Shop security systems
HiveWatch, a physical security software company reimagining how organisations keep their people and assets safe, announced a breakthrough in enterprise security operations using Anthropic’s Claude AI technology to transform traditional security monitoring from reactive alert processing into strategic intelligence operations. The new HiveWatch® AI Operator uses Claude’s advanced language understanding and reasoning capabilities to intelligently filter and contextualise security a...
Hikvision has hosted its 2024 HikTech Star Tour in Hangzhou, China. Over 100 tech talents from around the globe have gathered for a three-day immersive experience aimed at exploring cutting-edge innovations, sharing insights, and building a vibrant global tech community under the theme "Connecting Stars for Brilliance." In the months pioneering up to the event, Hikvision sparked a wave of creativity on global social media through the HikTech Star Show, encouraging tech enthusiasts worldwide to...
Interface Systems, a globally renowned managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analysed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Offering valuable insights to strengthen store security and protect employees, the report provides an overv...
IDIS Americas, a new IDIS business unit formed from the recent merger of IDIS America and Costar Technologies, is kicking off ISC East 2024 in New York with a strong presence. At Booth #425, attendees can explore its comprehensive lineup of advanced surveillance solutions, including the scalable IDIS Solution Suite (ISS) VMS and a wide range of AI-powered, NDAA-compliant video surveillance technologies. Designed to excel across key sectors such as banking, retail, education, critical infra...
Luminys Systems Corp (Luminys), a provider of smart, sustainable, and connected technology solutions announced the launch of its latest suite of security technology products designed for the North American market. The release is scheduled for a public unveiling during the "Luminys Phase 2 Product Launch" webinar on Nov. 15, showcasing an innovative product lineup that meets the modern demands for scalable, intelligent, and compliant security. Product lineup The new suite includes an array of...
Lloyd’s List has been the trusted source for news and intelligence about the global shipping industry for nearly 300 years. Now its award-winning journalism and expert analysis are available instantly, anywhere, with the launch of the new Lloyd’s List App. Available on the App Store for iOS users and Google Play store for Android devices, the new Lloyd’s List App has a suite of customisable features to keep users connected to the trends, issues and events that matter in...
News
A security company has issued a warning to commuters after a worrying rise in theft and antisocial behaviour at train stations. Kingdom Security, who provide a range of security measures including security personnel to a wide range of sites across the country are becoming increasingly concerned about a rise in theft at several train stations and are asking regular commuters to remain vigilant. Shoplifting offences According to the ONS, England, and Wales reached a new 20-year high with 443,995 shoplifting offences committed in 2023/2024. The situation is certainly worrying and although commitments were made in July’s Kings Speech, Graham Allison, COO of Kingdom Security, is urging commuters to be vigilant and to make security aware if they see any causes for concern in train station shops. Campaign against shoplifting and violence “Kingdom welcomes the government’s commitments to crack down on shoplifting and violence against shop workers. Train station retail workers are under immense pressure, especially during peak commuter hours, and unfortunately, some people rushing to get their train may be tempted to steal rather than wait in line.” “Nationwide, we are also seeing a rise in the verbal and physical abuse being faced by retail workers, and we fully support Co-op's campaign to make this a standalone criminal offence,” continues Graham. “At train stations, there are fewer staff in store to deal with situations that escalate, so security personnel needs to be trained to deal with these issues and protect shop workers.” Preventative solutions Incident Reporting software allows store managers to log the value of goods and the time of day There are many preventative solutions retailers in train stations can take to better protect themselves. For example, Kingdom Security is rolling out new innovative measures to crack down on shoplifting. Their Incident Reporting software allows store managers to log the value of goods and the time of day these attacks happen through their mobile, to build a clearer image of when theft is most likely to occur, and to identify the high-value items. These forecasts let management staff prepare and prevent any abuse and theft within their stores, better-protecting team members and the public during especially busy commuter hours. The public to remain vigilant Graham emphasises, “The security industry is making huge strides forward, in not only reacting to theft after the fact but creating a basis from which retailers can better prepare for it." "We are asking the public to remain vigilant, especially during commuter hours when stations are at their busiest, and if you see anything suspicious alert the relevant authorities including the British Transport Police immediately.”
Long gone are the days of choosing a security installer for a single installation and then moving on. Security pioneers are choosing installers based on the long-term value and strategic partnership they can offer. The best installers remain on top of new trends and developments — and advise their customers accordingly. In doing so, they create many opportunities to upsell new solutions to improve their customer’s operations. Customer’s lifetime value Customers find more value from the firm and, in turn, boosts the bottom line Upselling describes an approach in which a supplier makes their customer aware of a superior version of a product, while cross-selling is when a complementary product to those a customer has purchased is proposed. Upselling and cross-selling can significantly increase a customer’s lifetime value - how much revenue they generate over their time with a supplier - by 20-40%, according to research. It helps customers find more value from the firm and, in turn, boosts the bottom line. Seven easy ways Here are seven easy ways to upsell and cross-sell to customers. Easy AI upgrades AI is becoming a “must have” and customers are seeking easy ways to leverage the benefits of AI into their existing infrastructure and new installations — without the disruption and cost of a re-fit. Hanwha Vision offers an AI Box, the AIB-800, that makes it easier to implement powerful AI analytics such as object detection (people, vehicles, and vehicle type), and virtual-line and area crossing detection, to reduce false alarms and improve operator efficiency. Increase coverage As sites expand and needs evolve, the customers may need additional surveillance coverage. Likewise, for temporary increases in footfall, for example, during events or high season for a retail, multi-use or tourism space, a PoE Extender camera can be a valuable addition to a customer’s security stack. It is designed as a cost-effective and quick solution for integrators and end users when there is a need to add a camera or another PoE-enabled device to an existing system. Multi-directional AI solutions Alternatively, end users may discover that they require coverage for large and complex areas and that it is more cost-effective to purchase a multi-directional AI camera. Hanwha Vision’s PNM-C34404RQPZ, for example, features a PTZ camera and four 4K sensors, with each sensor able to individually pan, tilt, zoom and focus. Meanwhile, accurate AI video analytics reduce false alarms and enable efficient forensic search. With just a single network cable, licence and IP address, multi-directional cameras enable a single device to take the place of several conventional cameras, resulting in a lower total cost of ownership. Add an IP audio system They can suggest migrating a customer’s site from an analogue to an IP audio system. An IP audio system, such as the range by Hanwha Vision, delivers superior audio quality and greater scalability, with a reduced need for cabling and an option for centralised management with a video management system. If an existing audio system is not in place, adding one can provide useful benefits such as broadcasting informational announcements, playing background music, and deterring unwanted behaviour. Rapid identification with bi-spectrum cameras Adding perimeter detection functionality can prove a significant enhancement for installations in low light or where intrusion is a concern. Thermal cameras are a value-add in such environments, giving additional coverage in challenging weather conditions, complete darkness or when foliage is blocking a scene. Hanwha Vision’s bi-spectrum AI range provides dual (thermal and visible) channels in one device making it simple for operators to use the thermal lens for perimeter detection and the visual lens to identify and determine if an event requires their action. This enables detection and rapid identification without having to install two separate devices – saving time, equipment and ongoing maintenance costs. Unified entry systems: access, intercom and camera solutions Investing in an intercom that integrates with a video management system and includes a camera, such as the TID-600R, means operators can benefit from an additional camera channel plus an access control and help point solution. The compact size of a combined intercom and camera system also suits a multitude of installations. Improve system architecture Sites often start with a simple security system that consists of a handful of cameras and a network video recorder. Over time they will invariably grow; at this point, there is an opportunity to upsell a video management system (VMS) such as Wisenet Wave, that consolidates data streams and system management in a single place. An open VMS also offers futureproofing and flexibility to add more devices as needs evolve. Likewise, if a customer’s annual software licence costs are up for renewal, it is worth considering the benefits of using Wave as there are no yearly or intermittent upgrade costs. Long-term loyalty The moment they complete an installation is just the start of a customer journey with the organisation. Thanks to advances in video surveillance and connected devices, there are many opportunities to continue building a relationship with the customers and to uncover new installations and features that can help the customers reach their goals. From implementing AI for higher efficiency and reduced false alarms, to unifying surveillance systems and bolstering architecture, the customers will need guidance to decide on the best security solution for them.
Kwikset®, a trusted pioneer in residential security and a registered trademark of ASSA ABLOY Americas Residential Inc., an ASSA ABLOY Group Company, announced the upcoming launch of Halo Select, a smart door lock designed to provide a convenient and versatile security solution for the home. Halo Select stands out by offering both Wi-Fi and Matter built-in for homeowners seeking flexible, reliable, and integrated smart home security. Choose the connection method that suits the best, and easily switch if the smart home needs to evolve. Integrates geofence technology With the Kwikset app and built-in Wi-Fi (no hub required), Halo Select empowers them to control their front door from anywhere - lock, unlock, and even grant access to guests, all without traditional keys. Homeowners can share access with family or trusted guests through unique codes or in-app, with real-time notifications ensuring they stay informed about who’s coming and going. The lock also integrates geofence technology to intelligently unlock as they approach their home. Smart security automation Halo Select integrates seamlessly with all compatible smart home platforms and devices By incorporating Matter over Thread, Halo Select integrates seamlessly with all compatible smart home platforms and devices, so they can simplify their life with smart security automations. With Kwikset’s in-app compatibility check and guided setup, the transition to Matter is also simple and stress-free. “Halo Select represents the next step towards Kwikset’s mission to provide homeowners with unmatched security and seamless control over their home security,” said Jeff Sandoval, Director of Marketing for Electronics at Kwikset. Trusted security and technology Sandoval added: “By offering both Wi-Fi and Matter connectivity, Halo Select fills a critical gap in the market, providing a versatile, integrated solution that simplifies smart home integration. We’re excited to bring this innovation to market and continue delivering trusted and reliable products that reflect the evolving needs of today’s connected homes.” Halo Select redefines smart lock excellence by combining thoughtful design with trusted security and technology. Its bright, user-friendly touchscreen features dedicated keypad indicators, ensuring user interactions are seamless and intuitive. Halo Select features Halo Select features Kwikset’s quiet and powerful motor for a swift locking and unlocking experience The lock’s subtle and easy-to-install door status sensor confirms the door is properly closed and has not been left ajar, while instant notifications alert users to any potential security issues such as invalid code attempts or lock tampering. Halo Select features Kwikset’s new quiet and powerful motor for a swift locking and unlocking experience. Plus, Halo Select is third-party tested to meet the highest BHMA Grade AAA standards and UL 20-minute fire rating for added peace of mind. Halo Select's DIY installation Halo Select's DIY installation is simple, requiring only a screwdriver, while the interactive in-app guide streamlines the process and provides clear hardware installation steps. No hardwiring required, the lock is powered by four alkaline AA batteries or a rechargeable lithium-ion battery pack (sold separately) for better sustainability and convenience. With more than 75 years of experience, Kwikset makes life easier and remains a trusted name in home security. Kwikset will also launch an NFC tap-to-unlock variant, Halo Select+, in early 2025, providing even more flexibility for homeowners. Kwikset’s Halo Select will retail for USD 279, is shipping to retailers starting next week, and is expected to be in-stock both online and in stores by mid-November.
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, unveils its most comprehensive selection of Panoramic Turret Cameras, including 4 MP, 6 MP, and 8 MP ColorVu models, now available with limited-time pricing through December 31, 2024. These advanced cameras deliver 24/7 full-colour video, offering unmatched coverage and flexibility for a wide range of industries, from retail and education to commercial and public spaces. Hikvision’s ColorVu cameras “Hikvision’s ColorVu panoramic turret cameras provide the widest selection for any surveillance need, offering high performance, clarity, and cost-effectiveness," said John Xiao, Vice President of Marketing at Hikvision USA. "With our extensive lineup, we have the right solution for every application. And with the added benefit of limited-time sale pricing, now is the perfect opportunity to upgrade your security infrastructure." Hikvision’s fusion technology Hikvision's panoramic turret cameras are available in multiple resolutions and form factors Hikvision's panoramic turret cameras are available in multiple resolutions and form factors, including 4 MP, 6 MP, and 8 MP models, with the 8 MP versions also offering a sleek black housing option. Featuring Hikvision’s pioneering image fusion technology, these cameras blend multiple images to ensure comprehensive coverage in any environment. List of Hikvision’s Panoramic Turret Cameras The full list of Hikvision’s Panoramic Turret Cameras includes eight models: DS-2CD2346G2P-LSU/SL – 4 MP Panoramic AcuSense Fixed Turret Network Camera (The only panoramic IP camera without ColorVu) DS-2CD2347G2P-LSU/SL – 4 MP Panoramic ColorVu Fixed Turret Network Camera DS-2CD2367G2P-LSU/SL 2.8mm – 6 MP Panoramic ColorVu Fixed Turret Network Camera DS-2CD2387G2P-LSU/SL 2.8mm – 8 MP Panoramic ColorVu Fixed Turret Network Camera DS-2CD2387G2P-LSU/SL 4mm Black – 8 MP Panoramic ColorVu Fixed Turret Network Camera (Stealth black housing) DS-2CD2T67G2P-LSU/SL 2.8mm – 6 MP Panoramic ColorVu Fixed Bullet Network Camera DS-2CD2T87G2P-LSU/SL 2.8mm – 8 MP Panoramic ColorVu Fixed Bullet Network Camera DS-2CD2T87G2P-LSU/SL 4mm Black – 8 MP Panoramic ColorVu Fixed Bullet Network Camera (Stealth black housing) For more information about Hikvision’s Panoramic Turret Camera offerings and special pricing available through December 31, 2024.
CIE Group, a security solutions distributor, is pleased to announce a strategic partnership with Quanika, a pioneer in innovative unified building management systems. This collaboration unites CIE’s distribution strength with Quanika’s technological expertise to deliver comprehensive, cost-effective solutions that meet the evolving needs of organisations across all commercial sectors. Unified building management system Quanika is a unified building management system that offers powerful, scalable solutions for businesses of all sizes. Traditionally, enterprise-level features such as robust video surveillance and access control have been reserved for large organisations with significant budgets. However, Quanika’s range of scalable building management platforms breaks down these barriers by providing affordable, yet advanced technology that allows for ‘single pane of glass’ user interfaces that monitor and control multiple third-party security and facilities platforms all in one place. Seamless integration “This partnership marks a significant milestone for both CIE Group and Quanika,” says Chris Edwards, Marketing Director at CIE-Group. “By combining our strengths, we can offer a comprehensive suite of building management solutions that cater to the diverse needs of various markets." "Quanika’s open architecture and compatibility with industry-leading hardware and software ensure seamless integration with existing systems to minimise disruption and maximising return on investment.” Open architecture software Quanika ensures easy deployment and cost-effective scaling as business needs evolve Quanika’s open architecture software seamlessly integrates enterprise-level access control with powerful video surveillance, offering unparalleled flexibility and customisation. Compatible with industry-pioneering security and building facilities hardware and software, Quanika ensures easy deployment and cost-effective scaling as business needs evolve. Centralised management For small businesses, Quanika Compact boosts efficiency and security by providing centralised management of events, alarms, and access control. With features such as visual verification, automated visitor management, and detailed activity audit trails, businesses can operate with greater confidence and responsiveness. Flexible entry-level solutions Unlike traditional integrated systems designed for large-scale applications, Quanika offers flexible entry-level solutions starting with just three-door and camera connections. This scalable approach ensures businesses only pay for what they need. In addition, Quanika empowers mid-sized businesses to enhance efficiency and control across entire facilities. By integrating security and building management systems, organisations gain a comprehensive overview of operations through video surveillance, intrusion detection, fire alarms, and more. Saves time and money High-performance controllers with advanced processing and storage capabilities ensure fast, stable operation Quanika’s open IP architecture saves time and money by allowing businesses to choose the right equipment for their specific needs. High-performance controllers with advanced processing and storage capabilities ensure fast, stable operation and robust security. The solution caters to a wide range of industries, offering tailored solutions to meet specific requirements. From healthcare and retail to multi-tenanted buildings, hotels, transportation, logistics, and commercial offices, Quanika delivers efficient and secure operations. Key benefits Scalability to accommodate businesses of all sizes. Affordable enterprise-level features. Seamless integration with industry-pioneering hardware and software. Enhanced security through robust video surveillance and access control. Improved efficiency through streamlined operations and centralised management. Security, efficiency, and control By combining advanced technology with affordability and scalability, Quanika is empowering businesses to achieve new levels of security, efficiency, and control. The strategic alliance between CIE Group and Quanika is a testament to each company’s commitment to delivering exceptional value for customers, and combining expertise helps organisations transform the way they manage their facilities.
Advantech, a pioneer in AIoT, announces that it has finalised its acquisition on block shares of AURES Technologies SA, a French company renowned for its POS and Kiosk brands. On October 1st, 2024, Advantech has closed block trade of 1,430,381 shares from the major AURES shareholder and subscribed the first tranche of convertible bonds of EUR 2,500,000 of principal amount. Following this acquisition, AURES will operate under the new brand name “ADVANTECH-AURES”, reflecting the collaboration between the two companies. The new brand will honor the spirit and value proposition of AURES while being empowered by Advantech, and will debut on the market with a clear mission to provide value-driven products and services. Rapidly changing markets The goal of ADVANTECH-AURES is to initiate growth from the retail and hospitality sectors and expand its products and solutions into the broader intelligent city services market, with the vision of becoming a leading player in this field. The goal of ADVANTECH-AURES is to initiate growth from the retail and hospitality sectors MC Chiang, the newly appointed CEO of AURES and Vice President of Advantech Service-IoT Group, stated that this partnership enables both companies to leverage their combined expertise to enhance product offerings and expand into rapidly changing markets. AURES has a strong heritage of product innovation and leadership, with well-established brand and channel networks across Europe, Australia, and the US, complemented by service support through RTG in the US. Through this collaboration, ADVANTECH-AURES aims to deliver a broader range of product portfolios, focusing on quality, design, and integrated AIoT solutions. Creating high-quality products Reflecting the journey that began in October 2023 when AURES and Advantech first forged their partnership, Patrick Cathala, Founder and Chairman of AURES, said, ”For 35 years, we are proud of what our team has accomplished and AURES has been dedicated to creating high-quality products and serving our customers with passion. This collaboration is built on a foundation of meticulous planning and a shared vision for future growth. With the Advantech-Aures partnership, we are entering an exciting new phase alongside Advantech. Together, we are stronger.” The completion of block trade on October 1st, would result in the mandatory filing by Advantech of a tender offer with the French Autorité des marchés financiers (the “AMF”) on all the outstanding shares of AURES not held by Advantech, with the exception of treasury shares, on the same financial terms as the Share Acquisition, i.e. at a price of EUR 6.31 per share.
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behaviour. Vacant retail space The total number of void private-sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with implementation of secure range key safes and lockboxes. The primary concern in such an approach is security. Even though property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivalled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as a proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
IDEMIA Public Security North America, the premium provider of convenient and trusted biometric-based solutions, has announced the launch of the Iowa mobile ID to Samsung Wallet, in collaboration with the Iowa Department of Transportation (Iowa DOT) and Samsung. Iowa residents can now securely store their mobile ID in their Samsung Wallet and start using it to easily assert their identity from their mobile phone at TSA checkpoints at the Des Moines and Eastern Iowa airports, as well as 25 other participating airports in the country and other participating businesses. Free Iowa Mobile ID app Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone The launch of Iowa mobile ID in the Samsung Wallet brings elevated convenience and security for Iowans with Samsung smartphones for airport security screening, age-restricted products, and other identity checks. Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone near the mobile ID reader or having the mobile ID reader scan the QR code. Iowans can also continue to access their mobile ID through the free Iowa Mobile ID app, which IDEMIA built and rolled out for Iowa in October 2023. "We are pleased to add the Iowa mobile ID in the Samsung Wallet to the list of acceptable IDs at our security checkpoints. Travellers who want to take advantage of this new capability will find that their Iowa mobile ID is a convenient option when going through the security process. TSA will continue to embrace technology that improves security effectiveness while streamlining the passenger experience at airports," John Bright, TSA Iowa Federal Security Director. Partnership with Samsung "We are proud to expand our partnership with Samsung and the Iowa Department of Transportation (Iowa DOT) to bring mobile driver’s licences and state IDs to Samsung Wallet in Iowa and help accelerate the adoption of mobile ID in the state." Mobile IDs are authenticated and issued by state DMVs or MVDs" "As a convenient and highly secure way to store state-issued IDs and drivers licenses, mobile IDs are authenticated and issued by state DMVs or MVDs and ensure personal information is securely stored on the user’s device, with only the user having control over what personal information is shared," Donnie Scott, CEO of IDEMIA Public Security North America. Long-standing partnership As a pioneer in identity solutions and credentials issuance with a long-standing partnership with government agencies and a commitment to privacy by design, end-to-end security and interoperability, the Iowa DOT partnered with IDEMIA to launch mobile ID in Iowa in October 2023. Later that year, in December 2023, Samsung collaborated with IDEMIA, alongside the Arizona Department of Transportation Motor Vehicle Division (AZ MVD), to roll out mobile ID to the Samsung Wallet in Arizona.
Geekplus, the global pioneer in mobile robot and smart logistics solutions, has deployed the first Shelf-to-Person PopPick project in the Nordics for one of the biggest online pharmacy wholesalers in the region, Med24.dk. System Teknik partnered on the Denmark project, which includes three PopPick stations and 30 Shelf-to-Person robots, bringing a flexible solution to a region where fixed automation still dominates. "With the rise of e-commerce, Med24.dk had been struggling with huge sales growth coupled with fast delivery demands from customers in Denmark, Norway, Sweden searching for pharmacy, health and beauty products. Peak season events had also caused considerable strain to their operations," said Blond Shkodrani, channel partner manager for the Nordics at Geekplus. "Due to their overwhelming success, Med24.dk needed a modular, automated order fulfilment solution for fast, efficient order fulfilment." Order fulfilment challenges Shelf-to-Person takes goods of all sizes while removing the need for infrastructure investment The Geekplus modular Shelf-to-Person solution optimises warehouse operations using mobile robots to transport shelves. In a region where fixed and cubic solutions have been the trend during recent years, Shelf-to-Person handles goods of all sizes while removing the need for infrastructure investment, making it the most flexible response to order fulfilment challenges. PopPick workstations use two retrieval arms and four presentation locations to present pickers with multiple, moveable 78-tote racks at one time, resulting in an industry-pioneering throughput of 450 totes per hour. PopPick can store goods of all types and sizes; the solution is not limited to small pieces and improves ergonomics for workers while picking. It also takes up less space than traditional systems, so customers can use more stations without adding facility space. Mobile order fulfilment solutions "We are very pleased to invest in flooring robots from Geekplus," said Med24.dk CEO Nils Træholt. "We believe that this new and innovative technology can help us realise our growth ambitions, while maintaining good delivery times for the benefit of our customers." Morten Kirch, System Teknik's CSO, added: "Due to Med24.dk's growth, we are thrilled to be able to deliver a tailor-made, automated solution that matches their needs." Geekplus offers a suite of Goods-to-Person mobile order fulfilment solutions-the only comprehensive robotic offering controlled by a single software platform. "Through trusted partners like System Teknik, we're showing customers all over Europe that Geekplus truly is a one-stop shop for modular warehouse automation," Shkodrani said.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the Yorkdale Shopping Centre in Toronto, Canada, has unified its security operations based on Genetec™ Security Centre, Sipelia™, AutoVu™, and Mission Control™. With the Genetec platform, the security team at Yorkdale has been able to enhance operational efficiency, better collaborate with local police, and take a more proactive security stance. Yorkdale Shopping Centre With over two million square feet of retail space and 270 stores, Yorkdale Shopping Centre offers the country’s largest collection of designer labels and luxury brands. Managed by Oxford Properties Group, it goes beyond shopping, offering visitors valet services, a museum-quality art collection, and 24/7 on-site security. Breaking out of proprietary system limitations Additionally, having a closed security solution held them back from exploring new technologies With their proprietary video system and standalone access control solution, searching for information required the security operations team to navigate between the two systems, which slowed investigations and incident response. Additionally, having a closed security solution held them back from exploring new technologies such as cutting-edge cameras or system integrations. Genetec™ Security Centre and Omnicast™ The search for a new video management system (VMS) led them to Genetec™ Security Centre and Omnicast™, which not only provided state-of-the-art video management, but unified video, access control, and data from other sensors into one system. The Genetec solutions enhanced the team's ability to manage security policies, monitor events, and run investigations. Since it is an open platform, Yorkdale can expand the system with new technology as it emerges. A comprehensive view of mall security With Security Centre, we’re shaving valuable time from investigations and response" Since implementing the Security Centre, the Yorkdale team has been able to significantly enhance operational efficiencies. If an incident is underway, operators can see what’s happening and act fast from one unified view. “With Security Centre, we’re shaving valuable time from investigations and response," said Luca Aiello, Security Manager at Oxford Properties. Enhanced guest experience “Our security operators can identify potential risks, retrieve critical information, and deploy on-foot officers faster within the shopping centre." "Overall, we’ve become far more proactive and efficient in handling anything that comes up. That ensures we keep providing an exceptional guest experience.” Sipelia™ intercom module Sipelia allows them to initiate two-way conversations across 150 intercom stations Operators manage over 750 cameras, 500 access control readers, and 2000 cardholders using the Security Centre. They’ve also deployed the Sipelia™ intercom module. Sipelia allows them to initiate two-way conversations across 150 intercom stations located in parking garages, entrances, and other areas. AutoVu™ ALPR system The team also added the AutoVu™ automatic license plate recognition (ALPR) system, the Genetec Mission Control™ decision management system, and other technologies within the platform. All video, data, and calls come back into a state-of-the-art command centre, where security operators keep the shopping centre running smoothly. Security managers can also use the Genetec Mobile app on their phones to check in on situations from anywhere in the mall. Operational efficiencies, enhancing public safety To streamline incident response, the Yorkdale team implemented Genetec Mission Control™ Ensuring security operators can quickly respond and resolve the issues is critical to maintaining a five-star shopping experience. To empower their operators and streamline incident response, the Yorkdale team implemented Genetec Mission Control™. The collaborative decision management system helps operators better understand unfolding events and guides them through the best course of action according to SOPs. Proactive security approach Genetec AutoVu™ has been a key component in fostering a proactive security approach. With 52 AutoVu automatic license plate recognition (ALPR) cameras deployed, they’ve been able to extend security to their property’s perimeter, enhance vehicle-related investigations, and help serve the community. For example, if local police are searching for a vehicle of interest, Yorkdale can put that vehicle information into their AutoVu system, and if the vehicle comes onto their property, police are notified. Responsive to theft-related incidents As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent. Said Bob Vounotripidis, Senior Operations Manager at Yorkdale Shopping Centre, “Since implementing the AutoVu ALPR system, we’ve become significantly more responsive to theft-related incidents and investigations. Word has gotten out–Yorkdale is a property that takes security seriously, and the perpetrators will be caught.” Planning for future expansions The Yorkdale team is looking ahead to other technologies that can expand their security approach and system, such as deploying body-wearable technology and integrating video from those devices into the unified platform. They are also exploring using Genetec Clearance™ digital evidence management system to streamline evidence sharing with law enforcement. Said Aiello, “More shopping centres should be using Genetec Security centre. This security platform not only helps our team operate more efficiently, but we’re also evolving our deployment using the best technologies out there.”
An IDIS end-to-end retail branch network solution has been adopted across all of Konyalı Saat’s 40 store locations in Türkiye as well as at the pioneering retailer’s warehouse and workshop where high-value watches are repaired, serviced, and calibrated. Konyalı Saat is one of Türkiye’s pioneering independent retail chains in the luxury watches and jewellery sector, with 40 stores selling a wide selection of top brand Swiss-made timepieces, silver and gold accessories with precious gems as well as a range of designer sunglasses. POS integration Systems integrator Secom specified the powerful yet affordable IDIS solution to meet Konyalı Saat’s wide-ranging surveillance and business intelligence needs. Konyali Saat must centralised video control with POS integration and to develop new efficiencies To ensure that all their retail outlets were being run as optimally and securely as possible, Konyali Saat required centralised video management with point-of-sale (POS) integration and to develop new efficiencies using AI-powered video analytics integrated with their wider retail enterprise resource planning (ERP) software. The aim was to boost profitability from strengthened loss prevention as well as improving product management and marketing operations from video data. IDIS AI Box for Retail (DV-1304) Complete HD coverage of each store, without blind spots, was efficiently achieved using a single, NDAA-compliant 12MP IDIS Super Fisheye Camera, plus either one or two 2MP IDIS 2.8 mm fixed lens dome cameras, depending on each store’s layout. The fisheye provides comprehensive domain awareness, providing the same coverage as three or more fixed lens cameras, while the domes located at entrances capture video to support people counting and other analysis functions. These AI capabilities are provided by an IDIS AI Box for Retail (DV-1304), a powerful plug-in video analytics device that can transform IDIS surveillance solutions with functions including people counting, queue management, heat & zone mapping and occupancy monitoring. IDIS DR-2508P NDAA-compliant NVR Footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR An IDIS DP-HE1201 HDMI/VGA Encoder enables simple and cost-effective POS integration, with cash register data overlaid on video footage and time synched with all cameras, allowing suspicious activity or sales anomalies to be investigated quickly and easily while providing a time-stamped visual audit trail. The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR, and the system is operated in each branch using the cost-free IDIS Centre VMS, as well as being controlled and managed centrally at Konyalı Saats’ headquarters with IDIS Solution Suite (ISS) Expert. IDIS end-to-end solution The IDIS end-to-end solution is allowing Konyalı Saat to analyse sales turnover and conversion rates with visitor numbers by day, month, and week, making it possible to increase boost sales by accurately evaluating store performance including marketing campaigns, product management and staff efficiency more accurately than ever before. IDIS technology is perfectly suited to the demands of high-end retail environments" Yunus Bürge, Information Technology Manager for Konyalı Saat, reports, “We have been deeply impressed with every aspect of the IDIS solution, from the quality and performance of the fisheye cameras to the added value provided by the AI Retail Box including simple integration of video data with our POS. IDIS technology is perfectly suited to the demands of high-end retail environments.” IDIS single source model The chain has recently extended its portfolio with Longines-branded stores, and the owner has ambitious plans to expand further, with four new outlets scheduled to be opened in the next half year and more to follow. Koray Ozyildirim, IDIS Türkiye Country Manager, added, “The project with Konyalı Saat demonstrates IDIS end-to-end solutions for retail can be tailored to meet the needs of stores and retail branch networks of any type and scale. The IDIS single source model gives retailers a choice of cost-effective surveillance technology to tackle challenges such as shrink and safety. Combined with integration options and highly accurate, AI-powered video analytics, we are giving retailers the ability to achieve a rapid return on investment and an enhanced customer experience that positively impacts the bottom line.”
Round table discussion
Cloud implementations enable organisations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in the world. But on-premise video management systems (VMSs) still have a role to play, don’t they? We asked this week’s Expert Panel Roundtable: What is the continuing role of video management systems (VMS), given the growth in Video Surveillance as a Service (VSaaS)?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
How video technology is transforming loss prevention, operations, and customer experience in the retail sector
DownloadDelivering smart, secure and healthy retail environments with the cloud
DownloadThe healthy market for video surveillance at medical facilities
DownloadHow to catch shoplifters with thermal imaging
DownloadVideos
Shop security systems: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download