three battery-powered devices, demonstrating a dedicated focus on delivering versatile, power-efficient solutions. Key benefits of ZWLR to Shelly wave devices Extended range and coverage: ZWLR provides a substantial range boost, enabling devices to communicate over distances exceeding 1 mile (line of sight) at full power. Scalable Networks: ZWLR supports up to 4,000 devices on a single network, representing a 20x increase in Z-Wave node support compared to Z-Wave mesh with the added benefit of co-existing on the same network as Z-Wave mesh. Security and Compatibility: Advanced encryption and backward compatibility with existing Z-Wave devices and networks ensure seamless integration and secure operations. New Shelly Wave products Shelly Wave product line caters to a range of applications and device deployment designs The upgraded Shelly Wave product line caters to a range of applications and device deployment configurations, from basic point-to-point home automation to complex and robust device installations. Enhanced with ZWLR, the new Shelly Wave products are ideal for environments where long-range connectivity and energy efficiency are essential, such as large homes, multi-unit properties, commercial settings, and edge-of-property installations. Smart home connectivity barriers “With new devices featuring support for ZWLR, Shelly is helping break down smart home connectivity barriers, empowering homeowners, security installers, and commercial property owners and managers with unmatched range, scalability, and energy efficiency to redefine their automation experience,” said Leon Kralj, CTO of Shelly Group. “As the only technology we trust to seamlessly support powered devices and battery-operated solutions, as well as outdoor applications and multi-floor buildings, ZWLR delivers unprecedented range and interference-free performance on Sub-GHz frequencies, ensuring unparalleled reliability and versatility.” Adoption of Z-Wave advancements “The integration of ZWLR technology into the Shelly Wave product lineup is a testament to the transformative power of Z-Wave innovation,” said Avi Rosenthal, Chairman of the Board for the Z-Wave Alliance. “As a standards development organisation, we rely on future-focused manufacturers, such as Shelly, to drive the adoption of Z-Wave advancements and are thrilled to see a comprehensive product line that delivers all of the benefits of ZWLR to customers worldwide, redefining what is possible in smart home and IoT connectivity.” Lineup of US Shelly Wave devices The expanded lineup of US Shelly Wave devices enhanced with ZWLR includes: Shelly Wave Plug US Shelly Wave Door/Window Shelly Wave H&T Shelly Wave Motion Shelly Wave Dimmer Shelly Wave Pro Dimmer 1 PM Shelly Wave Pro Dimmer 2 PM Shelly Wave 1 Shelly Wave 1 PM Shelly Wave 2 PM Shelly Wave Shutter Shelly Wave ZWLR devices are slated to be available in the U.S. in H1 2025.
Boon Edam Inc., a global pioneer in physical security entrance products, announces the launch of its innovative Speedlane Compact Platform. This modular platform, designed for the Lifeline Speedlane Compact Optical Turnstile, offers a groundbreaking solution for facilities seeking advanced entry control while preserving existing floors. Modern entry solutions “Preserving architectural integrity is a priority for many historical and high-design buildings,” said Patrick Nora, President and Managing Director, of Boon Edam Inc. “The Speedlane Compact Platform allows us to meet these needs, offering modern entry solutions that adapt to spaces without requiring invasive and costly floor modifications.” Speedlane Compact Platform The platform supports a weight capacity of 500 lbs per square foot for high stability and features integrated conduits The Speedlane Compact Platform addresses the unique challenges of facilities where trenching or drilling into floors is restricted or undesirable. With a free-standing, modular design, the platform offers an ADA-compliant foundation that ensures accessibility in high-traffic environments without compromising structural integrity. The platform supports a weight capacity of 500 lbs per square foot for high stability and features integrated conduits to accommodate streamlined power and low-voltage wiring. Custom finishes, such as anti-slip coatings and stainless-steel tread plates, are also available to align with various aesthetic and functional needs. Modular configurations Boon Edam’s commitment to innovation is evident in the platform’s adaptability. Its modular configurations can accommodate single or multi-lane setups and seamlessly integrate with additional entry solutions like Winglock Swing gates. The innovative and versatile Speedlane Compact Platform allows modern secured entry solutions to be installed in spaces ranging from historical landmarks to new state-of-the-art facilities. Seamless experience “Our platform is not only about innovation. It’s also about offering a seamless experience for architects, facility managers, and end users alike,” Nora added. “With this launch, Boon Edam sets a new standard for adaptive and non-invasive entry solutions, ensuring that both historic and modern spaces can thrive without compromise,” concluded Nora.
Quorum Cyber – headquartered in the U.K., with offices across North America, announced the acquisition of Kivu Consulting Inc., a global cybersecurity firm specialising in Incident Response. The strategic move bolsters Quorum Cyber’s rapid global expansion, as it comes just months after it acquired Difenda, a North American company specialising in Microsoft Security Managed Services. Advisory services Founded in 2009, Kivu Consulting Inc, or ‘Kivu’, is a trusted partner in the global insurance, legal, and government sectors. The company is a pioneer in digital forensics, cyber incident response, business restoration, and ransom negotiations. Since its inception, Kivu has helped define the market for response, managed, and advisory services to protect organisations against compromised data, theft of trade secrets, and unauthorised access to data. Incident response This transformative acquisition rapidly expands Quorum Cyber’s presence within these industries Kivu holds established relationships in over 40 insurance and legal panels across the U.S. and the U.K. This transformative acquisition not only rapidly expands Quorum Cyber’s presence within these industries but also provides a robust foundation to strengthen its alliances and cements its status as a premier global threat management firm, renowned for its exceptional incident response capabilities. Threat management services In addition, acquiring Kivu enables Quorum Cyber to deliver its threat management services from three operations centres in the U.S., the U.K., and Canada to its customers worldwide. Federico Charosky, CEO and Founder of Quorum Cyber, stated, "We are incredibly excited to welcome Kivu to Quorum Cyber. Kivu's reputation for excellence and its strong history in incident response perfectly complement Quorum Cyber's capabilities." 24/7 security coverage Federico Charosky continued, "The integration of Kivu’s stellar incident response teams and U.S.-based SOC, together with Quorum Cyber’s existing U.K., U.S., and Canadian operations, enables us to provide unparalleled 24/7 security coverage." He adds, "This transaction highlights our rapid growth among incident response and threat management providers globally, reinforcing our commitment to delivering exceptional cybersecurity solutions throughout North America, the U.K., and beyond." Cybersecurity Shane Sims, Chief Executive Officer at Kivu, commented, "For the past 15 years, Kivu has leveraged its talent and forensic labs in the U.S. and U.K. to deliver threat intelligence-driven cybersecurity outcomes across every continent, serving organisations in all industries." He adds, "Our success has been built on trusted partnerships with leaders in insurance, legal, technology, and government – all sharing the same goal of fighting cybercrime." Strategic alignment Shane Sims continues, "Our acquisition by Quorum Cyber represents a strategic alignment with an organisation and team that shares our mission, vision, and core values while immediately scaling our team, capabilities, and services in a big way." He further states, "This is a natural next step for Kivu, and I am excited about what it means for our employees, clients, and trusted partners." Growth strategy Quorum Cyber's back-to-back acquisitions of Kivu Consulting and Difenda underscore its aggressive growth strategy Quorum Cyber's back-to-back acquisitions of Kivu Consulting and Difenda underscore its aggressive growth strategy across North American and U.K. markets. Bolstered by ongoing support from investors, Charlesbank Capital Partners and Livingbridge, the two acquisitions equip Quorum Cyber with the resources to strategically expand its service offerings and customer reach. Incident response expertise The integration of Kivu's incident response expertise and connections, coupled with Difenda's managed services capabilities, marks a significant step in Quorum Cyber's mission of asserting its market presence globally. Piper Sandler & Co. served as exclusive financial advisor to Kivu, and Mintz and Lowenstein Sandler served as legal advisors to Quorum Cyber.
Award-winning global security manufacturer, Gallagher Security is gearing up to showcase the latest in its innovative technology suite at Intersec Dubai from 14-16 January 2025. Together with their Technology Partners, DEA Security, COMMEND, Moro Hub, and Stratus Technologies, Gallagher will be showcasing their latest advanced perimeter protection, innovative access control, secure credentials, Apple Wallet integration, as well as the recently released, Controller 7000 (C7000) Enhanced, plus updates on some exciting new product releases earmarked for later in 2025. C7000 Enhanced Released in October 2024, the C7000 Enhanced, tipped as the controller designed with user confidence in mind offers increased reliability, redundancy, and resilience for customers. Jim Rayner, Value Owner at Gallagher who led production on the C7000 Enhanced says, ‘It has it all’. "We’re excited to bring the C7000 Enhanced to market and to continue building out this product range based on the feedback of our Channel Partners and End Users. The C7000 Enhanced is a future-proof solution, designed for those that want more.” C7000 Standard variant The Cyber Hub of the Year category celebrates pioneering products or services The award-winning C7000 Standard variant is also a finalist in the ‘Cyber Hub of the Year category at the Intersec Awards. The Cyber Hub of the Year category celebrates pioneering products or services that excel in protecting digital systems, networks, and data from cyber threats. Middle East CEO comments Gallagher Security Middle East CEO, Bilal Chehime says, “Intersec Dubai is a major event for both the Middle East and the global security industry, and we are thrilled to be exhibiting again this year." "Our commitment to innovation reflects our dedication to staying at the forefront of the ever-evolving security market and we take great pride in being part of such a dynamic and promising industry. We look forward to showcasing our latest solutions to meet the growing demands of security worldwide.” New appointment Nemer brings over a decade of leadership experience in business development, smart cities, IoT Visitors to the Gallagher stand will have the opportunity to meet with a strong contingent from the Middle East team, including newly appointed Regional Director – Middle East North Africa, Nemer Mdardas. Based in the company’s Dubai office, Nemer brings over a decade of leadership experience in business development, smart cities, IoT solutions, and physical security systems. Intersec Dubai 2025 Marking its 26th year, Intersec Dubai runs from 14 - 16 January at Dubai’s World Trade Centre. The 2024 event attracted a huge international audience, hosting more than 47,000 trade buyers from 141 countries, including key government pioneers, agencies, and organisational heads across various industries. Visit Gallagher Security at stand S1-C16.
OSI Systems, Inc. announced that its Security division received an order valued at approximately $23 million to assist in the deployment and integration of long-range radio frequency (RF) critical communication systems. As part of the award, the Company is expected to provide critical hardware as well as technical services designed to enhance the long-term availability of US government strategic RF communications capability in critical regions of the world. Protecting people and infrastructure OSI Systems’ President and CEO, Ajay Mehra, commented, “With our recent acquisition of an RF-based critical solutions business serving defence customers, the Security division further expanded its product portfolio for the protection of people and infrastructure." "We are pleased with this notable award and look forward to supporting this long-standing customer’s efforts to upgrade and enhance US secure communications.”
Gunnebo Entrance Control has launched a downloadable white paper investigating why businesses should encourage active commuting. With active transport (walking and cycling) making it onto the decarbonisation agenda for the first time at COP29, ‘Encouraging Healthier Commuting’, looks at the positive environmental and health benefits of cycle commuting and how employers can encourage it as a way of travelling to work. Secure entrance control solutions Revealing the boost to heath, well-being and productivity that cycle commuting has on the workforce, the white paper also looks at the factors stopping people from cycling, such as theft, access and storage. The SpeedStile FL Bike, from a global pioneer in secure entrance control solutions, is a smart solution that addresses the growing demand for secure and user-friendly access control systems tailored to sustainable transport users. This advanced speed gate ensures smooth and safe transit for bicycles and scooters while protecting personal mobility devices with its sleek tempered glass wings. Advanced induction loop technology At the core of the SpeedStile FL Bike is its avant induction loop technology, which accurately detects bicycles At the core of the SpeedStile FL Bike is its advanced induction loop technology, which accurately detects bicycles and scooters to prevent collisions and enhance user safety. Says Tina Hughan, Global Marketing and Sustainability Director at Gunnebo Entrance Control: "Our new white paper reveals just how beneficial cycle commuting can be for businesses but also takes a look at the challenges they face in encouraging employees to make the switch." Innovative access solutions Hughan added: "As cities globally embrace cycling as a sustainable mode of transport, we’ve prioritised delivering innovative access solutions that address this shift. The SpeedStile FL Bike is a testament to our commitment to safety, security, and sustainability, enhancing urban mobility and the need for more connected environments." Constructed for both indoor and outdoor use, the gate features brushed stainless steel, black glass, and Z-shaped tempered glass barriers, delivering durability alongside a sleek, contemporary aesthetic. This robust design ensures reliable performance in external conditions while seamlessly integrating with modern architectural spaces. Latest technology and user-focused innovation With the latest technology and user-focused invention, the gate is an ideal key for office complexes Safety and security are paramount in the SpeedStile FL Bike’s design. Equipped with 36 infrared sensors, it detects tailgating and wrong-way access, guaranteeing efficient and secure operation even in high-traffic environments. With the latest technology and user-focused innovation, the gate is an ideal solution for office complexes, public bike parking facilities, and residential spaces, supporting the global shift toward greener mobility. Role of innovative entrance control systems Tina concludes: “Through the white paper, we aim to engage industry pioneers and stakeholders in a conversation about the role of innovative entrance control systems in creating safer, more sustainable urban environments." "The SpeedStile FL Bike is an important step forward in making cities more inclusive and adaptable to the needs of cyclists, scooter users, and pedestrians alike.”
Shelly Group, a global pioneer of IoT and smart building solutions, announces the expanded Shelly Wave lineup for the U.S. market, enhanced with Z-Wave® Long Range (ZWLR) technology. This development represents a significant advancement in smart home connectivity, delivering extended transmission range, robust network scalability, and improved energy efficiency. Benefits by ZWLR technology The expanded lineup features eleven Shelly Wave solutions super-charged with support for ZWLR The Shelly Wave product portfolio, built on the Z-Wave 800 Series, includes new products that have been purpose-built to support ZWLR functionality as well as existing UL-certified Z-Wave devices that have been upgraded to take full advantage of the benefits offered by ZWLR technology. The expanded lineup features eleven Shelly Wave solutions super-charged with support for ZWLR and includes three battery-powered devices, demonstrating a dedicated focus on delivering versatile, power-efficient solutions. Key benefits of ZWLR to Shelly wave devices Extended range and coverage: ZWLR provides a substantial range boost, enabling devices to communicate over distances exceeding 1 mile (line of sight) at full power. Scalable Networks: ZWLR supports up to 4,000 devices on a single network, representing a 20x increase in Z-Wave node support compared to Z-Wave mesh with the added benefit of co-existing on the same network as Z-Wave mesh. Security and Compatibility: Advanced encryption and backward compatibility with existing Z-Wave devices and networks ensure seamless integration and secure operations. New Shelly Wave products Shelly Wave product line caters to a range of applications and device deployment designs The upgraded Shelly Wave product line caters to a range of applications and device deployment configurations, from basic point-to-point home automation to complex and robust device installations. Enhanced with ZWLR, the new Shelly Wave products are ideal for environments where long-range connectivity and energy efficiency are essential, such as large homes, multi-unit properties, commercial settings, and edge-of-property installations. Smart home connectivity barriers “With new devices featuring support for ZWLR, Shelly is helping break down smart home connectivity barriers, empowering homeowners, security installers, and commercial property owners and managers with unmatched range, scalability, and energy efficiency to redefine their automation experience,” said Leon Kralj, CTO of Shelly Group. “As the only technology we trust to seamlessly support powered devices and battery-operated solutions, as well as outdoor applications and multi-floor buildings, ZWLR delivers unprecedented range and interference-free performance on Sub-GHz frequencies, ensuring unparalleled reliability and versatility.” Adoption of Z-Wave advancements “The integration of ZWLR technology into the Shelly Wave product lineup is a testament to the transformative power of Z-Wave innovation,” said Avi Rosenthal, Chairman of the Board for the Z-Wave Alliance. “As a standards development organisation, we rely on future-focused manufacturers, such as Shelly, to drive the adoption of Z-Wave advancements and are thrilled to see a comprehensive product line that delivers all of the benefits of ZWLR to customers worldwide, redefining what is possible in smart home and IoT connectivity.” Lineup of US Shelly Wave devices The expanded lineup of US Shelly Wave devices enhanced with ZWLR includes: Shelly Wave Plug US Shelly Wave Door/Window Shelly Wave H&T Shelly Wave Motion Shelly Wave Dimmer Shelly Wave Pro Dimmer 1 PM Shelly Wave Pro Dimmer 2 PM Shelly Wave 1 Shelly Wave 1 PM Shelly Wave 2 PM Shelly Wave Shutter Shelly Wave ZWLR devices are slated to be available in the U.S. in H1 2025.
Boon Edam Inc., a global pioneer in physical security entrance products, announces the launch of its innovative Speedlane Compact Platform. This modular platform, designed for the Lifeline Speedlane Compact Optical Turnstile, offers a groundbreaking solution for facilities seeking advanced entry control while preserving existing floors. Modern entry solutions “Preserving architectural integrity is a priority for many historical and high-design buildings,” said Patrick Nora, President and Managing Director, of Boon Edam Inc. “The Speedlane Compact Platform allows us to meet these needs, offering modern entry solutions that adapt to spaces without requiring invasive and costly floor modifications.” Speedlane Compact Platform The platform supports a weight capacity of 500 lbs per square foot for high stability and features integrated conduits The Speedlane Compact Platform addresses the unique challenges of facilities where trenching or drilling into floors is restricted or undesirable. With a free-standing, modular design, the platform offers an ADA-compliant foundation that ensures accessibility in high-traffic environments without compromising structural integrity. The platform supports a weight capacity of 500 lbs per square foot for high stability and features integrated conduits to accommodate streamlined power and low-voltage wiring. Custom finishes, such as anti-slip coatings and stainless-steel tread plates, are also available to align with various aesthetic and functional needs. Modular configurations Boon Edam’s commitment to innovation is evident in the platform’s adaptability. Its modular configurations can accommodate single or multi-lane setups and seamlessly integrate with additional entry solutions like Winglock Swing gates. The innovative and versatile Speedlane Compact Platform allows modern secured entry solutions to be installed in spaces ranging from historical landmarks to new state-of-the-art facilities. Seamless experience “Our platform is not only about innovation. It’s also about offering a seamless experience for architects, facility managers, and end users alike,” Nora added. “With this launch, Boon Edam sets a new standard for adaptive and non-invasive entry solutions, ensuring that both historic and modern spaces can thrive without compromise,” concluded Nora.
Quorum Cyber – headquartered in the U.K., with offices across North America, announced the acquisition of Kivu Consulting Inc., a global cybersecurity firm specialising in Incident Response. The strategic move bolsters Quorum Cyber’s rapid global expansion, as it comes just months after it acquired Difenda, a North American company specialising in Microsoft Security Managed Services. Advisory services Founded in 2009, Kivu Consulting Inc, or ‘Kivu’, is a trusted partner in the global insurance, legal, and government sectors. The company is a pioneer in digital forensics, cyber incident response, business restoration, and ransom negotiations. Since its inception, Kivu has helped define the market for response, managed, and advisory services to protect organisations against compromised data, theft of trade secrets, and unauthorised access to data. Incident response This transformative acquisition rapidly expands Quorum Cyber’s presence within these industries Kivu holds established relationships in over 40 insurance and legal panels across the U.S. and the U.K. This transformative acquisition not only rapidly expands Quorum Cyber’s presence within these industries but also provides a robust foundation to strengthen its alliances and cements its status as a premier global threat management firm, renowned for its exceptional incident response capabilities. Threat management services In addition, acquiring Kivu enables Quorum Cyber to deliver its threat management services from three operations centres in the U.S., the U.K., and Canada to its customers worldwide. Federico Charosky, CEO and Founder of Quorum Cyber, stated, "We are incredibly excited to welcome Kivu to Quorum Cyber. Kivu's reputation for excellence and its strong history in incident response perfectly complement Quorum Cyber's capabilities." 24/7 security coverage Federico Charosky continued, "The integration of Kivu’s stellar incident response teams and U.S.-based SOC, together with Quorum Cyber’s existing U.K., U.S., and Canadian operations, enables us to provide unparalleled 24/7 security coverage." He adds, "This transaction highlights our rapid growth among incident response and threat management providers globally, reinforcing our commitment to delivering exceptional cybersecurity solutions throughout North America, the U.K., and beyond." Cybersecurity Shane Sims, Chief Executive Officer at Kivu, commented, "For the past 15 years, Kivu has leveraged its talent and forensic labs in the U.S. and U.K. to deliver threat intelligence-driven cybersecurity outcomes across every continent, serving organisations in all industries." He adds, "Our success has been built on trusted partnerships with leaders in insurance, legal, technology, and government – all sharing the same goal of fighting cybercrime." Strategic alignment Shane Sims continues, "Our acquisition by Quorum Cyber represents a strategic alignment with an organisation and team that shares our mission, vision, and core values while immediately scaling our team, capabilities, and services in a big way." He further states, "This is a natural next step for Kivu, and I am excited about what it means for our employees, clients, and trusted partners." Growth strategy Quorum Cyber's back-to-back acquisitions of Kivu Consulting and Difenda underscore its aggressive growth strategy Quorum Cyber's back-to-back acquisitions of Kivu Consulting and Difenda underscore its aggressive growth strategy across North American and U.K. markets. Bolstered by ongoing support from investors, Charlesbank Capital Partners and Livingbridge, the two acquisitions equip Quorum Cyber with the resources to strategically expand its service offerings and customer reach. Incident response expertise The integration of Kivu's incident response expertise and connections, coupled with Difenda's managed services capabilities, marks a significant step in Quorum Cyber's mission of asserting its market presence globally. Piper Sandler & Co. served as exclusive financial advisor to Kivu, and Mintz and Lowenstein Sandler served as legal advisors to Quorum Cyber.
Award-winning global security manufacturer, Gallagher Security is gearing up to showcase the latest in its innovative technology suite at Intersec Dubai from 14-16 January 2025. Together with their Technology Partners, DEA Security, COMMEND, Moro Hub, and Stratus Technologies, Gallagher will be showcasing their latest advanced perimeter protection, innovative access control, secure credentials, Apple Wallet integration, as well as the recently released, Controller 7000 (C7000) Enhanced, plus updates on some exciting new product releases earmarked for later in 2025. C7000 Enhanced Released in October 2024, the C7000 Enhanced, tipped as the controller designed with user confidence in mind offers increased reliability, redundancy, and resilience for customers. Jim Rayner, Value Owner at Gallagher who led production on the C7000 Enhanced says, ‘It has it all’. "We’re excited to bring the C7000 Enhanced to market and to continue building out this product range based on the feedback of our Channel Partners and End Users. The C7000 Enhanced is a future-proof solution, designed for those that want more.” C7000 Standard variant The Cyber Hub of the Year category celebrates pioneering products or services The award-winning C7000 Standard variant is also a finalist in the ‘Cyber Hub of the Year category at the Intersec Awards. The Cyber Hub of the Year category celebrates pioneering products or services that excel in protecting digital systems, networks, and data from cyber threats. Middle East CEO comments Gallagher Security Middle East CEO, Bilal Chehime says, “Intersec Dubai is a major event for both the Middle East and the global security industry, and we are thrilled to be exhibiting again this year." "Our commitment to innovation reflects our dedication to staying at the forefront of the ever-evolving security market and we take great pride in being part of such a dynamic and promising industry. We look forward to showcasing our latest solutions to meet the growing demands of security worldwide.” New appointment Nemer brings over a decade of leadership experience in business development, smart cities, IoT Visitors to the Gallagher stand will have the opportunity to meet with a strong contingent from the Middle East team, including newly appointed Regional Director – Middle East North Africa, Nemer Mdardas. Based in the company’s Dubai office, Nemer brings over a decade of leadership experience in business development, smart cities, IoT solutions, and physical security systems. Intersec Dubai 2025 Marking its 26th year, Intersec Dubai runs from 14 - 16 January at Dubai’s World Trade Centre. The 2024 event attracted a huge international audience, hosting more than 47,000 trade buyers from 141 countries, including key government pioneers, agencies, and organisational heads across various industries. Visit Gallagher Security at stand S1-C16.
Expert commentary
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Rapid technological advancement, artificial intelligence (AI) and machine learning (ML) are revolutionising traditional on-premises video security systems. These next-level tools are not just enhancing video data capabilities; they're transforming how businesses approach security, operational efficiency, and information analysis. Video analytics have been a part of security systems for many years, but the arrival of deep learning in 2009 marked a turning point. By training neural networks, basic analytics tasks like motion detection, object detection, and tracking objects within scenes have become commonplace. This leap forward has paved the way for more sophisticated AI and ML applications in video security. Proactive security measures AI-powered systems can perform complex tasks such as pose estimation and anomaly detection Today's AI-powered systems can perform complex tasks such as pose estimation, anomaly detection, and behaviour analysis. These capabilities extend far beyond simple, passive monitoring, offering organisations rich insights and proactive security measures. For instance, analytics can now determine whether people are engaged in hostile or benign interactions, recognise unusual events that may signal safety hazards, and even predict potential security breaches before they occur — all based on analysing massive amounts of data that humans alone could never process. Enhancing on-premises infrastructure While the power of AI and ML in video security is clear, integrating these technologies into existing on-premises systems presents both opportunities and challenges. One of the primary considerations is the increased demand for processing power and storage capacity. As solution technology expands, hardware requirements will increase. This reality necessitates a strategic approach to system design and implementation. Organisations must carefully evaluate their current infrastructure and plan for future needs to ensure their on-premises systems can handle the computational demands of AI and ML tools. However, the benefits often outweigh the challenges. AI-enhanced on-premises systems offer several advantages: Real-time processing: On-premises AI can analyse video feeds in real time, allowing for immediate response to security threats. Data privacy: Keeping data processing on-site can help organisations meet strict data privacy regulations and protect sensitive information. Customisation: On-premises systems allow for greater customisation of AI models to meet specific security needs. Reduced latency: Processing data locally eliminates the need for constant cloud communication, reducing latency in critical security applications. The role of open platform video technology To fully leverage AI and ML capabilities in on-premises video security systems, open-platform video management software (VMS) plays a crucial role. An open platform VMS allows for seamless integration of various AI and ML tools, cameras, and other security devices, creating a highly flexible and scalable system. An open VMS can integrate thousands of cameras and sensors, allowing for centralised management and analysis of vast amounts of data. This approach enables security teams to quickly adapt to new threats and implement new and unplanned AI and ML solutions as they become available. Video system management The hybrid approach to video system management combines on-premises infrastructure with cloud services It's important to note that many organisations choose to deploy a hybrid approach to video system management that combines on-premises infrastructure with cloud services. This strategy can offer the best of both worlds: the control and low latency of on-premises systems with the scalability and advanced capabilities of cloud-based AI and ML tools. For example, some cities have implemented hybrid data storage models, hosting critical real-time data on local servers while leveraging cloud services for long-term storage and advanced analytics. This approach allows for efficient management of large amounts of high-resolution video data while reducing costs associated with on-premises storage expansion. Practical applications and benefits The integration of AI and ML into on-premises video security systems is transforming security practices across industries, offering benefits that extend beyond traditional surveillance. These advanced technologies enhance security measures while providing valuable insights for operational efficiency and strategic decision-making. By analysing video data in real time, AI and ML-powered systems can detect patterns and automate responses in unprecedented ways. Here are some key examples of sector-specific benefits: Retail: AI-powered analytics can optimise product placement, track shopping patterns, and enhance loss prevention efforts. Education: K-12 schools can use advanced video analysis to address issues like vaping and bullying, monitor traffic, ensure that proper procedures are followed, and provide enhanced safety and security. Manufacturing: AI can streamline quality control processes, detect safety violations, and optimise production line efficiency. Healthcare: Intelligent video systems can monitor patient safety, manage access control, and even assist in documenting and verifying that procedures and protocols are followed appropriately. Transportation: AI-enhanced video systems can improve traffic management, enhance security in transit hubs, and assist in incident response. Challenges and considerations Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively AI and ML hold great promise for on-premises video security, but organisations may encounter challenges during implementation. The considerable upfront costs could discourage smaller businesses or those with tight budgets. Nevertheless, this should be viewed as a long-term investment with significant returns in enhanced security and operational efficiency. Implementing AI-powered systems in video security can be complex, often requiring specialised skills, potentially creating a gap within existing IT or security teams. To bridge this skills gap, organisations may need to invest in training or partner with external experts to address this challenge. Additionally, the quality of data is crucial for effective AI and ML implementation; poor or insufficient data can result in inaccurate analyses and unreliable results. Ensuring access to robust, diverse, and representative data sets is essential for training AI models effectively. Benefits of integrating AI and ML Ethical considerations surrounding privacy, consent, and potential algorithmic bias are also critical. Organisations must strike a balance between enhancing security and safeguarding individual privacy rights to maintain public trust in these technologies. Despite these challenges, the benefits of integrating AI and ML into on-premises video security systems often outweigh the difficulties. Careful planning, resource investment, and a strong focus on ethical and regulatory compliance can lead to more effective, efficient, and intelligent security solutions. Future outlook Edge computing capabilities will enable sophisticated AI processing directly on cameras The future of AI and ML in on-premises video security promises significant advancements that will address current limitations and unlock new possibilities. Edge computing capabilities will enable sophisticated AI processing directly on cameras and other security devices, reducing strain on central servers and potentially lowering hardware requirements. This, combined with more efficient AI algorithms, will democratise access to advanced AI and ML capabilities for organisations of all sizes. AI-powered analytics Predictive analytics will become a cornerstone of future video security systems, marking a shift from reactive to proactive security measures. As AI models become more sophisticated, their ability to anticipate and prevent security incidents will improve dramatically, revolutionising risk management and incident response. The integration between video security and other business systems will deepen, with AI-powered analytics providing insights beyond security into business operations and strategic decision-making. Data for training AI models Explainable AI will become more overall, which is vital for building trust in automated systems Automation of security processes will reach new heights, freeing human operators to focus on high-level decision-making and complex situations. To support this evolution, we'll likely see increased use of synthetic data for training AI models, addressing privacy concerns, and improving model robustness. Explainable AI will become more prevalent, which is crucial for building trust in automated systems and meeting regulatory requirements. For security professionals, embracing these technologies is no longer optional but necessary to remain competitive and provide the best possible service to clients. By leveraging open platform VMS and carefully planning system architectures, organisations can create flexible, scalable, and powerful video security solutions that not only protect assets but also drive business value. Enhanced video security systems The key to success will be finding the right balance between on-premises control and cloud-based capabilities while addressing important considerations around privacy, ethics, and regulatory compliance. With thoughtful implementation and ongoing adaptation, AI and ML-enhanced video security systems will continue to play an increasingly central role in safeguarding our businesses, institutions, and communities.
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Challenges with existing CCTV Daniel Chappell, Technical Account Manager at North takes up the story, “Historically, South Shields had an existing public safety CCTV system, which was mainly street-focused." "However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate a new surveillance solution, to cover its twelve town centre car parks." New solution requirements “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirements and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation." “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibreoptic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive." TX streaming camera “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling." "Taking up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross-referenced with network operators to provide the best quality of signal at each specific camera location.” Invictus PTZ TX cameras Authorised operatives in the field can view selected Invictus TX camera images using a laptop browser Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Car park safety and security Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said, “This investment forms part of wider improvements to our CCTV provision which is a vital tool in helping to keep our residents and visitors safe." “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security, and management of the car parks." Real-time monitoring "Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real-time more quickly and effectively." "The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness, and surveillance.” Camera features Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision Featuring a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available,” Daniel explains. Comprehensive coverage “This advanced functionality offers peace of mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras provide comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Ultra-low light technology Adrian Kirk, Business Development Director at 360 Vision Technology commented, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks." "For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper, and more defined colour images, even at night time. We are proud to have delivered a practical Invictus TX-based camera solution as part of the STC CCTV network upgrade.”
Nestled in the scenic countryside near Umberleigh, Northcote Manor Country House Hotel & Spa combines award-winning accommodation, fine dining, and a tranquil spa. This 18th-century country house is devoted to providing elegance and security for its guests. Partnering with local locksmith experts, Keyhole Surgery upgraded its security management by installing a Mul-T-Lock MTL™300 master key suite. MTL™300 master key system Mul-T-Lock’s MTL™300 master key system offers ideal security for Northcote Manor’s 16 guest rooms. The suite enhances safety across the hotel, giving management precise control over key access while ensuring guests' peace of mind. Richie Herkes, General Manager of Northcote Manor Country House Hotel & Spa, commented, “At our beautiful Georgian manor, dating back to Tudor times, we’re committed to providing our guests with a serene and secure environment. We trusted David to deliver an upgrade to our room security’s existing system that could accommodate." Additional security layer With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure "He recommended the Mul-T-Lock MTL™300 master key suite as a secure yet discreet access management across all rooms and common areas, improving our operations without compromising style.” With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure, ensuring only those with the appropriate permissions can enter restricted room areas at any given time. The capability to manage multiple permission levels adds a critical layer of security, minimising unauthorised access and enhancing operational efficiency. Easy installation improves overall management David Pearcy of Keyhole Surgery explained why the MTL™300 was the ideal choice for the upgrade, “For a distinguished property like Northcote Manor, it was essential to implement a high-security solution that wouldn’t interfere with the building’s stunning historic appeal." "The Mul-T-Lock MTL™300 suite provides the right balance with a cylinder design that is easy to install on existing doors. The master key system allows staff to access essential areas quickly and efficiently, reducing the need for multiple keys and improving overall management.” Secure and flexible access management system The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor, while maintaining a secure, flexible, and efficient access management system specifically designed to give authorised personnel-controlled access to the hotel’s rooms and facilities. Ian Thresher, Mul-T-Lock regional sales manager for the South-West, shared his thoughts on the partnership, “Northcote Manor’s decision to work with Keyhole Surgery as an established Mul-T-Lock authorised dealer and to implement the MTL™300 master key suite reflects a forward-thinking approach to hospitality security." Precise security management "MTL™300 offers an elegant, streamlined solution that aligns perfectly with the hotel’s dedication to both guest comfort and operational excellence." "By reducing key clutter and enabling precise security management, this system helps Northcote Manor retain its renowned beauty and charm safely for many, many years to come.”
The Four Seasons Hotel Sydney Energy Efficiency Upgrade (BOOT Scheme) comprised the upgrade of the hotel’s mechanical plant room that dated back to 1981 – when the landmark hotel was built – with modern, energy-efficient equipment and systems delivered via a ‘Build, Own, Operate and Transfer’ (BOOT) scheme. EQUANS designed, built, and now own the upgraded plant room, which they will operate and maintain for 12 years. At the end of the term, the client will obtain ownership of a well-maintained, optimised plant room. Guaranteed energy savings The solution comprises the design and delivery of a facility upgrade, ongoing operation with full equipment warranty, delivering 100% operational availability and guaranteed energy savings to the client. 2 x 900kW Quantum Chillers utilising magnetic bearing, oil-free Turbocor compressors Heat recovery from the chillers via the condenser water loop 2 x Rendamax fully condensing boilers for Heating Hot Water and Domestic Hot Water, controlled at independent set points for maximum efficiency Kamstrup Ultrasonic Thermal Energy Metres to monitor, control and measure the hotel’s secondary energy demand and consumption Existing fibreglass cooling towers were refurbished with all-new fill and fans Side stream filtration was installed on the condenser water system to minimise the amount of chemicals required The entire building BMS was upgraded including central plant optimisation and energy management system Energy management system The two chillers were reportedly the world’s first magnetic bearing screw chillers of this capacity and length to be loaded via a goods lift, saving a huge cost for cranage in Sydney’s CBD. The innovative chiller design allowed the evaporator and condenser vessels to be transported in the lift, without the need for split vessels, removing the risk of costly repairs for leaking gaskets during the life of the chillers. Results indicate a saving of 23% in electricity within the first two months of operation, which is expected to increase to 26% per annum once system optimisation is complete.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
Comelit-PAC has partnered with Harrold Jones Services Limited to deliver a stylish and secure access control solution at Warmstry Court, resolving security concerns and ensuring residents' safety and independence. Situated near Worcester’s city centre and next to the River Severn, Warmstry Court is an esteemed housing development, offering high-quality living for older residents while providing peace of mind through secure and comfortable surroundings. Unique security challenges The complex includes several general needs properties rented by Sanctuary Housing The complex includes several general needs properties rented by Sanctuary Housing. Its central location has posed unique security challenges, particularly regarding access control for the building’s car park and residential areas. Sanctuary Housing sought the expertise of Harrold Jones Services to address issues with their existing access control system. After a detailed risk assessment of the site’s needs, Harrold Jones Services collaborated with Comelit-PAC to design and install a tailored access control solution. The new system incorporates Comelit-PAC’s New Housing Central Product combined with High-Security Anti-Cloning Credentials, enabling site managers to monitor and control access from any PC or smart device, regardless of their location. Integrated with Comelit-PAC’s 512 series controllers Says Sanctuary Housing Scheme Manager Kim Tolnai: “The upgraded access control system has completely transformed how we manage the site. Residents now feel much more secure, and we have full control over who can enter the building and use the car park. The ability to monitor the system remotely has also been embraced by our management team. It gives us peace of mind, knowing we can monitor the site wherever we are.” The installation included high-frequency vandal-resistant readers on both the car park barrier and main entry points, integrated with Comelit-PAC’s 512 series controllers and the Housing Central Gateway. This combination delivers total security and reliability, ensuring only authorised residents can access the property and its parking facilities. Comelit-PAC solution A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents Says Danny Wallis, Director of Harrold Jones Services: “We worked closely with the team at Warmstry Court from early specification to ensure the access control system met the bespoke security requirements of the site. The Comelit-PAC solution has been instrumental in providing a comprehensive, future-proof system that seamlessly blends with surroundings with no impact on the aesthetics of the site. The result not only meets but exceeds the expectations of the residents and management team.” A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents. These secure tokens ensure that only authorised individuals can gain access, putting an end to the cloning issues that had previously plagued the site. Installation of the Comelit-PAC access control system Lloyd Palmer, Comelit-PAC’s Regional Sales Manager, provided on-site support to assist with the system’s setup and programming. He also ensured the management team at Warmstry Court was fully trained on the system’s features. Lloyd concluded: “The installation of the Comelit-PAC access control system has transformed security management at Warmstry Court. Sanctuary Housing now benefits from a robust system that ensures only authorised individuals have access to the building and its facilities. The advanced anti-cloning technology and the ability to manage the system remotely provide the ultimate in convenience, security and peace of mind for both residents and management.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Challenges with existing CCTV Daniel Chappell, Technical Account Manager at North takes up the story, “Historically, South Shields had an existing public safety CCTV system, which was mainly street-focused." "However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate a new surveillance solution, to cover its twelve town centre car parks." New solution requirements “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirements and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation." “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibreoptic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive." TX streaming camera “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling." "Taking up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross-referenced with network operators to provide the best quality of signal at each specific camera location.” Invictus PTZ TX cameras Authorised operatives in the field can view selected Invictus TX camera images using a laptop browser Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Car park safety and security Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said, “This investment forms part of wider improvements to our CCTV provision which is a vital tool in helping to keep our residents and visitors safe." “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security, and management of the car parks." Real-time monitoring "Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real-time more quickly and effectively." "The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness, and surveillance.” Camera features Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision Featuring a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available,” Daniel explains. Comprehensive coverage “This advanced functionality offers peace of mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras provide comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Ultra-low light technology Adrian Kirk, Business Development Director at 360 Vision Technology commented, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks." "For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper, and more defined colour images, even at night time. We are proud to have delivered a practical Invictus TX-based camera solution as part of the STC CCTV network upgrade.”
Nestled in the scenic countryside near Umberleigh, Northcote Manor Country House Hotel & Spa combines award-winning accommodation, fine dining, and a tranquil spa. This 18th-century country house is devoted to providing elegance and security for its guests. Partnering with local locksmith experts, Keyhole Surgery upgraded its security management by installing a Mul-T-Lock MTL™300 master key suite. MTL™300 master key system Mul-T-Lock’s MTL™300 master key system offers ideal security for Northcote Manor’s 16 guest rooms. The suite enhances safety across the hotel, giving management precise control over key access while ensuring guests' peace of mind. Richie Herkes, General Manager of Northcote Manor Country House Hotel & Spa, commented, “At our beautiful Georgian manor, dating back to Tudor times, we’re committed to providing our guests with a serene and secure environment. We trusted David to deliver an upgrade to our room security’s existing system that could accommodate." Additional security layer With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure "He recommended the Mul-T-Lock MTL™300 master key suite as a secure yet discreet access management across all rooms and common areas, improving our operations without compromising style.” With the Mul-T-Lock MTL™300 master key suite, management can establish a hierarchical access structure, ensuring only those with the appropriate permissions can enter restricted room areas at any given time. The capability to manage multiple permission levels adds a critical layer of security, minimising unauthorised access and enhancing operational efficiency. Easy installation improves overall management David Pearcy of Keyhole Surgery explained why the MTL™300 was the ideal choice for the upgrade, “For a distinguished property like Northcote Manor, it was essential to implement a high-security solution that wouldn’t interfere with the building’s stunning historic appeal." "The Mul-T-Lock MTL™300 suite provides the right balance with a cylinder design that is easy to install on existing doors. The master key system allows staff to access essential areas quickly and efficiently, reducing the need for multiple keys and improving overall management.” Secure and flexible access management system The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor The Mul-T-Lock MTL™300 master key suite minimises keys in operation for Northcote Manor, while maintaining a secure, flexible, and efficient access management system specifically designed to give authorised personnel-controlled access to the hotel’s rooms and facilities. Ian Thresher, Mul-T-Lock regional sales manager for the South-West, shared his thoughts on the partnership, “Northcote Manor’s decision to work with Keyhole Surgery as an established Mul-T-Lock authorised dealer and to implement the MTL™300 master key suite reflects a forward-thinking approach to hospitality security." Precise security management "MTL™300 offers an elegant, streamlined solution that aligns perfectly with the hotel’s dedication to both guest comfort and operational excellence." "By reducing key clutter and enabling precise security management, this system helps Northcote Manor retain its renowned beauty and charm safely for many, many years to come.”
The Four Seasons Hotel Sydney Energy Efficiency Upgrade (BOOT Scheme) comprised the upgrade of the hotel’s mechanical plant room that dated back to 1981 – when the landmark hotel was built – with modern, energy-efficient equipment and systems delivered via a ‘Build, Own, Operate and Transfer’ (BOOT) scheme. EQUANS designed, built, and now own the upgraded plant room, which they will operate and maintain for 12 years. At the end of the term, the client will obtain ownership of a well-maintained, optimised plant room. Guaranteed energy savings The solution comprises the design and delivery of a facility upgrade, ongoing operation with full equipment warranty, delivering 100% operational availability and guaranteed energy savings to the client. 2 x 900kW Quantum Chillers utilising magnetic bearing, oil-free Turbocor compressors Heat recovery from the chillers via the condenser water loop 2 x Rendamax fully condensing boilers for Heating Hot Water and Domestic Hot Water, controlled at independent set points for maximum efficiency Kamstrup Ultrasonic Thermal Energy Metres to monitor, control and measure the hotel’s secondary energy demand and consumption Existing fibreglass cooling towers were refurbished with all-new fill and fans Side stream filtration was installed on the condenser water system to minimise the amount of chemicals required The entire building BMS was upgraded including central plant optimisation and energy management system Energy management system The two chillers were reportedly the world’s first magnetic bearing screw chillers of this capacity and length to be loaded via a goods lift, saving a huge cost for cranage in Sydney’s CBD. The innovative chiller design allowed the evaporator and condenser vessels to be transported in the lift, without the need for split vessels, removing the risk of costly repairs for leaking gaskets during the life of the chillers. Results indicate a saving of 23% in electricity within the first two months of operation, which is expected to increase to 26% per annum once system optimisation is complete.
With the market constantly demanding security changes, Anviz has taken a bold step forward with the launch of the M7 Palm—a groundbreaking smart biometric access control terminal that harnesses the power of palm vein recognition technology. As the need for intelligence and security in building spaces continues to evolve, the demand for more compatible yet user-friendly access control solutions has never been stronger. The M7 Palm represents our answer to this challenge, offering a unique blend of advanced palm vein recognition technology and practical functionality. With Palm Vein, the M7 Palm rejects all threats and provides absolute security for peace of mind. It is also adapted to all conditions without being affected by external factors. From concept to reality Understanding that real-world performance is the true measure of any security solution, Anviz initiated a comprehensive customer programme shortly after the M7 Palm's development. The process began with an engaging webinar series, where potential partners and customers got their first glimpse of the technology. During these sessions, Anviz not only demonstrated the M7 Palm's capabilities but also discussed specific implementation scenarios and potential use cases with the partners. Regular remote support sessions Through regular remote support sessions, Anviz helped partners optimise their usage processes Following the webinars, selected partners received M7 Palm prototypes for hands-on usage. The technical team provided detailed installation guidance and used protocols, ensuring that partners could effectively evaluate the system in their specific environments. Through regular remote support sessions, Anviz helped partners optimise their usage processes to gather the most valuable insights about the M7 Palm's performance across different settings and user groups. Partnership spotlight: Portenntum's vision for the future Among the valued testing partners, Portenntum has emerged as a particularly enthusiastic advocate for palm vein technology. As a security solutions provider in Latin America, Portenntum brings years of expertise in implementing cutting-edge access control systems. Their thorough usage approach, including detailed video documentation of user interactions, has provided invaluable insights into real-world usage scenarios. Security with convenience "The future of access control lies in technologies that combine security with convenience," notes the Portenntum team. Their forward-thinking approach and willingness to explore new solutions make them an ideal partner in refining the M7 Palm's capabilities. Through their extensive client network, they've helped us understand how palm vein technology can address various security challenges across different industries. Voice of users: real-world experiences Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities Anviz's comprehensive customer programme has brought valuable insights from multiple partners, including Portenntum, SIASA, and JM SS SRL. Their hands-on experience with the M7 Palm has revealed both immediate strengths and opportunities for enhancement. Success stories in daily use Portenntum's usage team highlighted one of the system's key strengths, "In the second stage, when identifying once the palm was already registered, the process was very fast, even putting the palm in different positions." This flexibility in daily use demonstrates the M7 Palm's practical value in real-world applications. User-friendly SIASA's comprehensive usage, which involved enrolling their entire team, found the system "quite user-friendly." This broad-based usage provided valuable insights into how different users interact with the technology. JM SS SRL's implementation showed promising initial results, with the report that "all the personnel could register their palms to perfection" during the first phase of usage. Making palm recognition more intuitive Its user manual includes clear, step-by-step guidance for optimal palm positioning Based on SIASA's feedback, Anviz recognised an opportunity to make the palm positioning process more user-friendly. Its user manual includes clear, step-by-step guidance for optimal palm positioning. These instructions will help users quickly master the correct positioning technique, ensuring a smooth and efficient authentication process right from the start. Looking ahead: Heading the biometric revolution As Anviz prepares to roll out the M7 Palm more widely, they are already incorporating the insights gained from the customer programme into product improvements. The development team is working on enhanced user guidance systems, refined recognition algorithms, and comprehensive documentation to ensure smooth implementation for future users. Operational efficiency The feedback suggests that palm vein technology could become a new benchmark in biometric security Industry pioneers among its partners have highlighted the M7 Palm's potential to transform access control standards, particularly in environments requiring high security and operational efficiency. Their feedback suggests that palm vein technology could become a new benchmark in biometric security solutions. Biometric access control The M7 Palm represents more than just a new product – it begins a new chapter in biometric access control. By combining cutting-edge palm vein recognition technology with real-world usability insights, Anviz is positioning itself at the forefront of the next generation of security solutions. This journey with the M7 Palm reinforces its commitment to innovation in the security industry. As Anviz continues to gather feedback and refine its technology, they are not just developing a product – they are helping shape the future of access control, one palm scan at a time.
Comelit-PAC has partnered with Harrold Jones Services Limited to deliver a stylish and secure access control solution at Warmstry Court, resolving security concerns and ensuring residents' safety and independence. Situated near Worcester’s city centre and next to the River Severn, Warmstry Court is an esteemed housing development, offering high-quality living for older residents while providing peace of mind through secure and comfortable surroundings. Unique security challenges The complex includes several general needs properties rented by Sanctuary Housing The complex includes several general needs properties rented by Sanctuary Housing. Its central location has posed unique security challenges, particularly regarding access control for the building’s car park and residential areas. Sanctuary Housing sought the expertise of Harrold Jones Services to address issues with their existing access control system. After a detailed risk assessment of the site’s needs, Harrold Jones Services collaborated with Comelit-PAC to design and install a tailored access control solution. The new system incorporates Comelit-PAC’s New Housing Central Product combined with High-Security Anti-Cloning Credentials, enabling site managers to monitor and control access from any PC or smart device, regardless of their location. Integrated with Comelit-PAC’s 512 series controllers Says Sanctuary Housing Scheme Manager Kim Tolnai: “The upgraded access control system has completely transformed how we manage the site. Residents now feel much more secure, and we have full control over who can enter the building and use the car park. The ability to monitor the system remotely has also been embraced by our management team. It gives us peace of mind, knowing we can monitor the site wherever we are.” The installation included high-frequency vandal-resistant readers on both the car park barrier and main entry points, integrated with Comelit-PAC’s 512 series controllers and the Housing Central Gateway. This combination delivers total security and reliability, ensuring only authorised residents can access the property and its parking facilities. Comelit-PAC solution A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents Says Danny Wallis, Director of Harrold Jones Services: “We worked closely with the team at Warmstry Court from early specification to ensure the access control system met the bespoke security requirements of the site. The Comelit-PAC solution has been instrumental in providing a comprehensive, future-proof system that seamlessly blends with surroundings with no impact on the aesthetics of the site. The result not only meets but exceeds the expectations of the residents and management team.” A key feature of the new system is the assurance of 128-bit encrypted OPS tokens to all residents. These secure tokens ensure that only authorised individuals can gain access, putting an end to the cloning issues that had previously plagued the site. Installation of the Comelit-PAC access control system Lloyd Palmer, Comelit-PAC’s Regional Sales Manager, provided on-site support to assist with the system’s setup and programming. He also ensured the management team at Warmstry Court was fully trained on the system’s features. Lloyd concluded: “The installation of the Comelit-PAC access control system has transformed security management at Warmstry Court. Sanctuary Housing now benefits from a robust system that ensures only authorised individuals have access to the building and its facilities. The advanced anti-cloning technology and the ability to manage the system remotely provide the ultimate in convenience, security and peace of mind for both residents and management.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution has been adopted by Cardinal Local Schools in Middlefield, Ohio to protect its students, faculty, and staff from gun-related threats. Gun-related violence Gun-related violence remains a significant and growing problem in the United States, affecting communities across the country. According to the ZeroEyes Gun Violence Research Centre, 42% of Ohio shootings analysed took place in K-12 institutions. “We are committed to ensuring the safety of our community,” said Jack Cunningham, superintendent of Cardinal Local Schools. AI gun detection “With the addition of a full-time Resource Officer and security measures like locked doors, visitor sign-ins, door barricade devices, and metal detectors, we are trying to take advantage of as many steps as possible to enhance our security efforts." "ZeroEyes’ AI gun detection is a crucial part of this multi-layered security plan and provides extra reassurance that we can respond swiftly to potential gun threats.” Cardinal Local Schools The district is recognised for successfully implementing PBIS district-wide Cardinal Local Schools is a rural public district serving approximately 750 K-12 students in Geauga and Trumbull counties. Students can take college preparatory classes, fine arts classes, and college credit plus courses. Through partnerships with local factories, Cardinal Local Schools provides an engineering and manufacturing pathway for students pursuing college or workforce opportunities. The district is recognised for successfully implementing Positive Behavioural Interventions and Supports (PBIS) district-wide, highlighting its commitment to a safe and supportive learning environment. Intelligent situational awareness software ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and university security as quickly as 3 to 5 seconds from detection. School safety standards “By integrating our AI gun detection system, Cardinal is setting a new standard for school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our goal is to provide peace of mind and ensure that any potential gun threats are identified and addressed before first shots are fired, helping to create a safer learning environment for everyone."
Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Products
White papers
Is access control in the cloud more cost effective?
DownloadInnovative edge storage solutions for the video surveillance industry
DownloadEnhanced Ethernet Technology (ePoE)
DownloadDo you know the weakest link of your access control system?
DownloadSafeguard Students With New Techniques And Technology
Download5 ways to strengthen physical security with an integrated system
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadSmart security cameras: excellence in retail
DownloadIs access control in the cloud more cost effective?
DownloadInnovative edge storage solutions for the video surveillance industry
DownloadEnhanced Ethernet Technology (ePoE)
DownloadDo you know the weakest link of your access control system?
DownloadSafeguard Students With New Techniques And Technology
Download5 ways to strengthen physical security with an integrated system
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadSmart security cameras: excellence in retail
DownloadVideos
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Hanwha Vision Security devices
- Aritech Security devices
- Parabit Security devices
- LILIN Security devices
- VIVOTEK Security devices
- Hikvision Security devices
- BCDVideo Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- AV Costar Security devices
- HID Security devices
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download