Security policy
SERMA Safety and Security has become the first laboratory to be accredited under the EUCC scheme by ANSSI (Agence Nationale de la Sécurité des Systèmes d’Information, the French National Cybersecurity Agency). This strategic recognition allows SERMA to assess hardware and software products under the new European Union Common Criteria (EUCC) security framework, contributing to the harmonisation and digital sovereignty of Europe. Laboratory to conduct EUCC evaluations&...
Bugcrowd, the pioneer in crowdsourced security, announced an alliance with GlobalDots, the cloud innovation and security specialist. Under the agreement, Germany-based GlobalDots will integrate Bugcrowd’s crowdsourced security platform into its portfolio of cloud infrastructure, CDN, DevOps, and AI solutions. Bugcrowd’s AI-powered platform The alliance will make Bugcrowd’s AI-powered crowdsourcing platform available to GlobalDots’ 350-plus international client base, wh...
Award-winning security manufacturer, Gallagher Security, is reflecting on the success of this year’s The Security Event 2025 held at Birmingham’s NEC from 8-10 April. Among a full-strength Gallagher Europe team, and attending his first TSE event, Gallagher Security, Executive Vice President – Europe, Spencer Marshall says, “TSE was a spectacular event, and provided the perfect platform to engage with Channel Partners, End Users, and members of the wider security in...
Infosecurity Europe, the most influential information security event, which runs from 3-5 June 2025, has announced the launch of ‘Infosecurity Europe Masterclasses, powered by SANS Institute,’ an exclusive new training initiative designed to equip cybersecurity professionals with hands-on, practical skills. Developed for Infosecurity Europe 2025, the Masterclasses will offer three deep-dive sessions covering Digital Forensics, Cloud Security, and Security Culture. Digita...
Award-winning security manufacturer, Gallagher Security, has been awarded the contract to secure the University of Witwatersrand (WITS) in Johannesburg, one of South Africa’s largest universities. Spread across 400 acres in Braamfontein and Parktown, WITS boasts five faculties comprising 35 schools, more than 30 service departments, 11 libraries, 18 halls of residence with 6600 beds, and offers 3416 courses. Gallagher access control system Gallagher replaces the extant access control sy...
His Majesty’s Revenue and Customs (HMRC) has blocked over 100 million malicious emails in the past three years, as cyber threats against UK government services continue to escalate. The data was obtained through a Freedom of Information (FOI) request, where HMRC disclosed detailed figures on the volume of malicious emails blocked from November 2021 to September 2024. Data rise in cyberattacks The data shows a sharp rise in cyberattacks, highlighting the growing threat to the UK govt fav...
News
The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with ISC West, recognising innovative security products, services, and solutions. Top among the winners, who were recognised April 2 during an award ceremony at the Bridge Stage on the ISC West show floor, was Vaidio, receiving the 2025 Best New Product Award. SIA NPS product and service categories SIA NPS has been the security industry’s premier product awards program Since its inception in 1979, SIA NPS has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2025, following significant deliberations, the 38 judges presented awards for technologies covering 33 product and service categories. The 2025 SIA NPS Awards entries will be on display through Friday, April 4, in Booth #25075 on the ISC West show floor, adjacent to the Bridge Stage (Booth #25059). Vaidio 9.0 advanced models Vaidio received the Best New Product honor for its Vaidio 9.0 AI Vision Platform product, submitted in the Loss Prevention and Article Surveillance Solutions category. “Vaidio 9.0 enhances loss prevention by combining advanced (artificial intelligence) models, heuristic rules and intelligent compute management to deliver precise analytics for detecting theft and reducing inventory shrinkage,” said Vaidio. “Its unique orchestration of CNN, transformer and VLM models increases accuracy, reduces compute consumption and improves speed, while integrating seamlessly with existing infrastructure.” AI-driven engagement The prestigious Judges’ Choice Award was presented to RAD for the SARA The prestigious Judges’ Choice Award was presented to Robotic Assistance Devices (RAD) for the SARA – AI Security Agent for Autonomous Threat Detection and Response product, submitted in the Threat Detection and Response Solutions category. “SARA revolutionises (global security operations centers) and monitoring by transforming passive surveillance into real-time, AI-driven engagement,” said RAD. “This autonomous security agent detects threats, interacts with individuals, verifies intent and escalates incidents as needed, enhancing security efficiency, reducing operator fatigue, preventing overlooked events and ensuring faster, smarter and more effective incident response across diverse environments.” Amazing new products and solutions “This year’s SIA NPS program has had another fantastic year with amazing new products and solutions presented to our judging panels,” said Christine Bergeron, chair of the SIA NPS Awards Committee and senior director of global physical security technology at Visa. “Thank you to our expert judges and committee members for your dedication to the program and lending your expertise and valuable time to contribute to a successful 2025 SIA NPS program.” Advancement of SIA and the security CyberLock received the NPS Merit Award, which admits an person or company who, through their support of SIA “The SIA NPS Awards are a renowned global platform for highlighting new offerings each year, and earning recognition is an impressive accomplishment,” said Elisa Mula, vice chair of the SIA NPS Awards Committee and founder and protection management specialist at EM Designs. “SIA applauds this year’s winners, who impressed our judges after an extensive process of tech demonstrations and panel-driven judging.” Additionally, CyberLock received the NPS Merit Award, which recognises an individual or company who, through their support of the SIA NPS Awards, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. New security technology solutions “SIA congratulates all the winners of the 2025 SIA NPS Awards, and especially Vaidio and Robotic Assistance Devices, whose products stood out among the entries to earn the Best New Product and Judges’ Choice distinctions, as well as SIA NPS Merit Award winner CyberLock,” said SIA CEO Don Erickson. “Each year, NPS presents the most cutting-edge products available on the market today, and our judges’ dedication, support and thorough consideration are invaluable in maintaining it as the most trusted awards program for launching new security technology solutions.” 2025 SIA NPS award winners Best new product award Winner: Vaidio – Vaidio 9.0 AI Vision Platform Judges’ choice award Winner: Robotic Assistance Devices – SARA – AI Security Agent for Autonomous Threat Detection and Response SIA NPS Merit award Winner: CyberLock Category awards Access Control Devices & Peripherals Hardware – Wireless Winner: Sure-Fi – Sure-Fi Access Pro Bridge Access Control Software, Hardware, Devices & Peripherals – Wired Winner: Safetrust – IoT Neural Sensor Honorable Mention: Accessia – Accessia Reader Antiterrorism/Force Protection/Armed Aggressor Winner: Xonar Technology – TruePort Biometrics Winner: Intel RealSense + Ones Technology – BioAffix Gate Vision Powered by Ones Technology and Intel RealSense ID F450 Communications and Networking Solutions Winner: Commend Americas – Ivy Live Translation – Ivy Virtual Assistant’s Multilingual Real-Time Translation Capabilities, Part of Commend’s Symphony Cloud Solution for Security Communication Convergence and Integration Solutions Winner: AURA – AURA Auto Guard Dispatch Data and Systems Cybersecurity Winner: SWEAR – SWEAR Security Design, Diagnostic and Installation Tools Winner: dormakaba – EntriWorX Insights Enhanced Project Delivery Winner: Vaidio – Vaidio 9.0 Environmental Monitoring Systems Winner: XSponse – X-Shield Honorable Mention: Secure Passage – Truman Fire/Life Safety Winner: Honeywell – Connected Life Safety Services (CLSS) Compliance Manager With Auto-Pass Honorable Mention: Honeywell – CLSS Cloud-Connected Horizon Identification Management and Credentialing (Nonbiometric) Winner: Wavelynx, rf IDEAS and Idemia (Founding Companies of LEAF Community) – LEAF Community Intrusion Detection and Prevention Solutions (Physical) – Wired or Wireless Winner: SPOT AI – SPOT AI Remote Security Agent Honorable Mention: Hexagon – HxGN dC3 LidarVision Key/Equipment Assets Management Solutions Winner: CyberLock – ValidiKey Pro Law Enforcement/Public Safety/Guarding Systems Winner: 3Si Security Systems – DirectToDispatch Honorable Mention: Eagle Eye Networks – Eagle Eye 911 Camera Sharing Lock and Key Solutions Winner: dormakaba – CenconX OTC Safe Lock Honorable Mention: Securitech ASSA ABLOY – PARAMAXX Loss Prevention and Article Surveillance Solutions Winner: Vaidio – Vaidio 9.0 AI Vision Platform Managed Services Winner: ADRM – DEFENDER Honorable Mention: Allied Universal – Unified Command Center Mobile Solutions Winner: Intel RealSense + Ones Technology – BioAffix Vision Mobile Powered by Intel RealSense ID 450 Threat/Risk Management Software Applications Winner: Bearing – Bearing Honorable Mention: Sign In Solutions – Sign In Solutions – Risk Insights Threat Detection and Response Solutions Winner: Robotic Assistance Devices – SARA – AI Security Agent for Autonomous Threat Detection and Response Honorable Mention: Xtract One Technologies – Xtract One Gateway Video Analytics Winner: Lumana – Lumana Video Intelligence Platform Video Surveillance Advanced Imaging Technologies Winner: Axis Communications – ARTPEC-9 Video Surveillance Cameras Winner: Hanwha Vision America – 4CH AI Multi-Sensor Camera With WAVE VMS Powered by the NVIDIA Jetson Platform Honorable Mention: Axis Communications – AXIS Q1809-LE Bullet Camera Video Surveillance Hardware and Accessories Winner: Spectrum Camera Solutions – F200 Series Explosion-Proof Housing System Video Surveillance Management Systems Winner: Monitor Computer Systems – Sentinel
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, is reinforcing its commitment to providing comprehensive life safety solutions across industries by unveiling solutions designed specifically for the non-acute healthcare and correctional facilities industries. The company’s non-acute bundled solution combines advanced security and fire prevention technologies to help modernise healthcare facilities, improve safety and enhance overall patient and staff experience. Additionally, Johnson Controls is expanding its correctional facilities offerings to address the growing challenges of outdated and often overlooked buildings, helping communities ensure that they have the necessary infrastructure to enhance security and emergency response. Enhancing security and efficiency in non-acute healthcare As demand for clinics, urgent care centres, outpatient facilities, and other non-acute healthcare environments increases, Johnson Controls is providing bundled solutions that integrate critical aspects of security and fire prevention technologies including: Video Surveillance & Access Control – Strengthening physical security and facility oversight with AI and data analytics. Weapons & Gunshot Detection – Leveraging a cloud-based security solution to enhance threat prevention. Fire Safety Innovations – Suppression systems such as connected sprinkler systems and emergency lighting that can improve safety. Integrating advanced security “By integrating advanced security, fire prevention and technologies that connect building systems, Johnson Controls is helping to create safer, more resilient non-acute healthcare environments,” said James Burke, vice president, product sales & lifecycle solutions at Johnson Controls. “Our latest bundle leverages industry expertise and advanced technology to streamline operations, optimise staffing resources and can enhance patient and staff safety in outpatient clinics, urgent care centres, long-term care facilities and more. In these settings—where staff are stretched thin and operational efficiency directly impacts patient care—having the right technologies and service helps to provide a safe, comfortable environment for both patients and caregivers.” Strengthening correctional facilities Johnson Controls has taken steps to enhance security for penal facilities, including state and federal prisons In parallel, Johnson Controls has taken steps to enhance security for correctional facilities including state and federal prisons, county and local jails and detention centres. Across the U.S. and Canada, Johnson Controls is addressing the challenges that correctional facilities can face due to outdated infrastructure and decades of underinvestment by upgrading HVAC, fire, and security systems to modern standards, improving both safety and operational efficiency. Johnson Controls security systems Johnson Controls provides correctional facilities with tailored solutions such as video surveillance, visitor management, fire detection systems, fire suppression and more to help create safer and more secure environments for both the occupants and facilities. “Nearly one-third of correctional facilities are over 50 years old and are in critical need of key upgrades – from security systems to mechanical equipment,” said Greg Parker, vice president, lifecycle solutions at Johnson Controls. “Not only can these upgrades enhance overall conditions and safety for facility personnel, inmates and visitors, but the utility bills can also be lower due to overall operational efficiency.” Physical and cyber security Johnson Controls has a strong fact across industry sectors and continues to develop tailored solutions Johnson Controls has a strong presence across industry sectors and continues to develop tailored solutions that prioritise security alongside efficiency and sustainability. With a focus on innovation, the company is committed to expanding its expertise in high-growth industries, including healthcare, education, government and data centres, by delivering advanced solutions that strengthen physical and cyber security, safeguard critical infrastructure and ensure resilient operations. Next era for commercial buildings Johnson Controls proudly celebrates its 140th anniversary in 2025, marking a legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. The company continues to redefine building performance, driving the next era for commercial buildings, transforming industries and powering its customers’ missions.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the launch of IQ Panel 5. Powered by a Qualcomm® DrangonWing™ processor, the IQ Panel 5 preserves the features of the IQ Panel 4 that end users know and love while delivering a new powerful platform of the future. The IQ Panel 5 will be on display at ISC West 2025 in Las Vegas, Nevada, from March 31-April 4 (Booth 18033) for attendees to experience firsthand. Intuitive IQ Panel 5 packs “Dealers and installers have trusted Johnson Controls for over 15 years to be accessible as their needs change and to refine products in direct response to their feedback,” said Faisal Pandit, president, Controls and Security Systems at Johnson Controls. “The intuitive IQ Panel 5 packs all of their most requested enhancements into one secure, next-generation panel that will ultimately drive faster and more accurate installations, more scalable businesses and improved overall security.” Innovation in hardware and software components The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE “Ongoing collaborations with true industry movers like Johnson Controls are a powerful forcing function for innovation in the underlying hardware and software components that power these platforms,” said Erick Hong, senior director, business development and head of smart home at Qualcomm Technologies, Inc. “We are proud to collaborate once again to deliver a cutting-edge panel powered by Qualcomm Technologies’ solutions.” New functionalities of IQ Panel 5 The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE. The IQ Panel 5’s software will be regularly updated over time to introduce new functionalities such as AI features and smart device integrations following a software release roadmap informed by Voice of the Customer insights. Further improvements include: Foundations for the future: PowerG +, the next generation of trusted PowerG wireless technology, is embedded into every IQ Panel 5. Together, these provide the most powerful frontline in residential and commercial security now and tightly integrate with the larger home automation ecosystem. Upgrades with impact: The IQ Panel 5 offers a game-changing “modular design,” simplifying the process for technicians to complete new installations and takeovers. They only need to stock one panel and carry select daughter card modules for different frequencies (S-Line 319.5, 345 and 433), significantly limiting their SKUs, and in turn, reducing their costs. Refined style: With an elegant touchscreen, new 13-megapixel PortraitView camera (an evolution from the 8MP FlexTilt camera of the IQ Panel 4), improved mounting options, glass-break detector and an adjustable desk stand design, the IQ Panel 5 is aesthetic and functional in any space. Seamless installation and scalability: With a refreshed industrial design, IQ Panel 5 includes a logical redesign of the power supply, tamper and backplate for smoother installations and improved performance. Future enhancements to the panel’s UI such as a search feature will make it even more convenient and customisable, allowing users to easily manage and discover its wide range of features.
UK Connect, a pioneering connectivity and communications solutions provider, has announced a strategic partnership with BlueFort, the UK's premier independent Security Solutions Partner, to significantly enhance cybersecurity protection for construction industry clients. The new partnership will see UK Connect and BlueFort work together to provide cybersecurity solutions to some of the UK’s biggest construction companies. UK Connect's innovative solutions The groundbreaking partnership brings together UK Connect's innovative connectivity solutions and BlueFort's cutting-edge cybersecurity expertise, creating a comprehensive digital security framework for construction companies navigating an increasingly complex technological landscape. UK Connect: Connectivity cornerstone UK Connect is the pioneering connectivity and communications solutions provider for top-tier brands like Crest Nicholson, Taylor Wimpey, CALA Homes, and Kier Group, offering wireless connectivity, Internet of Things (IoT), and professional services as solutions. UK Connect’s solutions are designed to enhance communication, collaboration, and productivity, ensuring seamless connectivity from day one. No matter where connectivity is needed—from remote locations to dense urban areas—UK Connect’s dedicated team of experts is committed to delivering tailored solutions that meet the unique demands of each project. Whether it's rapid deployment of temporary broadband or long-term connectivity solutions, UK Connect ensures clients’ projects stay connected with optimal performance. BlueFort: Securing millions of users BlueFort is the UK’s only Full-Service Security Integrator, specialising in identity and cloud security BlueFort is the UK’s only Full-Service Security Integrator, specialising in identity and cloud security. As the security team for security teams, they combine expert knowledge with cutting-edge technology to help organisations secure their digital identities and cloud environments while navigating the complexities of compliance and regulatory requirements (NCSC CAF, NIS2, ISO 27001, and GDPR to name a few). With a curated suite of tools, products, and skills, BlueFort partners with CISOs and Security Operations teams to consolidate, optimise, and transform their security landscape—ensuring seamless protection against evolving threats in an increasingly cloud-driven world. Enhanced security offering By integrating BlueFort's advanced cybersecurity capabilities, this partnership makes available: Comprehensive threat mitigation strategies developed by industry-pioneering security experts Proactive protection against emerging digital risks specific to the construction sector Simplified and consolidated security environments that optimise operational efficiency Compliance with rigorous industry standards, including NIST, ISO 27001, and CyberEssentials Collaboration with BlueFort Joe Budnar-Hunt, Chief Technology Officer of UK Connect, emphasised the partnership's strategic importance: "In today's digital era, robust cybersecurity is not just a technical requirement—it's a critical business enabler. Our collaboration with BlueFort transforms how construction companies approach digital security, providing them with peace of mind and advanced protection." "As a customer of BlueFort, UK Connect has experienced first-hand how they can expertly simplify cybersecurity, enhancing an organisation’s security posture through an array of solutions." Partnership with UK Connect Josh Neame, Chief Technology Officer of BlueFort, said: “Construction companies provide a vital role in developing Britain’s housing stock and infrastructure. And so, preventing security breaches is of critical importance." “With experience in delivering cybersecurity solutions to some of the largest UK housebuilders, BlueFort, in partnership with UK Connect, are well equipped to understand the common challenges facing construction businesses and how to address their cybersecurity concerns.”
Building Intelligence, a provider of solutions that securely streamline vendor, vehicle, and visitor access, announced strategic additions to its leadership team. These experienced industry and technology pioneers are committed to deepening customer relationships, uncovering new growth opportunities, and delivering innovative solutions that meet the changing demands of security and operations. Building Intelligence’s portfolio As Head of Product Strategy, Jeff Staples will guide the evolution of Building Intelligence’s solution portfolio. With more than 25 years of experience spanning security, mobile, payment, and SaaS technologies, he has consistently delivered transformative outcomes. Previously, as Managing Director at Huron, he drove record-setting growth for a K12-focused subsidiary. During his 15+ years at Blackboard/Transact Campus, he pioneered the first mobile credential for Apple Wallet and Google Pay and led multiple high-impact M&A deals. Prior roles of Efkarpidis Dean has also held senior roles at Moat and brings expertise in M&A and compliance Dean Efkarpidis, Building Intelligence’s Chief Financial Officer, is a seasoned finance and operations executive with extensive experience in high-growth and turnaround environments. He currently sits on the Board of Indemna Corp. and previously was Vice President of Finance at Infinite Blue and Senior Vice President of Finance and Administration at Groupdolists. Dean has also held senior roles at Moat and brings expertise in M&A and compliance. Prior roles of James and Duffy Sarah James, a security tech pioneer with more than 20 years of experience, is taking on the role of Vice President of Sales to strengthen the go-to-market strategy and execution. She has held senior roles at Arcules, AMAG Technology, and Viscount Systems, and is known for scaling innovative solutions across access control, video surveillance, and cloud-based security platforms. Chris Duffy, now Senior Vice President of Customer Success, will lead efforts to boost client retention and impact. He previously served in leadership roles at OpResONE, Infinite Blue, and SAI Global, and teaches cybersecurity at Penn State University. Prior roles of Pond Kiwanii Pond oversees end-to-end project delivery and has played a key role in streamlining operations Kiwanii Pond, promoted to Vice President of Support and Implementation, oversees end-to-end project delivery and has played a key role in streamlining operations, improving training, and enhancing client outcomes. She has more than ten years of project management experience and nearly seven years of experience managing implementation processes, from sales handoff through project deployment. Advanced access management solutions “Our strength is our people. With a stronger leadership team in place, Building Intelligence is well-positioned to advance our access management solutions, improve support across industries, and continue delivering secure, scalable systems for loading dock and facility operations,” said Marc Rubner, CEO, Building Intelligence. “This team brings the vision, expertise, and leadership needed to scale our business, enter new markets, and deliver solutions that address today’s security and operational challenges.”
At ISC West 2025, April 2-4, in booth 11053, they are launching a reintroduction of the name Radionix, a fresh take on a classic brand that is synonymous with innovation and trust in the intrusion security market. Radionix will debut as the new product portfolio name for the company’s line of intrusion panels and its intrusion ecosystem of products. This strategic move to reintroduce Radionix will be a central component of the marketing initiatives around the G Series control panels and our dedication to providing cutting-edge security solutions. Renowned security systems Radionix will debut as the new product portfolio name for the company’s line of intrusion panels “I’m thrilled to reintroduce the Radionix name as the symbol of our renowned security systems portfolio," said Gregor Schlechtriem, Senior Vice President, Global Business Unit Head for Intrusion and Access Products. "This milestone reflects our pride in our heritage and confidence in our expertise while marking the start of a new era of innovation and evolution in the products and services we deliver to our customers.” The value of Radionix: A name they can trust The Radionix name holds a special place in the hearts of dealers, distributors, and customers alike across the United States and Canada. The new Radionix vision is “Mission control, for your security.” This statement encapsulates their focus on empowering users with a system that seamlessly integrates every layer of security. With Radionix, they believe security is more than a system. It’s a mission that never rests—always on guard, so the people and assets users care about are always protected. G Series: Seriously protective Radionix G Series control panel goes beyond sounding an alarm to next-level security For companies serious about protecting their team, space and assets, the Radionix G Series control panel goes beyond sounding an alarm to next-level security they can feel—day and night. Radionix G Series is the business partner in protection, designed to seamlessly connect and integrate every component of the alarm system with round-the-clock monitoring, instant alerts and control in the palm of the hand. Integration is critical in providing smarter, faster and more reliable data to end users in real time. That's why they make sure it’s at the heart of what they do, bringing intrusion, fire alarm and access control all in one centralised place with Radionix G Series. Radionix G Series control panel at ISC West 2025 Connecting every component of the system to automatically arm, disarm, or alert them of activity, their building works smarter with the Radionix G Series control panel to help them save time, reduce costs, and eliminate worry. From the moment they open their doors to the last person leaving and every hour overnight, Radionix G Series is seriously protective. For safety beyond intrusion, trust beyond compare. For details on these solutions and more, visit ISC West booth 11053.
The Security Industry Association (SIA) has announced the 2025 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards program presented in partnership with ISC West, recognising innovative security products, services, and solutions. Top among the winners, who were recognised April 2 during an award ceremony at the Bridge Stage on the ISC West show floor, was Vaidio, receiving the 2025 Best New Product Award. SIA NPS product and service categories SIA NPS has been the security industry’s premier product awards program Since its inception in 1979, SIA NPS has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2025, following significant deliberations, the 38 judges presented awards for technologies covering 33 product and service categories. The 2025 SIA NPS Awards entries will be on display through Friday, April 4, in Booth #25075 on the ISC West show floor, adjacent to the Bridge Stage (Booth #25059). Vaidio 9.0 advanced models Vaidio received the Best New Product honor for its Vaidio 9.0 AI Vision Platform product, submitted in the Loss Prevention and Article Surveillance Solutions category. “Vaidio 9.0 enhances loss prevention by combining advanced (artificial intelligence) models, heuristic rules and intelligent compute management to deliver precise analytics for detecting theft and reducing inventory shrinkage,” said Vaidio. “Its unique orchestration of CNN, transformer and VLM models increases accuracy, reduces compute consumption and improves speed, while integrating seamlessly with existing infrastructure.” AI-driven engagement The prestigious Judges’ Choice Award was presented to RAD for the SARA The prestigious Judges’ Choice Award was presented to Robotic Assistance Devices (RAD) for the SARA – AI Security Agent for Autonomous Threat Detection and Response product, submitted in the Threat Detection and Response Solutions category. “SARA revolutionises (global security operations centers) and monitoring by transforming passive surveillance into real-time, AI-driven engagement,” said RAD. “This autonomous security agent detects threats, interacts with individuals, verifies intent and escalates incidents as needed, enhancing security efficiency, reducing operator fatigue, preventing overlooked events and ensuring faster, smarter and more effective incident response across diverse environments.” Amazing new products and solutions “This year’s SIA NPS program has had another fantastic year with amazing new products and solutions presented to our judging panels,” said Christine Bergeron, chair of the SIA NPS Awards Committee and senior director of global physical security technology at Visa. “Thank you to our expert judges and committee members for your dedication to the program and lending your expertise and valuable time to contribute to a successful 2025 SIA NPS program.” Advancement of SIA and the security CyberLock received the NPS Merit Award, which admits an person or company who, through their support of SIA “The SIA NPS Awards are a renowned global platform for highlighting new offerings each year, and earning recognition is an impressive accomplishment,” said Elisa Mula, vice chair of the SIA NPS Awards Committee and founder and protection management specialist at EM Designs. “SIA applauds this year’s winners, who impressed our judges after an extensive process of tech demonstrations and panel-driven judging.” Additionally, CyberLock received the NPS Merit Award, which recognises an individual or company who, through their support of the SIA NPS Awards, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. New security technology solutions “SIA congratulates all the winners of the 2025 SIA NPS Awards, and especially Vaidio and Robotic Assistance Devices, whose products stood out among the entries to earn the Best New Product and Judges’ Choice distinctions, as well as SIA NPS Merit Award winner CyberLock,” said SIA CEO Don Erickson. “Each year, NPS presents the most cutting-edge products available on the market today, and our judges’ dedication, support and thorough consideration are invaluable in maintaining it as the most trusted awards program for launching new security technology solutions.” 2025 SIA NPS award winners Best new product award Winner: Vaidio – Vaidio 9.0 AI Vision Platform Judges’ choice award Winner: Robotic Assistance Devices – SARA – AI Security Agent for Autonomous Threat Detection and Response SIA NPS Merit award Winner: CyberLock Category awards Access Control Devices & Peripherals Hardware – Wireless Winner: Sure-Fi – Sure-Fi Access Pro Bridge Access Control Software, Hardware, Devices & Peripherals – Wired Winner: Safetrust – IoT Neural Sensor Honorable Mention: Accessia – Accessia Reader Antiterrorism/Force Protection/Armed Aggressor Winner: Xonar Technology – TruePort Biometrics Winner: Intel RealSense + Ones Technology – BioAffix Gate Vision Powered by Ones Technology and Intel RealSense ID F450 Communications and Networking Solutions Winner: Commend Americas – Ivy Live Translation – Ivy Virtual Assistant’s Multilingual Real-Time Translation Capabilities, Part of Commend’s Symphony Cloud Solution for Security Communication Convergence and Integration Solutions Winner: AURA – AURA Auto Guard Dispatch Data and Systems Cybersecurity Winner: SWEAR – SWEAR Security Design, Diagnostic and Installation Tools Winner: dormakaba – EntriWorX Insights Enhanced Project Delivery Winner: Vaidio – Vaidio 9.0 Environmental Monitoring Systems Winner: XSponse – X-Shield Honorable Mention: Secure Passage – Truman Fire/Life Safety Winner: Honeywell – Connected Life Safety Services (CLSS) Compliance Manager With Auto-Pass Honorable Mention: Honeywell – CLSS Cloud-Connected Horizon Identification Management and Credentialing (Nonbiometric) Winner: Wavelynx, rf IDEAS and Idemia (Founding Companies of LEAF Community) – LEAF Community Intrusion Detection and Prevention Solutions (Physical) – Wired or Wireless Winner: SPOT AI – SPOT AI Remote Security Agent Honorable Mention: Hexagon – HxGN dC3 LidarVision Key/Equipment Assets Management Solutions Winner: CyberLock – ValidiKey Pro Law Enforcement/Public Safety/Guarding Systems Winner: 3Si Security Systems – DirectToDispatch Honorable Mention: Eagle Eye Networks – Eagle Eye 911 Camera Sharing Lock and Key Solutions Winner: dormakaba – CenconX OTC Safe Lock Honorable Mention: Securitech ASSA ABLOY – PARAMAXX Loss Prevention and Article Surveillance Solutions Winner: Vaidio – Vaidio 9.0 AI Vision Platform Managed Services Winner: ADRM – DEFENDER Honorable Mention: Allied Universal – Unified Command Center Mobile Solutions Winner: Intel RealSense + Ones Technology – BioAffix Vision Mobile Powered by Intel RealSense ID 450 Threat/Risk Management Software Applications Winner: Bearing – Bearing Honorable Mention: Sign In Solutions – Sign In Solutions – Risk Insights Threat Detection and Response Solutions Winner: Robotic Assistance Devices – SARA – AI Security Agent for Autonomous Threat Detection and Response Honorable Mention: Xtract One Technologies – Xtract One Gateway Video Analytics Winner: Lumana – Lumana Video Intelligence Platform Video Surveillance Advanced Imaging Technologies Winner: Axis Communications – ARTPEC-9 Video Surveillance Cameras Winner: Hanwha Vision America – 4CH AI Multi-Sensor Camera With WAVE VMS Powered by the NVIDIA Jetson Platform Honorable Mention: Axis Communications – AXIS Q1809-LE Bullet Camera Video Surveillance Hardware and Accessories Winner: Spectrum Camera Solutions – F200 Series Explosion-Proof Housing System Video Surveillance Management Systems Winner: Monitor Computer Systems – Sentinel
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, is reinforcing its commitment to providing comprehensive life safety solutions across industries by unveiling solutions designed specifically for the non-acute healthcare and correctional facilities industries. The company’s non-acute bundled solution combines advanced security and fire prevention technologies to help modernise healthcare facilities, improve safety and enhance overall patient and staff experience. Additionally, Johnson Controls is expanding its correctional facilities offerings to address the growing challenges of outdated and often overlooked buildings, helping communities ensure that they have the necessary infrastructure to enhance security and emergency response. Enhancing security and efficiency in non-acute healthcare As demand for clinics, urgent care centres, outpatient facilities, and other non-acute healthcare environments increases, Johnson Controls is providing bundled solutions that integrate critical aspects of security and fire prevention technologies including: Video Surveillance & Access Control – Strengthening physical security and facility oversight with AI and data analytics. Weapons & Gunshot Detection – Leveraging a cloud-based security solution to enhance threat prevention. Fire Safety Innovations – Suppression systems such as connected sprinkler systems and emergency lighting that can improve safety. Integrating advanced security “By integrating advanced security, fire prevention and technologies that connect building systems, Johnson Controls is helping to create safer, more resilient non-acute healthcare environments,” said James Burke, vice president, product sales & lifecycle solutions at Johnson Controls. “Our latest bundle leverages industry expertise and advanced technology to streamline operations, optimise staffing resources and can enhance patient and staff safety in outpatient clinics, urgent care centres, long-term care facilities and more. In these settings—where staff are stretched thin and operational efficiency directly impacts patient care—having the right technologies and service helps to provide a safe, comfortable environment for both patients and caregivers.” Strengthening correctional facilities Johnson Controls has taken steps to enhance security for penal facilities, including state and federal prisons In parallel, Johnson Controls has taken steps to enhance security for correctional facilities including state and federal prisons, county and local jails and detention centres. Across the U.S. and Canada, Johnson Controls is addressing the challenges that correctional facilities can face due to outdated infrastructure and decades of underinvestment by upgrading HVAC, fire, and security systems to modern standards, improving both safety and operational efficiency. Johnson Controls security systems Johnson Controls provides correctional facilities with tailored solutions such as video surveillance, visitor management, fire detection systems, fire suppression and more to help create safer and more secure environments for both the occupants and facilities. “Nearly one-third of correctional facilities are over 50 years old and are in critical need of key upgrades – from security systems to mechanical equipment,” said Greg Parker, vice president, lifecycle solutions at Johnson Controls. “Not only can these upgrades enhance overall conditions and safety for facility personnel, inmates and visitors, but the utility bills can also be lower due to overall operational efficiency.” Physical and cyber security Johnson Controls has a strong fact across industry sectors and continues to develop tailored solutions Johnson Controls has a strong presence across industry sectors and continues to develop tailored solutions that prioritise security alongside efficiency and sustainability. With a focus on innovation, the company is committed to expanding its expertise in high-growth industries, including healthcare, education, government and data centres, by delivering advanced solutions that strengthen physical and cyber security, safeguard critical infrastructure and ensure resilient operations. Next era for commercial buildings Johnson Controls proudly celebrates its 140th anniversary in 2025, marking a legacy of innovation and leadership in smart, safe, healthy and sustainable solutions. The company continues to redefine building performance, driving the next era for commercial buildings, transforming industries and powering its customers’ missions.
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announced the launch of IQ Panel 5. Powered by a Qualcomm® DrangonWing™ processor, the IQ Panel 5 preserves the features of the IQ Panel 4 that end users know and love while delivering a new powerful platform of the future. The IQ Panel 5 will be on display at ISC West 2025 in Las Vegas, Nevada, from March 31-April 4 (Booth 18033) for attendees to experience firsthand. Intuitive IQ Panel 5 packs “Dealers and installers have trusted Johnson Controls for over 15 years to be accessible as their needs change and to refine products in direct response to their feedback,” said Faisal Pandit, president, Controls and Security Systems at Johnson Controls. “The intuitive IQ Panel 5 packs all of their most requested enhancements into one secure, next-generation panel that will ultimately drive faster and more accurate installations, more scalable businesses and improved overall security.” Innovation in hardware and software components The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE “Ongoing collaborations with true industry movers like Johnson Controls are a powerful forcing function for innovation in the underlying hardware and software components that power these platforms,” said Erick Hong, senior director, business development and head of smart home at Qualcomm Technologies, Inc. “We are proud to collaborate once again to deliver a cutting-edge panel powered by Qualcomm Technologies’ solutions.” New functionalities of IQ Panel 5 The IQ Panel 5 runs on the latest Android 14 OS, Bluetooth 5.0 + LE and LTE. The IQ Panel 5’s software will be regularly updated over time to introduce new functionalities such as AI features and smart device integrations following a software release roadmap informed by Voice of the Customer insights. Further improvements include: Foundations for the future: PowerG +, the next generation of trusted PowerG wireless technology, is embedded into every IQ Panel 5. Together, these provide the most powerful frontline in residential and commercial security now and tightly integrate with the larger home automation ecosystem. Upgrades with impact: The IQ Panel 5 offers a game-changing “modular design,” simplifying the process for technicians to complete new installations and takeovers. They only need to stock one panel and carry select daughter card modules for different frequencies (S-Line 319.5, 345 and 433), significantly limiting their SKUs, and in turn, reducing their costs. Refined style: With an elegant touchscreen, new 13-megapixel PortraitView camera (an evolution from the 8MP FlexTilt camera of the IQ Panel 4), improved mounting options, glass-break detector and an adjustable desk stand design, the IQ Panel 5 is aesthetic and functional in any space. Seamless installation and scalability: With a refreshed industrial design, IQ Panel 5 includes a logical redesign of the power supply, tamper and backplate for smoother installations and improved performance. Future enhancements to the panel’s UI such as a search feature will make it even more convenient and customisable, allowing users to easily manage and discover its wide range of features.
UK Connect, a pioneering connectivity and communications solutions provider, has announced a strategic partnership with BlueFort, the UK's premier independent Security Solutions Partner, to significantly enhance cybersecurity protection for construction industry clients. The new partnership will see UK Connect and BlueFort work together to provide cybersecurity solutions to some of the UK’s biggest construction companies. UK Connect's innovative solutions The groundbreaking partnership brings together UK Connect's innovative connectivity solutions and BlueFort's cutting-edge cybersecurity expertise, creating a comprehensive digital security framework for construction companies navigating an increasingly complex technological landscape. UK Connect: Connectivity cornerstone UK Connect is the pioneering connectivity and communications solutions provider for top-tier brands like Crest Nicholson, Taylor Wimpey, CALA Homes, and Kier Group, offering wireless connectivity, Internet of Things (IoT), and professional services as solutions. UK Connect’s solutions are designed to enhance communication, collaboration, and productivity, ensuring seamless connectivity from day one. No matter where connectivity is needed—from remote locations to dense urban areas—UK Connect’s dedicated team of experts is committed to delivering tailored solutions that meet the unique demands of each project. Whether it's rapid deployment of temporary broadband or long-term connectivity solutions, UK Connect ensures clients’ projects stay connected with optimal performance. BlueFort: Securing millions of users BlueFort is the UK’s only Full-Service Security Integrator, specialising in identity and cloud security BlueFort is the UK’s only Full-Service Security Integrator, specialising in identity and cloud security. As the security team for security teams, they combine expert knowledge with cutting-edge technology to help organisations secure their digital identities and cloud environments while navigating the complexities of compliance and regulatory requirements (NCSC CAF, NIS2, ISO 27001, and GDPR to name a few). With a curated suite of tools, products, and skills, BlueFort partners with CISOs and Security Operations teams to consolidate, optimise, and transform their security landscape—ensuring seamless protection against evolving threats in an increasingly cloud-driven world. Enhanced security offering By integrating BlueFort's advanced cybersecurity capabilities, this partnership makes available: Comprehensive threat mitigation strategies developed by industry-pioneering security experts Proactive protection against emerging digital risks specific to the construction sector Simplified and consolidated security environments that optimise operational efficiency Compliance with rigorous industry standards, including NIST, ISO 27001, and CyberEssentials Collaboration with BlueFort Joe Budnar-Hunt, Chief Technology Officer of UK Connect, emphasised the partnership's strategic importance: "In today's digital era, robust cybersecurity is not just a technical requirement—it's a critical business enabler. Our collaboration with BlueFort transforms how construction companies approach digital security, providing them with peace of mind and advanced protection." "As a customer of BlueFort, UK Connect has experienced first-hand how they can expertly simplify cybersecurity, enhancing an organisation’s security posture through an array of solutions." Partnership with UK Connect Josh Neame, Chief Technology Officer of BlueFort, said: “Construction companies provide a vital role in developing Britain’s housing stock and infrastructure. And so, preventing security breaches is of critical importance." “With experience in delivering cybersecurity solutions to some of the largest UK housebuilders, BlueFort, in partnership with UK Connect, are well equipped to understand the common challenges facing construction businesses and how to address their cybersecurity concerns.”
Building Intelligence, a provider of solutions that securely streamline vendor, vehicle, and visitor access, announced strategic additions to its leadership team. These experienced industry and technology pioneers are committed to deepening customer relationships, uncovering new growth opportunities, and delivering innovative solutions that meet the changing demands of security and operations. Building Intelligence’s portfolio As Head of Product Strategy, Jeff Staples will guide the evolution of Building Intelligence’s solution portfolio. With more than 25 years of experience spanning security, mobile, payment, and SaaS technologies, he has consistently delivered transformative outcomes. Previously, as Managing Director at Huron, he drove record-setting growth for a K12-focused subsidiary. During his 15+ years at Blackboard/Transact Campus, he pioneered the first mobile credential for Apple Wallet and Google Pay and led multiple high-impact M&A deals. Prior roles of Efkarpidis Dean has also held senior roles at Moat and brings expertise in M&A and compliance Dean Efkarpidis, Building Intelligence’s Chief Financial Officer, is a seasoned finance and operations executive with extensive experience in high-growth and turnaround environments. He currently sits on the Board of Indemna Corp. and previously was Vice President of Finance at Infinite Blue and Senior Vice President of Finance and Administration at Groupdolists. Dean has also held senior roles at Moat and brings expertise in M&A and compliance. Prior roles of James and Duffy Sarah James, a security tech pioneer with more than 20 years of experience, is taking on the role of Vice President of Sales to strengthen the go-to-market strategy and execution. She has held senior roles at Arcules, AMAG Technology, and Viscount Systems, and is known for scaling innovative solutions across access control, video surveillance, and cloud-based security platforms. Chris Duffy, now Senior Vice President of Customer Success, will lead efforts to boost client retention and impact. He previously served in leadership roles at OpResONE, Infinite Blue, and SAI Global, and teaches cybersecurity at Penn State University. Prior roles of Pond Kiwanii Pond oversees end-to-end project delivery and has played a key role in streamlining operations Kiwanii Pond, promoted to Vice President of Support and Implementation, oversees end-to-end project delivery and has played a key role in streamlining operations, improving training, and enhancing client outcomes. She has more than ten years of project management experience and nearly seven years of experience managing implementation processes, from sales handoff through project deployment. Advanced access management solutions “Our strength is our people. With a stronger leadership team in place, Building Intelligence is well-positioned to advance our access management solutions, improve support across industries, and continue delivering secure, scalable systems for loading dock and facility operations,” said Marc Rubner, CEO, Building Intelligence. “This team brings the vision, expertise, and leadership needed to scale our business, enter new markets, and deliver solutions that address today’s security and operational challenges.”
At ISC West 2025, April 2-4, in booth 11053, they are launching a reintroduction of the name Radionix, a fresh take on a classic brand that is synonymous with innovation and trust in the intrusion security market. Radionix will debut as the new product portfolio name for the company’s line of intrusion panels and its intrusion ecosystem of products. This strategic move to reintroduce Radionix will be a central component of the marketing initiatives around the G Series control panels and our dedication to providing cutting-edge security solutions. Renowned security systems Radionix will debut as the new product portfolio name for the company’s line of intrusion panels “I’m thrilled to reintroduce the Radionix name as the symbol of our renowned security systems portfolio," said Gregor Schlechtriem, Senior Vice President, Global Business Unit Head for Intrusion and Access Products. "This milestone reflects our pride in our heritage and confidence in our expertise while marking the start of a new era of innovation and evolution in the products and services we deliver to our customers.” The value of Radionix: A name they can trust The Radionix name holds a special place in the hearts of dealers, distributors, and customers alike across the United States and Canada. The new Radionix vision is “Mission control, for your security.” This statement encapsulates their focus on empowering users with a system that seamlessly integrates every layer of security. With Radionix, they believe security is more than a system. It’s a mission that never rests—always on guard, so the people and assets users care about are always protected. G Series: Seriously protective Radionix G Series control panel goes beyond sounding an alarm to next-level security For companies serious about protecting their team, space and assets, the Radionix G Series control panel goes beyond sounding an alarm to next-level security they can feel—day and night. Radionix G Series is the business partner in protection, designed to seamlessly connect and integrate every component of the alarm system with round-the-clock monitoring, instant alerts and control in the palm of the hand. Integration is critical in providing smarter, faster and more reliable data to end users in real time. That's why they make sure it’s at the heart of what they do, bringing intrusion, fire alarm and access control all in one centralised place with Radionix G Series. Radionix G Series control panel at ISC West 2025 Connecting every component of the system to automatically arm, disarm, or alert them of activity, their building works smarter with the Radionix G Series control panel to help them save time, reduce costs, and eliminate worry. From the moment they open their doors to the last person leaving and every hour overnight, Radionix G Series is seriously protective. For safety beyond intrusion, trust beyond compare. For details on these solutions and more, visit ISC West booth 11053.


Expert commentary
March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. Evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its “Women’s Role in Filling the Workforce Gap” report, women make up an estimated 20 to 25 percent of the security industry. Promisingly, younger generations are entering the profession at higher rates, with 26 percent of working professionals under 30 identifying as women. The security industry has witnessed a steady increase in women's participation The research tells us that women are thriving in a variety of roles, from engineering and system administration to sales, marketing, and project leadership. Key factors driving this transformation include mentorship programs, male allies advocating for gender equality, and cultural shifts recognising the unique perspectives and strengths women bring to security challenges. These efforts are fostering more inclusive environments and ultimately strengthening the industry. The value of diverse perspectives in security Security is not a one-size-fits-all industry—each organisation and facility has unique needs that require varied perspectives. Greater representation of women has introduced fresh approaches to problem-solving, fostering collaboration and driving innovation. By integrating diverse viewpoints, security professionals can create more effective solutions that better address end-user needs. Industry support for women’s professional growth SIA's WISF offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER Organisations like the Security Industry Association (SIA) and ASIS International have established networking platforms and initiatives to support women in security. Events such as the Security LeadHER Conference provide valuable professional development and networking opportunities. Companies are also investing in science, technology, engineering, and mathematics (STEM) initiatives, hands-on training, and recruitment programs to attract more women into the field. Additionally, SIA's Women in Security Forum (WISF) offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER, which provide pathways for engagement and growth. Challenges women in security face Despite progress, challenges remain. Many women still feel it necessary to repeatedly prove their expertise, take on additional informal responsibilities, or carefully navigate workplace dynamics. Imposter syndrome can be another hurdle, even for accomplished professionals. However, women in security are addressing these challenges by setting boundaries, advocating for themselves, and supporting one another through mentorship. By excelling in leadership and technical roles, women are reshaping outdated perceptions and advocating for more inclusive workplace policies. Steps industry pioneers can take To further support women in security, industry pioneers could: Provide targeted professional development and career advancement opportunities. Foster strong, supportive communities that recognise and mentor women. Implement structured mentorship programs that connect experienced professionals with newcomers. Promote workplace flexibility to help employees balance personal and career commitments. Actively challenge biases and advocate for meaningful change within organisations. Advice for women entering the security field Here are key pieces of advice for women considering a career in security: Own Your Expertise – Have confidence in your knowledge and skills. Seek Out Mentors & Allies – Connect with supportive professionals who can guide your career. Build a Strong Network – Join organisations like ASIS Women in Security, SIA Women in Security Forum, or Women in CyberSecurity (WiCyS), and attend industry events to expand your connections. Speak Up & Take Space – Confidently share your ideas and challenge outdated norms. Develop Resilience & Advocate for Yourself – Push past biases, demand the respect you deserve, and negotiate for fair salaries and promotions. Keep Learning & Stay Ahead – Continually build your expertise to stay competitive in the evolving security industry. The future of women in security As the security industry evolves with technological advancements and global changes, opportunities for women will continue to expand. Women are not just participating in the industry’s growth—they are shaping its future. With growing mentorship programs, male allies advocating for gender equality, and ongoing cultural shifts, the focus is no longer just on breaking barriers but on building bridges to new opportunities.
Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even 'mac addresses' or a person of interest's gait, now all make up the technology toolbox of forward-thinking organisations' security policy. However, humans remain the weakest link in any security chain, and the only way to correct this is to eliminate the human burden, argues Richard Hilson, head of sales for security access management specialist, Parking Facilities. Here, he examines the pitfalls in relying upon human intervention in critical national infrastructure (CNI) settings, and the future of biometrics to keep assets, information and personnel safe. Recent Verizon report 74 percent of corps are saying that insider threats are becoming more of a concern for them As with any workplace initiative, be it a simple recycling policy or a corporate password protection directive, technology is only as good as those who implement or operate it. Whilst technology can be fallible and gremlins do arise, it’s never as flawed as us mere humans with our unreliable ‘on/off’ switch. Likewise, we carry the ability to reason, to override procedures, or ignore policy, should we wish. Or as it happens, just make mistakes. In fact, according to a recent Verizon report, two out of three insider attacks happen as a result of negligence, and 74 percent of organisations are saying that insider threats are becoming more of a concern for them. Fundamental security practices Security breaches aren’t limited to external threats either, whether intentionally or not, they can come from within. Humans can, and do, ‘go rogue’, whether that’s pre-meditated criminal or malicious intent, or just by taking shortcuts. While data breaches court most news headlines in this digital era, some of the most significant security risks are those posed when employees neglect fundamental security practices such as sharing passwords or access cards. Employee negligence and insider threats Insider negligence remains one of the pioneering causes of security breaches Insider negligence remains one of the pioneering causes of security breaches. Employees who share passwords or access cards may do so out of convenience, ignorance, or a misplaced sense of trust. Unfortunately, this creates vulnerabilities that are left open to exploitation. When multiple employees share credentials, it becomes difficult to trace actions to a single individual. This lack of accountability can complicate incident investigations and allows malicious activities to go undetected. Emergency services resources Furthermore, the sharing of passwords or access cards means inaccurate accounting of personnel, and in the event of an evacuation or major incident, central IT systems will hold misleading information of employees’ locations which could have a huge impact upon safety and potentially emergency services resources. Employees with malicious intent can exploit shared credentials to carry out unauthorised activities while shifting blame to others, increasing the risk of deliberate sabotage or theft of sensitive data. Even when there is no malicious intent, employees who share access credentials risk unintentionally exposing them to unauthorised individuals, such as contractors, visitors, or external attackers. What happens when employees compromise security? Access cards are designed to limit entry to restricted physical locations. When shared, unauthorised personnel could enter secure areas such as control rooms, rail lines, large construction sites, data centres, power plants or indeed any site meant to be kept secure. This creates opportunities for sabotage, theft, or corporate espionage. Sensitive data held within critical sites, such as blueprints, system controls, and customer records Likewise, shared passwords can lead to unauthorised entry into IT systems, allowing hackers to install malware, ransomware, or spyware. For example, a cybercriminal gaining access to an energy grid system could shut down power to entire regions, causing chaos to millions of people, and disrupting essential services. And not all data breaches are caused by online hackers gaining entry through unsecure firewalls. Sensitive information held within critical sites, such as blueprints, system controls, and customer records, becomes vulnerable when access credentials are shared too, and the disclosure of such information can have a serious impact upon a company’s bottom line, operations, and ultimately its reputation. Eliminating the human burden One way to prevent human error, or to thwart malpractice is to reduce the burden upon employees to be compliant, and eliminate our flaws by using technology that requires no intervention, decision-making or reason. Facial recognition is widely used in the civil world now, despite the concerns of various lobbyists. Used correctly it is not a ‘catch all’, but an instant recognition of persons of interest cross referenced against a database of known suspects. Our car parks are governed by automatic number plate recognition (ANPR) to gain access in and out, while border controls are using advanced biometrics for everything from facial and fingerprint recognition, through to recognition of human characteristics and gait, for both entry and to apprehend. The UK Home Office is even accelerating its transition to digital border management, using biometric technology to improve efficiencies, safety, and to track and capture known or illegal persons. What of the CNI sites? But what of the corporate world? What of the CNI sites, our airports, our national construction developments such as HS2 or our high-rise office spaces? We always ask this very question, and also ‘can you afford a security breach’ in whatever environment you’re in? Because the smart, cloud-based technology being used by governments, law enforcement authorities and Border Force have cascaded down through the civil and corporate worlds. Immediate safety and security Security-conscious corps are diligently removing human error, by eliminating the human burden Security-conscious organisations are now diligently removing human error, by eliminating the human burden. With cloud-managed software not only are access points managed through biometric integration, but it also overcomes the issues mentioned earlier around accountability - in that the cloud will always register who has passed through an access point, or out of it. This is critical for both immediate safety and security but also for matters arising from a crisis, or emergency situation. It’s also less admin-heavy, more cost-effective and can manage and store employee records, including background checks. Employee or contractor data is encrypted, their information is safe, their interactions are secure, and businesses are protected. Implement robust access management systems Simple acts of negligence, such as sharing passwords or access cards, can open the door to catastrophic consequences, operational disruption, financial loss, and even, in the case of CNI, national security risks. To mitigate this, organisations can do worse than to implement robust access management systems, and in doing so, release employees from having to be accountable for ensuring the security of the sites in which they work. As artificial intelligence evolves, I see even more robust biometrics coming to the fore, until such time we work and live in environments that are controlled without us even knowing security checkpoints are all around us, and access management happening at every step. It will become as ‘every day’ as an automatic door allowing entry into our local supermarket - but we’re not quite there yet.
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
Security beat
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organisations modernise their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximising value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritising interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities. {##Poll1743085396 - What is the biggest challenge you face with your current access control system?##}
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasises not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification programme developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The programme emphasises the importance of both physical and digital security, recognising that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardised procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardised procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centres. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasising a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Case studies
The office of the Additional Director General of Police (ADG) and Inspector General (IG) of Prisons oversees the management and security of all prisons in the Indian state. This includes ensuring the safety of prison facilities, implementing rehabilitation programs for inmates, and managing prison staff. Creating a fair environment The ADG and IG focus on improving prison conditions and ensuring legal standards are met. Their goal is to create a secure and fair environment, balancing safety with efforts to reform and rehabilitate prisoners for their eventual return to society. Scenario The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements The absence of a security video surveillance system created critical security blind spots, making it difficult to monitor key areas effectively. The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements posed significant risks to prison security. New security video surveillance system To comply with government regulations, the new security video surveillance system had to adhere to stringent standards established by the Bureau of Indian Standards (BIS). This included specific sections detailing the specifications for camera performance and image quality and covering safety guidelines for IT equipment. The system required STQC certification to meet high security and data privacy standards, crucial for government installations. OWASP ASVS 4.0 L2 standards Additionally, it needed to comply with OWASP ASVS 4.0 L2 standards to ensure robust cybersecurity, safeguarding against common vulnerabilities. High-resolution cameras were essential for clear image capture, and tamper-proof storage was required to securely retain footage for 30 to 90 days. The system also had to align with the National Cyber Security Policy to protect sensitive data from cyber threats. Compliance with these standards was vital for maintaining security and operational integrity within the prison. Challenges Due to the absence of a security video surveillance system, the Prison Department faced numerous challenges such as: Struggled to monitor blind spots in the prison yard where fights and disputes frequently occurred. Detecting the smuggling of drugs and mobile phones during visitations was nearly impossible with manual checks alone. Staff couldn’t always be present to monitor isolated areas like back rooms, corridors, and staircases, leading to security gaps. Identifying the individuals involved in riots or brawls was difficult due to the lack of visual evidence. Inmate escape attempts often went unnoticed until too late, especially during night shifts. Ensuring round-the-clock monitoring of high-risk zones like solitary confinement was a constant challenge. Coordinating emergency responses, such as medical help during violent outbreaks, was delayed without instant visual updates. Matrix solution Matrix security video surveillance systems comprising Matrix Network Cameras and NVRs were installed across four prisons statewide, providing robust security for over 10,000 inmates. Matrix PTZ Cameras were deployed in larger spaces like the prison yard, where they could pan, tilt, and zoom to follow suspicious activities or fights, providing dynamic coverage and ensuring swift responses to incidents. Mini Dome Cameras were placed inside cells and common areas to provide constant, wide-angle surveillance, keeping tabs on inmate behaviour and reducing the chances of fights or smuggling illegal items. These cameras were also installed in cafeterias and recreation areas to monitor inmate interactions. Mini Bullet Cameras were installed in corridors and cellblock hallways to keep a close eye on inmate movement, ensuring no blind spots in these high-traffic zones. They were also installed in less-visited areas like storage rooms and staff offices to prevent unauthorised access and maintain control. Project Bullet Cameras were mounted along the prison yard and perimeter walls, providing long-range surveillance to prevent escape attempts and monitor outdoor activity. They were also installed at entry and exit points to keep tabs on everyone going in and out, securing access to the facility. 24x7 real-time monitoring All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs. This setup enabled 24x7 real-time monitoring, recording, and playback of video from different areas of the prison, ensuring complete coverage and prompt incident response. Similarly, the prison departments in three other cities of the state were also secured with Matrix Network Cameras and NVRs. Products offered Matrix MIDR20FL36CWS P2 (800+): 2MP IR Mini Dome Camera with 3.6 mm Fixed Lens Matrix MIBR20FL36CWS P2 (600+): 2MP IR Mini Bullet Camera with 3.6 mm Fixed Lens Matrix CIBR20FL36CWS P2 (800+): 2MP IR Project Bullet Camera with 3.6 mm Fixed Lens Matrix PZCR20ML25CWP P2 (70+): 2MP IR PTZ Camera with 25x Optical Zoom Matrix NVR6408X P2 (40+): 64 Channel NVR with 8 SATA Ports Solution diagram Benefits They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks The installation of the Matrix security video surveillance system effectively eliminated critical security blind spots in the prison yard, reducing the risk of fights and disturbances. They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks, preventing inmate escapes and unauthorised movements. Centralised monitoring Matrix security video surveillance systems enabled accurate monitoring during visitations, significantly enhancing the detection of smuggling attempts for drugs and mobile phones. Centralised monitoring via the 64-Channel NVR allowed for quick identification and response to disturbances, ensuring timely intervention during riots or medical emergencies. Regulation safety and data privacy High-resolution camera footage provided reliable documentation of inmate interactions and incidents, supporting investigations and enhancing overall prison security management. Matrix security video surveillance system meets BIS and STQC standards, ensuring compliance with government regulations for safety and data privacy. It also complies with OWASP ASVS 4.0 L2 standards, enhancing data security and protecting against cyber threats.
Client, a prominent regional R&D institution under MeitY, plays a crucial role in advancing India's technological landscape. With a focus on IT, electronics, and related sectors, the organisation leads in cutting-edge research, driving innovation to meet global trends and market needs. As a key player in high-end R&D, they have been pivotal in propelling India’s IT revolution, consistently expanding their expertise in emerging technologies. They utilise their knowledge and creativity to develop IT solutions across various industries, working closely with MeitY, funding agencies, partners, and key stakeholders. Requirements The project involved managing a defined volume of emergency calls per hour by directing those made to 112 to agents handling state-specific emergency services. Matrix's role was to deliver a VoIP PRI gateway solution that provided VoIP capabilities to a third-party server. Crucially, these functionalities needed to be implemented across various locations. The client’s needs can be outlined as follows: Manage a minimum of 50,000 calls: The system must be equipped to handle at least 50,000 emergency calls every hour. Direct calls to state-specific agents: When the global emergency number 112 is dialled, calls should be directed to agents overseeing emergency services for the respective states. Integrate with third-party systems: The agents will work on a third-party server, which must be seamlessly connected to the Matrix GENX system via SIP trunking. Solution In collaboration with Consulttech, Matrix developed a solution that significantly enhanced the organisation's operations by optimising call routeing. The core of the solution involved offering a VoIP PRI gateway, enabling seamless PRI to VoIP conversion. The essential features of this solution are as follows: Multi-location setup: The system covers various locations, each outfitted with a Matrix GENX system that connects to the ISP's PRI lines. PRI to VoIP conversion: At every site, Matrix GENX converts incoming calls from PRI lines into VoIP (Voice over Internet Protocol). Emergency call routeing: When a user dials 112, the call is routed through the ISP’s PRI lines to the Matrix Gateways, where the media is converted from PRI to VoIP and passed to the Automatic Call Distributor (ACD) server. Centralised ACD server: All VoIP calls are funneled into a central ACD server for efficient distribution. Agent call distribution: The ACD server directs the incoming calls to available agents who are ready to respond. Scalable solution: Up to 28 locations can be connected to the central ACD server, allowing the system to handle a high volume of calls simultaneously. Results The solution enabled the organisation to connect various locations into one unified communication system through the use of a VoIP PRI gateway. This improved the system's ability to manage thousands of calls per hour while significantly reducing call drops. The specifics of the solution are as follows: Multi-site implementation: The project was deployed across multiple locations in cities throughout Kerala, establishing a seamless communication network. Increased call handling capacity: Each site is capable of managing between 26,000 to 30,000 calls per hour. Significant decrease in call drops: The system efficiently handled large call volumes, resulting in almost no dropped calls. Matrix’s VoIP PRI gateway allowed the organisation to integrate multiple locations across the state into a unified communication system. With the ability to manage high call volumes, the solution significantly minimised call drops.
Sharry, a global workplace experience platform built around digital employee badges, has successfully delivered its enterprise solution to London’s new international hub opened by PATRIZIA, a global real estate investment manager. The state-of-the-art mobile access leverages Gallagher Mobile Connect credentials and, through full integration with the Gallagher Command Centre access control system, enhances physical security and significantly improves the workplace experience. PATRIZIA’s international hub Located in London’s Endell Street, PATRIZIA’s new international hub was opened after an extensive brown-to-green refurbishment that delivers sustainable ‘office of the future’ combining smart building tech, wellness amenities, hospitality services, street art, and flexible workspaces. The five-floor hub brings together PATRIZIA’s 200 UK-based employees. Their access to the existing Victorian building is completely managed through the PATRIZIA App and web-based PortalWX developed by Sharry. The workplace experience platform is fully integrated into the Gallagher Command Centre access control system allowing users to unlock their office doors simply and quickly by presenting their smartphones. Innovative approach If an employee arrives from another office, they can generate a mobile access badge in the app in seconds “PATRIZIA’s employees in London and those visiting from our other offices can enjoy seamless and touchless mobile access to our new international hub in London’s Covent Garden,” said Shreya Sheth, Associate Director, Building Technology & Sustainability at PATRIZIA. If an employee arrives from another office, they can generate a mobile access badge in the app in seconds. There is no need to send a new badge request, pick up the plastic card in person, or wait for it to be sent, and think about returning it when they leave. This innovative approach saves time while strengthening security policy. Next-generation security solution “We are very excited to be supporting PATRIZIA with their new innovative London office. Their commitment to creating a flagship workspace for the future of work is truly inspiring. It's been an incredible honour to be able to support them with a smart workplace app and integrated access control solution for the space,” said Ondřej Vodňanský, Head of Sales EMEA at Sharry. “We are thrilled to collaborate with Sharry and PATRIZIA to deliver a next-generation security solution at their new London hub. By integrating our Mobile Connect credentials with Sharry's workplace platform, we've created a seamless and secure access experience that not only enhances security but also aligns with the modern, flexible work environment that PATRIZIA envisions,” said Gordon Swallow, UK Sales Manager at Gallagher Security. Enhance experience and operations Beyond mobile access, the PATRIZIA App offers users a comprehensive set of features designed to enhance their workplace experience. To name a few: Reservations: Employees can easily reserve shared workstations or book access to the Health Club. Service Requests: With one tap, users can request any service or maintenance through the app. Guestpasses: The app also simplifies visitor management by allowing users to invite guests to the building and send them a guestpass with all the necessary information. Integrated access control solution Sharry provides an efficient platform for managing workplace access and offers powerful tools For facility and office managers, Sharry provides an efficient platform for managing workplace access and offers powerful tools for communication and engagement with all users, including the ability to send news updates, polls, and event invitations straight to the mobile app. Sharry and Gallagher's integrated access control solution significantly enhances physical security in many areas. For example, a manager can remotely revoke any mobile or plastic badge with just one click in the PortalWX. Even the end-user can immediately report their plastic card as lost in the PATRIZIA app and thus suspend it. The building operating system Finally, managers can access real-time data on workplace occupancy, enabling more informed decisions regarding space and amenities utilisation thanks to a partnership with Trigrr. The building operating system Trigrr has been deployed in PATRIZIA HQ to simplify system integrations and provide a centralised tool that unifies data, automation, and controls across Sharry, HVAC, IoT and lighting. Thanks to Trigrr BOS, occupants can remotely control office room temperature, adjust lighting, monitor CO2 levels, or launch smart scenarios directly in the Sharry workplace platform. "Partnering with Sharry on the new PATRIZIA international hub is a fantastic opportunity to generate more value by combining all applications and systems into a flexible tool that can adapt building behaviour in real-time according to the needs of the occupants," said Jean-Michel Verhulst, CEO of Trigrr.
Newport, a popular vacation destination, has partnered with Sorama to tackle growing noise pollution. By integrating AI technology and products from Axis Communications, Sorama, and FF Group, the city aims to reduce traffic noise and enhance road safety. FF Group’s CAMMRA AI software and DataFactory platform help generate accurate vehicle data in real-time, day or night, to support noise reduction efforts. The challenge How can they address the challenge of traffic noise? What actions can local municipalities take to effectively monitor noise pollution and improve road safety? The solution Newport, hosting 4 million annual visitors, faces traffic noise due to congestion. To address this, the city implemented an AI-based noise camera solution with the Axis Radar-Video Fusion Camera, powered by CAMMRA AI, Sorama Acoustic Monitors, and the DataFactory platform. This system helps adjust noise ordinances and improve traffic safety as part of Newport's smart city initiative. Solution architecture 1. Axis Radar Video Fusion Camera Monitors vehicle speeds up to 125 mph, integrates with CAMMRA AI for licence plate recognition and speed tracking. 2. CAMMRA AI Application Recognize vehicle details (make, model, plate) and merge data with speed from the Axis Radar. 3. Sorama L642 Acoustic Monitors Capture sound levels with 64 microphones and integrate with Axis cameras for detailed vehicle data. Offers integrations with Axis camera, Axis Camera Station and FF DataFactory. 4. DataFactory platform Collects data on all vehicles, including sound level, licence plate, make, model, colour, speed, vehicle type, GPS coordinates, and time, for analysis to help city officials identify emerging patterns. Aggregates real-time data for enforcement, identifying vehicles that exceed sound limits. 5. Axis Camera Station Connected to the City Monitoring Centre, providing ready-to-use data from DataFactory for efficient monitoring and response. Offers a single platform to access all data from loud vehicle events, including bookmarked entries for further analysis. AI-powered technologies FF Group is tackling traffic noise pollution and improving urban safety via AI-powered technologies The partnership between the City of Newport, Sorama, Axis Communications, and FF Group is tackling traffic noise pollution and enhancing urban safety through AI-powered technologies. By integrating tools like the Axis Radar-Video Fusion Camera, CAMMRA AI, and Sorama's acoustic monitoring systems, Newport is proactively managing noise in real-time. Traffic management and noise regulation This solution improves quality of life, supports smart city goals, and enables better traffic management and noise regulation enforcement. With real-time data on vehicle speed, licence plates, and sound levels, Newport can quickly address violations and detect emerging issues, creating a safer and more sustainable urban environment.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programmes and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organisations like Allied Universal allows us to build on shared expertise and advance this important mission.”
The office of the Additional Director General of Police (ADG) and Inspector General (IG) of Prisons oversees the management and security of all prisons in the Indian state. This includes ensuring the safety of prison facilities, implementing rehabilitation programs for inmates, and managing prison staff. Creating a fair environment The ADG and IG focus on improving prison conditions and ensuring legal standards are met. Their goal is to create a secure and fair environment, balancing safety with efforts to reform and rehabilitate prisoners for their eventual return to society. Scenario The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements The absence of a security video surveillance system created critical security blind spots, making it difficult to monitor key areas effectively. The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements posed significant risks to prison security. New security video surveillance system To comply with government regulations, the new security video surveillance system had to adhere to stringent standards established by the Bureau of Indian Standards (BIS). This included specific sections detailing the specifications for camera performance and image quality and covering safety guidelines for IT equipment. The system required STQC certification to meet high security and data privacy standards, crucial for government installations. OWASP ASVS 4.0 L2 standards Additionally, it needed to comply with OWASP ASVS 4.0 L2 standards to ensure robust cybersecurity, safeguarding against common vulnerabilities. High-resolution cameras were essential for clear image capture, and tamper-proof storage was required to securely retain footage for 30 to 90 days. The system also had to align with the National Cyber Security Policy to protect sensitive data from cyber threats. Compliance with these standards was vital for maintaining security and operational integrity within the prison. Challenges Due to the absence of a security video surveillance system, the Prison Department faced numerous challenges such as: Struggled to monitor blind spots in the prison yard where fights and disputes frequently occurred. Detecting the smuggling of drugs and mobile phones during visitations was nearly impossible with manual checks alone. Staff couldn’t always be present to monitor isolated areas like back rooms, corridors, and staircases, leading to security gaps. Identifying the individuals involved in riots or brawls was difficult due to the lack of visual evidence. Inmate escape attempts often went unnoticed until too late, especially during night shifts. Ensuring round-the-clock monitoring of high-risk zones like solitary confinement was a constant challenge. Coordinating emergency responses, such as medical help during violent outbreaks, was delayed without instant visual updates. Matrix solution Matrix security video surveillance systems comprising Matrix Network Cameras and NVRs were installed across four prisons statewide, providing robust security for over 10,000 inmates. Matrix PTZ Cameras were deployed in larger spaces like the prison yard, where they could pan, tilt, and zoom to follow suspicious activities or fights, providing dynamic coverage and ensuring swift responses to incidents. Mini Dome Cameras were placed inside cells and common areas to provide constant, wide-angle surveillance, keeping tabs on inmate behaviour and reducing the chances of fights or smuggling illegal items. These cameras were also installed in cafeterias and recreation areas to monitor inmate interactions. Mini Bullet Cameras were installed in corridors and cellblock hallways to keep a close eye on inmate movement, ensuring no blind spots in these high-traffic zones. They were also installed in less-visited areas like storage rooms and staff offices to prevent unauthorised access and maintain control. Project Bullet Cameras were mounted along the prison yard and perimeter walls, providing long-range surveillance to prevent escape attempts and monitor outdoor activity. They were also installed at entry and exit points to keep tabs on everyone going in and out, securing access to the facility. 24x7 real-time monitoring All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs. This setup enabled 24x7 real-time monitoring, recording, and playback of video from different areas of the prison, ensuring complete coverage and prompt incident response. Similarly, the prison departments in three other cities of the state were also secured with Matrix Network Cameras and NVRs. Products offered Matrix MIDR20FL36CWS P2 (800+): 2MP IR Mini Dome Camera with 3.6 mm Fixed Lens Matrix MIBR20FL36CWS P2 (600+): 2MP IR Mini Bullet Camera with 3.6 mm Fixed Lens Matrix CIBR20FL36CWS P2 (800+): 2MP IR Project Bullet Camera with 3.6 mm Fixed Lens Matrix PZCR20ML25CWP P2 (70+): 2MP IR PTZ Camera with 25x Optical Zoom Matrix NVR6408X P2 (40+): 64 Channel NVR with 8 SATA Ports Solution diagram Benefits They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks The installation of the Matrix security video surveillance system effectively eliminated critical security blind spots in the prison yard, reducing the risk of fights and disturbances. They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks, preventing inmate escapes and unauthorised movements. Centralised monitoring Matrix security video surveillance systems enabled accurate monitoring during visitations, significantly enhancing the detection of smuggling attempts for drugs and mobile phones. Centralised monitoring via the 64-Channel NVR allowed for quick identification and response to disturbances, ensuring timely intervention during riots or medical emergencies. Regulation safety and data privacy High-resolution camera footage provided reliable documentation of inmate interactions and incidents, supporting investigations and enhancing overall prison security management. Matrix security video surveillance system meets BIS and STQC standards, ensuring compliance with government regulations for safety and data privacy. It also complies with OWASP ASVS 4.0 L2 standards, enhancing data security and protecting against cyber threats.
Client, a prominent regional R&D institution under MeitY, plays a crucial role in advancing India's technological landscape. With a focus on IT, electronics, and related sectors, the organisation leads in cutting-edge research, driving innovation to meet global trends and market needs. As a key player in high-end R&D, they have been pivotal in propelling India’s IT revolution, consistently expanding their expertise in emerging technologies. They utilise their knowledge and creativity to develop IT solutions across various industries, working closely with MeitY, funding agencies, partners, and key stakeholders. Requirements The project involved managing a defined volume of emergency calls per hour by directing those made to 112 to agents handling state-specific emergency services. Matrix's role was to deliver a VoIP PRI gateway solution that provided VoIP capabilities to a third-party server. Crucially, these functionalities needed to be implemented across various locations. The client’s needs can be outlined as follows: Manage a minimum of 50,000 calls: The system must be equipped to handle at least 50,000 emergency calls every hour. Direct calls to state-specific agents: When the global emergency number 112 is dialled, calls should be directed to agents overseeing emergency services for the respective states. Integrate with third-party systems: The agents will work on a third-party server, which must be seamlessly connected to the Matrix GENX system via SIP trunking. Solution In collaboration with Consulttech, Matrix developed a solution that significantly enhanced the organisation's operations by optimising call routeing. The core of the solution involved offering a VoIP PRI gateway, enabling seamless PRI to VoIP conversion. The essential features of this solution are as follows: Multi-location setup: The system covers various locations, each outfitted with a Matrix GENX system that connects to the ISP's PRI lines. PRI to VoIP conversion: At every site, Matrix GENX converts incoming calls from PRI lines into VoIP (Voice over Internet Protocol). Emergency call routeing: When a user dials 112, the call is routed through the ISP’s PRI lines to the Matrix Gateways, where the media is converted from PRI to VoIP and passed to the Automatic Call Distributor (ACD) server. Centralised ACD server: All VoIP calls are funneled into a central ACD server for efficient distribution. Agent call distribution: The ACD server directs the incoming calls to available agents who are ready to respond. Scalable solution: Up to 28 locations can be connected to the central ACD server, allowing the system to handle a high volume of calls simultaneously. Results The solution enabled the organisation to connect various locations into one unified communication system through the use of a VoIP PRI gateway. This improved the system's ability to manage thousands of calls per hour while significantly reducing call drops. The specifics of the solution are as follows: Multi-site implementation: The project was deployed across multiple locations in cities throughout Kerala, establishing a seamless communication network. Increased call handling capacity: Each site is capable of managing between 26,000 to 30,000 calls per hour. Significant decrease in call drops: The system efficiently handled large call volumes, resulting in almost no dropped calls. Matrix’s VoIP PRI gateway allowed the organisation to integrate multiple locations across the state into a unified communication system. With the ability to manage high call volumes, the solution significantly minimised call drops.
Sharry, a global workplace experience platform built around digital employee badges, has successfully delivered its enterprise solution to London’s new international hub opened by PATRIZIA, a global real estate investment manager. The state-of-the-art mobile access leverages Gallagher Mobile Connect credentials and, through full integration with the Gallagher Command Centre access control system, enhances physical security and significantly improves the workplace experience. PATRIZIA’s international hub Located in London’s Endell Street, PATRIZIA’s new international hub was opened after an extensive brown-to-green refurbishment that delivers sustainable ‘office of the future’ combining smart building tech, wellness amenities, hospitality services, street art, and flexible workspaces. The five-floor hub brings together PATRIZIA’s 200 UK-based employees. Their access to the existing Victorian building is completely managed through the PATRIZIA App and web-based PortalWX developed by Sharry. The workplace experience platform is fully integrated into the Gallagher Command Centre access control system allowing users to unlock their office doors simply and quickly by presenting their smartphones. Innovative approach If an employee arrives from another office, they can generate a mobile access badge in the app in seconds “PATRIZIA’s employees in London and those visiting from our other offices can enjoy seamless and touchless mobile access to our new international hub in London’s Covent Garden,” said Shreya Sheth, Associate Director, Building Technology & Sustainability at PATRIZIA. If an employee arrives from another office, they can generate a mobile access badge in the app in seconds. There is no need to send a new badge request, pick up the plastic card in person, or wait for it to be sent, and think about returning it when they leave. This innovative approach saves time while strengthening security policy. Next-generation security solution “We are very excited to be supporting PATRIZIA with their new innovative London office. Their commitment to creating a flagship workspace for the future of work is truly inspiring. It's been an incredible honour to be able to support them with a smart workplace app and integrated access control solution for the space,” said Ondřej Vodňanský, Head of Sales EMEA at Sharry. “We are thrilled to collaborate with Sharry and PATRIZIA to deliver a next-generation security solution at their new London hub. By integrating our Mobile Connect credentials with Sharry's workplace platform, we've created a seamless and secure access experience that not only enhances security but also aligns with the modern, flexible work environment that PATRIZIA envisions,” said Gordon Swallow, UK Sales Manager at Gallagher Security. Enhance experience and operations Beyond mobile access, the PATRIZIA App offers users a comprehensive set of features designed to enhance their workplace experience. To name a few: Reservations: Employees can easily reserve shared workstations or book access to the Health Club. Service Requests: With one tap, users can request any service or maintenance through the app. Guestpasses: The app also simplifies visitor management by allowing users to invite guests to the building and send them a guestpass with all the necessary information. Integrated access control solution Sharry provides an efficient platform for managing workplace access and offers powerful tools For facility and office managers, Sharry provides an efficient platform for managing workplace access and offers powerful tools for communication and engagement with all users, including the ability to send news updates, polls, and event invitations straight to the mobile app. Sharry and Gallagher's integrated access control solution significantly enhances physical security in many areas. For example, a manager can remotely revoke any mobile or plastic badge with just one click in the PortalWX. Even the end-user can immediately report their plastic card as lost in the PATRIZIA app and thus suspend it. The building operating system Finally, managers can access real-time data on workplace occupancy, enabling more informed decisions regarding space and amenities utilisation thanks to a partnership with Trigrr. The building operating system Trigrr has been deployed in PATRIZIA HQ to simplify system integrations and provide a centralised tool that unifies data, automation, and controls across Sharry, HVAC, IoT and lighting. Thanks to Trigrr BOS, occupants can remotely control office room temperature, adjust lighting, monitor CO2 levels, or launch smart scenarios directly in the Sharry workplace platform. "Partnering with Sharry on the new PATRIZIA international hub is a fantastic opportunity to generate more value by combining all applications and systems into a flexible tool that can adapt building behaviour in real-time according to the needs of the occupants," said Jean-Michel Verhulst, CEO of Trigrr.
Newport, a popular vacation destination, has partnered with Sorama to tackle growing noise pollution. By integrating AI technology and products from Axis Communications, Sorama, and FF Group, the city aims to reduce traffic noise and enhance road safety. FF Group’s CAMMRA AI software and DataFactory platform help generate accurate vehicle data in real-time, day or night, to support noise reduction efforts. The challenge How can they address the challenge of traffic noise? What actions can local municipalities take to effectively monitor noise pollution and improve road safety? The solution Newport, hosting 4 million annual visitors, faces traffic noise due to congestion. To address this, the city implemented an AI-based noise camera solution with the Axis Radar-Video Fusion Camera, powered by CAMMRA AI, Sorama Acoustic Monitors, and the DataFactory platform. This system helps adjust noise ordinances and improve traffic safety as part of Newport's smart city initiative. Solution architecture 1. Axis Radar Video Fusion Camera Monitors vehicle speeds up to 125 mph, integrates with CAMMRA AI for licence plate recognition and speed tracking. 2. CAMMRA AI Application Recognize vehicle details (make, model, plate) and merge data with speed from the Axis Radar. 3. Sorama L642 Acoustic Monitors Capture sound levels with 64 microphones and integrate with Axis cameras for detailed vehicle data. Offers integrations with Axis camera, Axis Camera Station and FF DataFactory. 4. DataFactory platform Collects data on all vehicles, including sound level, licence plate, make, model, colour, speed, vehicle type, GPS coordinates, and time, for analysis to help city officials identify emerging patterns. Aggregates real-time data for enforcement, identifying vehicles that exceed sound limits. 5. Axis Camera Station Connected to the City Monitoring Centre, providing ready-to-use data from DataFactory for efficient monitoring and response. Offers a single platform to access all data from loud vehicle events, including bookmarked entries for further analysis. AI-powered technologies FF Group is tackling traffic noise pollution and improving urban safety via AI-powered technologies The partnership between the City of Newport, Sorama, Axis Communications, and FF Group is tackling traffic noise pollution and enhancing urban safety through AI-powered technologies. By integrating tools like the Axis Radar-Video Fusion Camera, CAMMRA AI, and Sorama's acoustic monitoring systems, Newport is proactively managing noise in real-time. Traffic management and noise regulation This solution improves quality of life, supports smart city goals, and enables better traffic management and noise regulation enforcement. With real-time data on vehicle speed, licence plates, and sound levels, Newport can quickly address violations and detect emerging issues, creating a safer and more sustainable urban environment.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised management The ease of use and centralised management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customisable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read colour reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programmes and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organisations like Allied Universal allows us to build on shared expertise and advance this important mission.”


Round table discussion
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
Products


White papers

Preparing your organisation with quality situational awareness
Download
The role of IT in physical access control
Download
Expanding video surveillance in the enterprise market
Download
9 Opportunities To Upgrade Your Access Control Technology
Download
Safeguard Students With New Techniques And Technology
Download
How to implement a physical security strategy with privacy in mind
Download
Cybersecurity in keyless access management
Download
Cybersecurity in the physical security world
Download
Preparing your organisation with quality situational awareness
Download
The role of IT in physical access control
Download
Expanding video surveillance in the enterprise market
Download
9 Opportunities To Upgrade Your Access Control Technology
Download
Safeguard Students With New Techniques And Technology
Download
How to implement a physical security strategy with privacy in mind
Download
Cybersecurity in keyless access management
Download
Cybersecurity in the physical security world
Download

Videos
Security policy: Manufacturers & Suppliers

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download