Security policy
Yarden Gross, CEO and Co-founder of maritime technology start-up Orca AI champions the rapid – but responsible – deployment of smart, cost-effective digital tools to tackle climate challenges in the shipping industry. Leveraging machine learning and data insights, AI solutions are a vital front line in reducing fuel consumption and emissions. AI solutions "AI solutions are crucial for squeezing every last drop of efficiency out of the existing fleet amid increasing pressure to dec...
ISS (Intelligent Security Systems), a pioneering global provider of video intelligence and data awareness solutions, announced that it has received LenelS2™ factory certification and has joined the LenelS2 OpenAccess Alliance Program (OAAP). The certification means that the SecurOS® Enterprise software is now certified to work with all future versions of LenelS2’s flagship OnGuard access control system. “With one of the most rigorous testing paradigms in the industry...
Wayne Alarm Systems, Inc., a family-owned and operated provider of life safety and security solutions, announced the acquisition of SAS Security Systems, Inc. of Watertown, Massachusetts. This strategic move expands Wayne Alarm's footprint in the greater Boston area, allowing it to deliver its premier security services to a wider range of customers. Leveraging the latest technology Wayne Alarm, founded by Ralph Wayne Sevinor, has a long-standing reputation for exceptional customer care and u...
Network services provider - Principle Networks has announced a new partnership with Arctic Wolf, a managed detection and response service, to help proactively protect its customers against advanced cyberattacks. Cloud-based networks Principle Networks specialises in designing and implementing agile, scalable, and future-proofed cloud-based networks for sectors, including legal, logistics, social housing, automotive, and IT. The agreement with Arctic Wolf enables Principle Networks to offer it...
The Keyholding Company (TKC) are tech-enabled security specialists, passionate about raising the bar on effective security management. They help clients design physical security solutions that genuinely move the needle to create safer spaces and empower security professionals to make intelligent, data-driven decisions. Risk Management Tool The Risk Management Tool is a new feature in TKC’s existing online platform and an industry-first, set to transform physical security risk mana...
AlgoSec, a global cybersecurity pioneer, has announced it has been named an Established Vendor in the 2024 Gartner Peer Insights Voice of the Customer for Network Automation Platforms. The Voice of the Customer report synthesises Gartner Peer Insights' reviews into insights for IT decision-makers. The report details that 89% of AlgoSec end-users are willing to recommend its solutions. AlgoSec received a composite rating of 4.3 based on objective reviews by validated users and c...
News
DNAKE, a pioneering provider of smart intercom solutions, has announced a significant update version V1.5.1 to its cloud intercom offering. This update is designed to elevate the flexibility, scalability, and overall user experience of the company's intercom products, cloud platform, and Smart Pro APP. For installer Installer & property manager role integration On the cloud platform side, several enhancements have been made to streamline processes and improve efficiency. A new "Installer+Property Manager" role has been introduced, enabling installers to switch seamlessly between two roles. This new role consolidation streamlines workflows, reduces complexity, and eliminates the need for switching between multiple accounts on the platform. Installers can now effortlessly manage both installation tasks and property-related functions from a single, unified interface. OTA update Select the target device models for OTA updates with just one click in the platform For installers, the update brings the convenience of OTA (Over-the-Air) updates, eliminating the need for physical access to devices during software updates or remote management. Select the target device models for OTA updates with just one click in the platform, eliminating the need for tedious individual selections. It offers flexible upgrade plans, allowing instant updates or scheduled upgrades at a specific time, to minimise downtime and maximise convenience. This feature is particularly beneficial in large-scale deployments or when devices are located across multiple sites, significantly reducing the time and effort required for maintenance. Seamless device replacement Furthermore, the cloud platform now simplifies the process of replacing old intercom devices with new ones. Simply enter the MAC address of the new device on the cloud platform, and the system automatically handles the data migration. Once completed, the new device seamlessly takes over the old device's workload, eliminating the need for manual data entry or complex configuration steps. This not only saves time but also reduces the potential for errors, ensuring a smooth and seamless transition to the new devices. Self-service facial recognition for residents This allows residents to conveniently register their face ID via the Smart Pro APP at any time Installers can easily enable “Allow Residents Register Face” when creating or editing the project through the cloud platform. This allows residents to conveniently register their face ID via the Smart Pro APP at any time, anywhere, reducing the workload for installers. Importantly, the app-based recording process eliminates the need for installer involvement, significantly reducing the risk of facial image leaks. Remote access Installers can simply access the cloud platform to remotely check devices without network restrictions. With support for remote access to the devices’ web servers via the cloud, installers enjoy unlimited remote connectivity, enabling them to perform device maintenance and operations anytime, anywhere. Quick start For those eager to quickly explore the solution, the Quick Start option offers instant installer registration. With no complex distributor account setup required, users can dive right into the experience. And, with future integration planned with the payment system, the seamless acquisition of a Smart Pro APP licence through online purchases will further streamline the user journey, delivering both efficiency and convenience. For property manager Multi-project management With a single property manager account, the ability to manage multiple projects significantly boosts efficiency and productivity. By simply logging into the cloud platform, property managers can switch between projects effortlessly, allowing for quick and efficient management of different projects without the need for multiple logins. Efficient, and remote access card management Property managers can conveniently record access cards via a PC-connected card reader Manage access cards anytime, anywhere with the cloud-based solution. Property managers can conveniently record access cards via a PC-connected card reader, eliminating the need for on-site visits to the device. The streamlined recording method enables bulk entry of access cards for specific residents and supports simultaneous card recording for multiple residents, significantly enhancing efficiency and saving valuable time. Instant technical support Property managers can easily access technical support contact information on the cloud platform. With just a click, they can contact the installer for convenient technical assistance. Whenever installers update their contact info on the platform, it's immediately reflected for all associated property managers, ensuring smooth communication and up-to-date support. For residents Brand-new APP interface The Smart Pro APP has undergone a complete transformation. The sleek and modern interface provides an enhanced user experience that is both intuitive and efficient, making it easier for users to navigate through the app and access its features. The app now supports eight languages, catering to a wider global audience and eliminating language barriers. Convenient, secure face ID registration Residents can now enjoy the convenience of registering their face ID through the Smart Pro APP, without waiting for the property manager. This self-service feature not only saves time but also enhances security, as it significantly reduces the risk of facial image leaks by eliminating the need for third-party involvement. Residents can rest assured of a secure and hassle-free experience. Expanded compatibility The update expands compatibility with DNAKE's cloud service, integrating new models The update expands compatibility with DNAKE's cloud service, integrating new models like the 8” Facial Recognition Android Door Station S617 and the 1-button SIP Video Door Phone C112. Additionally, it enables seamless integration with indoor monitors, allowing S615 users to simultaneously call the indoor monitor, DNAKE Smart Pro APP, and landline (value-added function). This update significantly enhances communication flexibility in residential and commercial environments. Update for its cloud intercom solution In conclusion, DNAKE's comprehensive update for its cloud intercom solution represents a significant leap forward in terms of flexibility, scalability, and user experience. By introducing powerful new features and enhancing existing functionalities, the company has once again proven its commitment to innovation and customer satisfaction. This update is set to upgrade the way users interact with their intercom systems, paving the way for a more convenient, efficient, and secure future.
Cequence, a pioneer in API security and bot management announced it has signed a memorandum of understanding (MoU) with Aramco Digital Company, Saudi Aramco's digital and technology subsidiary, to establish plans for a strategic collaboration to enhance and localise API security within the Kingdom of Saudi Arabia. Digital transformation The collaboration aims to propel the digital transformation of Saudi Arabia’s industrial sectors. Implementing Unified API Protection (UAP) will safeguard critical data and functionality exposed through APIs. It follows the recent launch of Aramco Digital Company, which aims to accelerate digital transformation within the Kingdom, and the Middle East and North Africa (MENA) region. Additionally, the companies will explore creating a first-of-its-kind API Protection offering for ADC’s Marketplace. Best-in-class API security solutions Ameya Talwalkar, CEO of Cequence, and Moataz Lami, CISO of Aramco Digital, signed the MoU on behalf of Cequence and Aramco Digital Company, respectively. Also in attendance were Andy Mills, VP of EMEA of Cequence, and James Sherlow, Director, of Solutions Engineering at Cequence. "The digital landscape's expansion, especially with the advent of generative AI and its reliance on APIs, has made APIs the number one target for attackers,” said Ameya Talwalkar, adding “As APIs become the backbone of digital transformation, securing them is paramount. This partnership underscores our commitment to providing best-in-class API security solutions that shield sensitive data and guarantee seamless and secure adoption of AI in enterprises." Unified API Protection platform Security teams deploying the UAP platform achieve continuous protection of their complete API risk surface Cequence's innovative Unified API Protection platform is the only API protection solution with integrated Bot Management that eliminates unknown and unmitigated security risks across web, mobile, and all phases of the API security lifecycle. With Cequence, organisations can ensure they can secure and defend mission-critical applications from data loss, fraud, and business disruption. Security teams deploying the UAP platform achieve continuous protection of their complete API risk surface, enabling their organisations to reap the competitive and business advantages of ubiquitous API connectivity securely while meeting regulatory compliance. Middle East expansion Cequence launched a major Middle East expansion in 2023, securing investment from Prosperity7 Ventures to meet surging regional demand. Additionally, Cequence partnered with AmiViz, the Gulf Cooperation Council (GCC) region’s first enterprise B2B marketplace, to introduce the power of the UAP platform to enterprises across the region. Unparalleled, turnkey solutions Cequence stands at the forefront of innovative security solutions in the region, safeguarding a diverse portfolio of organisations, including the largest telecommunications provider. This distinction underscores their ability to deliver unparalleled, turnkey solutions adept at addressing the unique challenges and nuances specific to the region and various industries.
Hikvision has published its 2023 Environmental, Social and Governance (ESG) Report, disclosing its ESG practices and performance for the sixth consecutive year. The report offers a comprehensive look at Hikvision’s focus on sustainability and its ESG priorities and actions, reaffirming the company’s commitment to fulfilling corporate social responsibility with innovative and sustainable technologies. “Practicing the ethos of ‘Tech for Good’, adhering to ‘pragmatism’, and exploring ‘Green’ transformation, Hikvision leverages our products to deliver the value of sustainable development,” said Huang Fanghong, Chief Compliance Officer and Senior Vice President of the company, adding “We firmly believe that together with the momentum of digital transformation and technological advancements, we will attain stable and sustainable growth.” Sustainability-driven innovation Hikvision has formulated an ESG management framework with “Tech for Good” as its core With the belief that technologies play a pivotal role in promoting overall well-being, Hikvision has formulated an ESG management framework with “Tech for Good” as its core. With this mission in mind, the year 2023 was marked by the company’s continued commitment to sustainability-driven innovation to benefit the society at large. Leveraging cutting-edge technologies, Hikvision endeavored to protect historical relics, prevent water and air pollution, as well as enhance efficiency and productivity in manufacturing. Moreover, the company has contributed to providing more educational resources for children in remote areas, ensuring abundant apple harvests, and safeguarding wildlife, fulfilling its part to further the aspiration to build a better world. ESG management framework Apart from giving back to the society with innovative technologies, Hikvision places great emphasis on integrity and compliance, low-carbon development, and harmonious relationships with employees, partners, and communities, integrating these principles into its ESG management framework. ESG performance highlights during the reporting period include: The company released the Hikvision Global Human Rights Policy, embedding the respect for human rights in the company’s governance and operations. Hikvision formulated and introduced the Management Procedure for Greenhouse Gas Emissions, aiming to reduce greenhouse gas (GHG) emissions and promote low-carbon operations. Hikvision further integrated eco-friendly principles into the process of product R&D, design, packaging and utilisation. By acquiring carbon footprint verifications of representative products, the company evaluated the GHG emissions throughout those products’ life cycles for continuous improvement. While promoting energy savings, Hikvision also proactively advanced the procurement of green power. In 2023, around 12,533.7 MWh of power was generated by photovoltaic systems deployed in the company’s manufacturing bases. Hikvision continued to drive sustainable development through innovation, winning 1,884 invention patents in 2023. The R&D investment of the company reached RMB 11.39 billion, up 16.08% year-over-year. Adhering to responsible procurement, Hikvision continuously enhanced supplier management. 100% of the new suppliers of the company were screened using the environmental and social criteria. Hikvision provided its employees with a series of trainings to support their personal and professional development, with total training time reaching 1,534,482 hours. Hikvision employees engaged actively in volunteer activities, collectively dedicating over 20,000 service hours.
Market Logic Software, the pioneer in insights management solutions announced the launch of DeepSights™ API. DeepSights is the first AI assistant trained to provide accurate, relevant answers to business questions about markets and consumers. By using the new API to integrate DeepSights seamlessly with any business application, enterprises can infuse invaluable insights into their business processes and as a result, systematically drive better decision-making. Higher quality responses Unlike conventional knowledge management platforms, which often provide generic responses, DeepSights is fully attuned to the nuances of market insights. Comparison tests repeatedly show DeepSights outperforms generic AI alternatives by providing 60% higher quality responses and citing only trusted sources. AI-to-AI integrations DeepSights integrates with a special-purpose in-house AI product concept generator to refine concepts DeepSight's proven reliability equips it uniquely to power the AI-to-AI integrations, heralding a new era of insights-driven processes. For instance, at a global consumer goods brand, DeepSights integrates with a special purpose in-house AI product concept generator to refine concepts by leveraging insights on target audience segments. Seamless integration "Our unwavering commitment to DeepSights' quality enables us to empower customers to harness the full potential of AI securely," said Olaf Lensmann, Chief Product and Innovation Officer of Market Logic Software. Olaf Lensmann adds, "We facilitate seamless integration across diverse applications without risk of compromising market understanding with AI-generated misinformation - a frequent problem with generic AI tools." Customer feedback Customer feedback echoes the transformative impact of employing the DeepSights API. "Integration of insights directly into applications is a game changer. It accelerates the realisation of insights' value and amplifies the impact of insights on business performance," said, Christian Niederauer, Vice President, of Global Insights and Consumer Affairs, at Colgate-Palmolive. Data ecosystem Since launching in 2023, DeepSights has garnered widespread adoption among major global brands and market research agencies, liberating thousands of hours previously spent searching for insights and data. Marketers, product managers, and insights professionals are using DeepSights to explore their organisation's entire market data ecosystem and uncover fresh insight with unprecedented speed. With user-friendly to popular business tools like Microsoft Teams, SharePoint, and Google WorkSpace, DeepSights ensures insights access to all business users.
Northern Data Group's GenAI cloud platform, Taiga Cloud, a pioneering European generative AI cloud service provider (CSP) and VAST Data, the AI data platform company, announced a strategic partnership. Together, Taiga Cloud and VAST will deliver dedicated, scalable generative AI cloud services to Europe, driven by 100 percent carbon-free energy. Gartner predicts that by 2030, AI could consume up to 3.5 percent of the world's electricity. To meet this growing demand, organisations are seeking sustainable and energy-efficient AI solutions. VAST's DASE architecture Taiga Cloud, a Cloud partner in the NVIDIA Partner Network, provides access to a large NVIDIA GPU network in Europe, with over 20,000 NVIDIA GPUs, including the latest NVIDIA H100 and A100 Tensor Core GPUs. Its platform runs entirely on carbon-free, renewable energy, and boasts a less than 1.2 Power Usage Effectiveness ratio. Taiga Cloud provides access to a large NVIDIA GPU network in Europe, with over 20,000 NVIDIA GPUs Combining this efficiency with VAST's differentiated Disaggregated Shared Everything (DASE) architecture and similarity data reduction software will provide access to a high-speed, low-latency and data-sovereign cloud built for accelerated computing, while ensuring organisations aren't compromising on their sustainability objectives. Best-in-class solutions "Northern Data Group is committed to providing best-in-class solutions driven by energy from renewable sources," said Aroosh Thillainathan, Founder and CEO, Northern Data Group. "This partnership with VAST Data is doing just this, helping to bring scalable, sustainable solutions to customers, enabling them to bring their best ideas to life." Key benefits Key benefits for customers leveraging Northern Data Group's Taiga Cloud with the VAST Data Platform include: Reduced Environmental Footprint with Sustainable Infrastructure: With best-in-class infrastructure and the latest liquid-cooling technologies to optimise GPUs for optimal efficiency, renewable energy and waste-reduction solutions, and VAST's efficient data management capabilities, organisations can achieve aggressive sustainability goals in the face of power-hungry AI deployments and applications - without compromising on performance. A Robust Cloud Services Catalogue: The VAST Data Platform offers easy API access to encapsulate its storage, database, global namespace and compute engine capabilities into Taiga Cloud's wide-ranging advanced cloud data services and support, enabling Taiga Cloud to pass on best-in-class services to customers. Improved Performance with Enterprise Features: VAST's performance – particularly for AI-driven applications requiring high throughput and fast access speed – flexibility, and multi-tenancy, allows Taiga Cloud to help customers manage, move and protect their data with enterprise-grade features. Superior service levels, particularly in GPU cluster interconnectivity and storage speed, are also possible, which is crucial for intensive computational workloads. Expanded Access to Secure, Compliant GPU Services: Thanks to VAST's multi-tenant, scalable solutions, Taiga Cloud securely and efficiently scales its infrastructure in perfect harmony with its growing customer base - allowing Taiga Cloud to serve startups and smaller enterprises that might not have the capital to invest in high-performance computing infrastructure independently. GDPR-compliant operations "With the VAST Data Platform, Taiga Cloud is bringing to market one of Europe's pioneering GPU-accelerated clouds, with robust services and support offerings for generative AI deployments," said Chris Morgan, Vice President, Solutions at VAST Data. "VAST provides CSPs with software infrastructure solutions that combine the speed, scale, security and GDPR-compliant operations that data-intensive organisations across the globe require for their AI workflows."
As more countries adopt the concept of digital identity, regulators are keen to showcase their plans and successes. But what do businesses think about this shift? To find out, Regula, a global developer of forensic devices and identity verification (IDV) solutions, commissioned a study to survey companies across different regions and industries to get a sense of their readiness, concerns, and expectations for digital identities. Digital identity Digital identity is considered to be a way to improve the efficiency and security of services, reduce fraud, and enhance access to public services, ensuring that they are delivered quickly and to the right people. A digital ID is an online representation of an individual, which contains personal information, credentials, and attributes used to establish and authenticate identity in digital spaces. As such, digital identity is already a well-recognised concept in different sectors. Perception According to the Forrester Consulting study “The New Imperative: Digital IDs,” 81% of large and enterprise-level companies from the Aviation, Banking, Government, IT, and Telecom sectors have at least a basic awareness of this technology, with almost half possessing a thorough understanding. Moreover, some countries and sectors, primarily those with advanced digital infrastructures and regulatory frameworks, as well as high customer online interaction frequencies, have already leaped its adoption. Implementation Currently, 42% of organisations worldwide are actively integrating digital ID technologies into their systems, and 31% are in the early stages of implementation. Another 17% of respondents are now developing a strategic plan to begin this transformation. The United Arab Emirates shows higher integration rates, where the majority of businesses (54%) have already moved to active integration. At the same time, places with stricter regulations, such as the US and Europe, are taking a more cautious approach, with only 37% and 39% of companies respectively claiming to be at the integration stage. Hybrid approach to digital IDs “As the Forrester experts note in the study, the complexities and disparities of global implementation across various landscapes highlight the strategic necessity of adopting a hybrid approach to digital IDs. Moreover, there is no single, universally accepted set of global standards for digital IDs that applies across all countries and sectors," said Ihar Kliashchou, Chief Technology Officer at Regula. "Therefore, the large number of companies at the stage of active implementation demonstrates a growing need for frameworks and guidelines that aim to foster interoperability, security, and privacy across different digital ID systems." Frameworks and guidelines "The good news is that several international organisations and standards bodies, the New Technology Working Group in the International Civil Aviation Organisation, the International Organisation for Standardisation (ISO), etc. are working towards those standards. This seems to be a case in which slow and steady wins the race.” More insights on the survey results will be revealed during an upcoming webinar with Regula and European Telecommunications Standards Institute experts. Methodology In January 2024, Regula commissioned Forrester Consulting to survey 226 manager-level and higher decision-makers responsible for their organisations’ ID verification solutions. The respondents were primarily from Europe, North America, and the Middle East, with at least 500 employees or more.
Expert commentary
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced its selection by the Fort Worth Independent School District (FWISD) in bolstering safety measures for graduation ceremonies and extracurricular events. Serving nearly 75,000 students across 140 schools, FWISD conducted a meticulous internal assessment of various technologies, ultimately selecting Metrasens as the preferred solution. FWISD deployed six Metrasens Ultra systems during its 2024 graduation ceremonies. The deployments strengthened safety protocols while synergizing with existing security measures, underscoring the district's unwavering commitment to safety as evidenced by its comprehensive security and safety policies. Fort Worth ISD graduations "We are confident in our choice of Metrasens Ultra to elevate our extracurricular safety efforts," said Daniel Garcia, Safety & Security Executive Director at Fort Worth ISD. "With regards to Fort Worth ISD graduations and other ceremonies, it's paramount that students, faculty, and visiting families feel assured and confident as they come together to commemorate these special occasions." "As we open our facilities to families, it's essential to offer reassurance that Metrasens Ultra systems provide a completely safe solution for all members of our school community." Metrasens Ultra systems The passive nature of Metrasens Ultra systems adds an additional layer of safety for all Metrasens Ultra, renowned for its cutting-edge sensor technology, swiftly and accurately pinpointing potential threats such as concealed weapons, all without emitting any harmful radiation. Its versatility enables effortless transition between indoor and outdoor settings, while its portability ensures convenient setup and relocation between facilities, without necessitating physical contact. The passive nature of Metrasens Ultra systems adds an additional layer of safety for all, including individuals with medical implants or expectant mothers. Moreover, the systems' sleek design and portability seamlessly align with the steadfast commitment to ensuring the safety of all attendees. Advanced detection technology "We are honoured to have been chosen by Fort Worth ISD to implement our advanced detection technology at their extracurricular events," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. "The district's dedication to safety aligns perfectly with our mission to provide innovative solutions that meet the diverse security needs of our customers."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed at JPS Health Network in Fort Worth, Texas to mitigate gun-related violence. Located in Tarrant County, the 582-bed hospital includes an acute care facility, outpatient care centres, and psychiatric emergency room. Its Level I Trauma Centre receives over 125,000 emergency department visits annually from local and air EMS agencies, as well as others outside the county. HIPAA-compliant AI gun detection If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence “At the hospital, we witness first-hand the impact of gun violence, which is why we strive to safeguard our patients, staff, and visitors,” said Randell Hayen, Chief of the Tarrant County Hospital District Police Department. “Along with our onsite police department, adding ZeroEyes gives us another tool to use to do just that.” ZeroEyes' HIPAA-compliant AI gun detection and intelligent situational awareness software is now layered onto existing digital security cameras at JPS Health Network. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to the on-site hospital police department as quickly as three to five seconds from detection. Deployment of ZeroEyes The ZeroEyes Research Centre has found that nearly 50% of gun violence incidents at healthcare facilities take place within the building-among these incidents, 42% are targeted attacks, while 39% are spontaneous. Although hospitals are entrusted with caring for the victims of gun-related violence, this surge in violent incidents within healthcare facilities has prompted approximately 40 states to enact or strengthen laws regarding violence against healthcare workers. “Hospitals are inherently fast-paced environments where people are already vulnerable, and the size of the JPS facility makes the job of its police force and security teams even more challenging,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “I personally believe that the hospital’s deployment of ZeroEyes underscores its unwavering commitment to staying ahead of the curve in safety and security while providing exceptional care for its community.”
ISS (Intelligent Security Systems), a pioneering global provider of video intelligence and data awareness solutions, announced that its SecurOS® UVSS (Under Vehicle Surveillance System) was recently deployed as part of security preparations for the College Football Playoff (CFP) National Championship between the Michigan Wolverines and Washington Huskies, which took place earlier this month at NRG Stadium in Houston. Prior to the game, ISS, in partnership with systems integrator Unlimited Technology, worked with officials from NRG Stadium and stadium management firm ASM Global to install the UVSS at a designated arrival entrance for the respective football teams and other dignitaries where it was used to screen the undercarriage of approximately 140 vehicles for a wide range of vehicle-borne threats. ISS’s undercarriage technology ISS’s renowned LPR software that can perform colour, class, make and model recognition Among the vehicles screened included a mix of buses, sedans, trucks, and vans. Each vehicle also had its licence plate simultaneously read by SecurOS® Auto, ISS’s renowned licence plate recognition (LPR) software that can perform colour, class, make and model recognition, to provide a complete profile of every automobile entering the venue. “ISS’s undercarriage technology enhances security by removing the human factor from the screening process and increasing visual accuracy,” said Ellis D. Stafford, Safety & Security Director for NRG Park. Author's quote “At the CFP National Championship, the resounding success of our technology deployment, featuring the groundbreaking UVSS, echoes the commitment to product innovation that defines our company,” added Matt Powell, Managing Director for North America at ISS. “Our cutting-edge UVSS showcased precision that helps keeps fans moving while simultaneously keeping them safe. We extend gratitude to our valued partners, including Unlimited Technology, whose collaboration elevated this deployment to new heights. Together with the team at NRG Stadium, we forged a seamless fusion of innovation and expertise, setting a benchmark for these kinds of technology deployments.”
Xtract One Technologies, a pioneering technology-driven threat detection and security solution that prioritises the patron access experience by leveraging AI, announced its SmartGateway System has been selected to protect the new 11,500-capacity CPKC Stadium, as a result of the Company’s partnership with Kansas City Current of the National Women’s Soccer League. Enhanced patron experience CPKC Stadium is being built by construction partners, J.E. Dunn and women-owned Monarch Build, as well as the female-led team at Henderson Engineers, and is expected to open at the start of the 2024 NWSL season. Once construction is complete, CPKC Stadium will make history as the world’s first and only purpose-built stadium for a women’s professional sports team. This collaboration between Xtract One and KC Current signifies a significant milestone by delivering streamlined, efficient, and modern security measures, enhancing venue safety, minimising wait times, and fostering enhanced patron experience at a first-of-its-kind venue. Sense of privacy and comfort AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort Xtract One’s SmartGateway system replaces intimidating, traditional metal detectors and delivers fast, reliable, and seamless patron screening. This solution unobtrusively scans patrons for guns, knives, and other prohibited items as they enter the venue, using AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort. The system was designed for large, ticketed venues to enable high throughput. With Xtract One, KC Current and CPKC Stadium will be able to deliver optimal fan experiences through eliminating long entry lines and allowing fans to quickly, and safely, enter the venue and enjoy the game. Partnering with Xtract One “KC Current is all about elevating the community and inspiring bold ambition. We're constantly pushing to raise the bar for our players, our fans, and our community,” said Kansas City's Current Vice President of Facility Development, Scott Jenkins. “We’re thrilled to be partnering with Xtract One to set new standards in fan safety and enjoyment, elevating our game day experience to new heights in a new stadium.” Weapon detection technology solutions Xtract One’s ability to bolster security measures while ensuring an optimised entry process With this partnership, Xtract One will work closely with KC Current and CPKC Stadium to deploy cutting-edge security and weapon detection technology solutions tailored to the team's needs and dynamic, community-centric venue environment. Xtract One’s ability to bolster security measures while ensuring an optimised entry process for fans aligns with KC Current’s mission of prioritising safety without compromising the community’s experience, in their quest to becoming the best women’s football club in the world. New era of community experience “We're proud to lead the way in stadium security for KC Current as they usher in this new era of community experience at CPKC Stadium,” said Peter Evans, CEO of Xtract One. “It’s important to us that we take care of ensuring fans’ safety, while allowing players and coaching staff to focus on what they do best: delivering unforgettable soccer matches. Our goal is to make the CPKC Stadium experience enjoyable, secure, and memorable for all those who step through its gates.”
A pioneering manufacturer of hostile vehicle mitigation systems, Heald, has installed and secured a number of spaces within the bustling area of Battersea Power Station, Central London. Battersea Power Station is at the heart of one of Central London’s largest and eagerly anticipated new developments. Challenges Over recent years, the area has become home to a community of homes, shops, bars, restaurants, cafes, offices, and over 19 acres of public space. As vehicle-borne incidents remain a potential threat to bustling high-footfall public locations, the decision to implement adequate levels of public safety in the central space was chosen due to the area being a potential security target. Customer requirements Heald provided one HT3 Electro-Mechanical Matador 4 and two Fixed Matador 2’s to secure the public spaces The customer had specific requirements regarding foundation depth and the challenge of fitting on a gradient. Therefore, Heald’s Matador was the chosen product. Heald provided one HT3 Electro-Mechanical Matador 4 and two Fixed Matador 2’s to secure the public spaces. Heald’s recent security installations within Central London include securing Pall Mall, East Trafalgar Square, Charing Cross Eastern Side, Leicester Square, and The Strand’s East and West sides. Compliance and increased public safety As the ‘Terrorism (Protection of Premises) Bill’, commonly referred to as ‘Martyn’s Law’, and the ‘Protect Duty’ edges closer to implementation, large public spaces and venues with a capacity exceeding 100 people may need to consider updated safety measures. Heald advises businesses to prepare as soon as possible to ensure compliance with the upcoming legislation and increased public safety. Security implications Debbie Heald MBE, managing director and co-owner at Heald Ltd, comments, “As more areas in Central London develop into busy high footfall spaces, it’s important to consider how a change in public environment and an increase in footfall will pose potential safety risks." “Not only is Battersea Power Station an iconic location in London but soon, it will be one of London’s largest office, retail, leisure, and cultural quarters. With a 42-acre site, and a 24/7 community hosting over 250 shops, considering the potential security implications this may attract is essential." Aesthetic design of bollards Implementing high-quality security systems that blend in with the public realm not only provides a visual deterrent" "Implementing high-quality security systems that blend in with the public realm not only provides a visual deterrent to mitigate the chances of a vehicle-borne attack but also creates safer spaces." "Moreover, the aesthetic design of these bollards, carefully integrated into the modern environment, offers peace of mind, and a visually appealing surrounding for the public." Crash-tested with VADS rating “It’s likely that most central areas will have safety measures or will be in the process of implementing them, but as footfall increases, new developments come to fruition, and the introduction of Martyn’s Law edges closer, it’s our duty as perimeter security experts to share gentle reminders to help secure our thriving city spaces." “Heald’s Matador is crash tested to IWA-14 and PAS 68 standards, as well as holding a CPNI Vehicle Attack Delay Standard (VADS) rating. By carrying out PAS 68, ATSM, and IWA-approved crash tests, our customers can be assured that they receive durable and robust security solutions.”
CyberArk, the identity security company announced that Glasgow Caledonian University (GCU) has selected the CyberArk Identity Security Platform to power its mission-critical identity and access management modernisation initiatives and improve security for its more than 27,000 staff and students. Protecting access The top-performing modern university in Scotland, GCU has campuses in the centre of Glasgow and London and is well known for its academic teaching and research programmes, especially in the area of healthcare. As colleges and universities around the world continue to be a target for damaging cyberattacks, especially ransomware attacks, there has been an intensifying focus on protecting access to the applications and systems students and staff rely on, while preventing credential theft that could put intellectual property and sensitive data at risk. Cybersecurity, identity, and access management It could offer additional identity security capabilities as we mature and expand our security programmes" “In recent years GCU and others within the sector have increasingly been the target of cyberattacks. These risks drove us to completely reassess our approach to cybersecurity in general, and identity and access management in particular,” said Tahir Yousaf, IT Director at GCU. He adds, “We needed to closely examine every aspect of our security stack. We selected the CyberArk platform for its well-established privileged access management and access management capabilities, knowing it could offer additional identity security capabilities as we mature and expand our security programmes.” CyberArk Identity Security Platform Centered on intelligent privilege controls, the CyberArk Identity Security Platform secures human and machine identities and flexibly automates the identity lifecycle, all with continuous threat detection and prevention to enable sero Trust and enforce least privilege. In addition to supporting ongoing audit and upcoming regulatory requirements, boosting productivity, and securing privileged access for its team of IT administrators, the CyberArk Identity Security Platform, once implemented will enable GCU to: Authenticate users with adaptive multi-factor authentication. Securely access and share student and staff application passwords. Secure web applications from threats originating on the endpoint and prevent data exfiltration. Provide greater insight into user risk and potential threats. Demonstrate compliance. Improve user lifecycle management. Continuously review and verify access. Prevent credential theft and limit privilege escalation and lateral movement. A comprehensive identity security programme “According to our research, 89% of organisations indicated they were targeted by at least one ransomware attack in the last 12 months,” said Matt Cohen, CEO, of CyberArk. He adds, “And when you consider high-value information universities generate, like research data, combined with a varied set of users with various levels of access and permissions, it’s no wonder higher education is a frequent target. CyberArk is committed to our role as a long-term partner and working closely with GCU to help the University construct a comprehensive identity security programme mapped to protecting against future threats."
Round table discussion
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023?
Products
White papers
Safeguard Students With New Techniques And Technology
DownloadHow to implement a physical security strategy with privacy in mind
DownloadCybersecurity in keyless access management
DownloadCybersecurity in the physical security world
DownloadPreparing your organisation with quality situational awareness
DownloadThe role of IT in physical access control
DownloadExpanding video surveillance in the enterprise market
Download9 Opportunities To Upgrade Your Access Control Technology
Download