Store security
3DX-Ray has sold two AXIS-CXi, cabinet-based x-ray systems to secure high-threat sites in Rome, Italy. AXIS-CXi was originally designed to bring the same colour-differentiating image technology used in airport baggage screening, to the mail room environment. AXIS-CXi quickly showed its potential in a whole variety of security scenarios, from embassy lobbies to the homes of high-net-worth individuals. AXIS-CXi differentiated scans Grey scale is used for the recognition of shapes and the f...
Robotic Assistance Devices Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., has secured the deployment of two ROSA-P 360 devices through a proactive engagement with a prominent municipal Business Improvement District. The units are being deployed to enhance safety and visibility across key public spaces managed by the local community improvement organisation. This strategic placement reflects RAD’s growing influence in urban safety initia...
Hailo, the pioneering provider of edge AI processors, will demonstrate smart security cameras empowered by its vision processing units (VPUs) as well as video management systems empowered by its AI accelerators at ISC West 2025 in Las Vegas, Nevada at booth #31065 of the Venetian Expo. At the heart of Hailo’s showcase is its full suite of AI processors, including the Hailo-15 vision processors, which integrate seamlessly into pioneering security cameras to deliver superior image quality a...
iDenfy, a globally recognised pioneer in regulatory technology specialising in identity verification (KYC), anti-money laundering (AML), and business verification (KYB), introduced its new KYC solution for Shopify merchants. The new app is listed on Shopify as a user-friendly, no-code solution for Shopify users who don’t want to build an ID verification solution from scratch. Automated verification system iDenfy’s integration provides online businesses with an automated verificati...
As Taiwan's security industry continues to evolve with technological advancements and increased diversification, various vertical markets are poised for significant growth. Secutech, scheduled for 7–9 May 2025 at the Taipei Nangang Exhibition Centre, aims to capitalise on this burgeoning demand. Around 400 international and local exhibitors are set to showcase the latest technologies and solutions across six zones and pavilions at the fair, which serves as a vital platform to connect secu...
ISC West 2025, organised by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. ISC West innovations and ideas “ISC Wes...
News
Corsha, the pioneer in securing machine-to-machine (M2M) traffic for operational systems and critical infrastructure. Has announced an $18 million Series A-1 funding round led by SineWave Ventures, with participation from Razor’s Edge Ventures and Ten Eleven Ventures. Automated Trust Chains Machine identities currently outnumber human identities by a ratio of 50:1 Machine identities currently outnumber human identities by a ratio of 50:1 and are poised to accelerate further with increases in automation and the emergence of agentic AI. Organisations require a machine identity provider to authenticate, manage, and govern the rapidly growing traffic between machines. Due to legacy systems connecting with modern cloud-native systems, M2M communication can be particularly risky in operational technology (OT) and critical infrastructure environments. Imagine the challenges of securely connecting AI/ML models in the cloud to robotic controllers or manufacturing pipelines on a shop floor. Machine identity security To address this growing challenge, Corsha syncs with traditional IdPs like EntraID, Amazon IAM, and keycloak, builds and manages dynamic machine identities, and brings MFA to machines, securing and auditing M2M connections across OT and cloud environments. Through Corsha’s Machine Identity Provider, the company ensures that all machine-to-machine communication anywhere across an organisation is secure and can be trusted. Securing operational infrastructure “There’s such a huge modernisation opportunity in connecting operational systems and critical infrastructure yet without a strong identity solution, the risk is too high,” said Anusha Iyer, Founder and CEO of Corsha. “That is why we are so committed to our vision to securely connect the operational systems that run our world, delivering the first IdP focused on machines. Today’s significant investment from SineWave, Razor’s Edge, and Ten Eleven Ventures represents a strong vote of confidence in the Corsha team and platform and a strong belief in the value we deliver for our customers.” “Corsha has already proven we can support some of the most challenging technology stacks in the U.S. public sector — including for the U.S. Air Force — and we are thrilled to use this funding to bring our platform to more organisations globally.” Machine-first security “As machines begin to outnumber humans as actors on operational networks and the cloud, Corsha's ability to securely identify these non-human actors and control their access to systems and data enables exciting new ways to securely get things done,” said Pat Muio, Partner at Sinewave Ventures. “It is a solution that is urgently needed.” Go-to-market expansion Corsha plans to use the funding for a variety of objectives, including: Expanding the company’s Go-to-Market team to help more customers in the operational systems, critical infrastructure, and manufacturing sectors Launching Corsha Labs, a physical and digital research space to showcase Corsha’s “shop floor to cloud” expertise and take the platform to the next level Scaling the use of AI/ML in the Corsha “m-IdP” to expand our agentless behavioral identities as well as adaptive identity and access management (IAM) for M2M communication Momentum milestones The funding builds upon Corsha’s already robust momentum, including: 100% YoY ARR by growth An authorisation to operate with the U.S. Government in critical manufacturing environments The addition of Jeff Hudson, CEO Emeritus of Venafi - a CyberArk company, to Corsha’s Board of Directors
The future of security requires smarter, more efficient and secure solutions, and Hanwha Vision is helping to drive this transformation with the launch of its most advanced AI-powered System on a Chip (SoC), Wisenet 9. After nearly four years of extensive research and testing, Wisenet 9’s advanced features help elevate our cameras into an AI-driven era, setting a new standard for performance, accuracy, and security. Unmatched clarity “With Wisenet 9, you can count on the superior image quality that delivers the best possible video in the toughest environments, as well as the accuracy of the AI-generated data, whether statistical or event-driven,” states John Lutz Boorman, Head of Product and Marketing at Hanwha Vision Europe. AI revolution at the Edge Wisenet 9’s enhanced edge AI capabilities are essential in this innovation era, where the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving this transformation is the two Neural Processing Units (NPUs), which have improved inference performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, preventing one function from impacting the performance of the other. Unveiling hidden details Wisenet 9 uses AI to analyse visual data with greater precision. By leveraging a powerful NPU, the system moves past traditional image processing to extract critical information, unlocking previously unseen details with remarkable clarity in tough environments. This enhanced visual intelligence is achieved through a suite of sophisticated AI features, including AI-based extreme Wide Dynamic Range, AI-powered noise reduction, alongside image enhancements. Combined, these technologies deliver exceptional clarity, even under the most challenging conditions. The AI-driven image enhancement, powered by an independent NPU, ensures that every detail, no matter how subtle, is captured and analysed. AI efficiency redefined The H.265 codec provides high video quality with optimised bandwidth AI is powerful, but it can also be resource-intensive. Wisenet 9 flips that script. It’s not just smart, it’s efficient - optimising every aspect of its operation.By intelligently reducing noise, Wisenet 9 achieves a remarkable level of efficiency in data volume reduction, resulting in significantly reduced bandwidth consumption and storage requirements. This core efficiency is further bolstered by the latest H.265 compression technology. The H.265 codec provides high video quality with optimised bandwidth, ensuring reliable, real-time video processing and transmission - critical for uninterrupted 24/7 security. Furthermore, this optimised H.265 support enables consistently high performance in demanding environments, essential for system stability, and streamlines data management in cloud environments, efficiently controlling storage and transfer costs. Seamless integration Wisenet 9’s H.265 codec, aligned with current industry standards and ONVIF profiles, ensures broad hardware compatibility and seamless integration with your existing security infrastructure and provides a dependable foundation for long-term system reliability. Beyond this, Wisenet 9 leverages AI for advanced analytics. Its enhanced AI technology provides detailed attribute analysis, including colour, bag, face mask, glasses, age, and gender, along with other key analytics like people and vehicle counting, slip and fall detection, crowd detection, heatmap, queue management, and more, enabling faster and more informed decision-making. Smart surveillance tech To further amplify its capabilities, Wisenet 9 incorporates several key technologies that power the next generation of efficiency, including: Re-Identification RE-ID technology is a deep learning-based approach to matching visual identities across non-overlapping camera views. RE-ID extracts feature vectors representing unique visual attributes, enabling video management systems to recognise and track individuals even with changes in appearance or conditions. For example, it can identify a person entering a building with an orange jacket and later recognise the same person leaving with the jacket unzipped and a hat, across different cameras. Dynamic Privacy Masking This AI-based feature efficiently safeguards biometric personal data, ensuring compliance with privacy regulations. Wisenet 9 offers flexible masking options, including both opaque and mosaic masking, allowing users to tailor privacy protection to their specific needs and preferences. Widening horizons with expandable AI Wisenet 9 has been engineered with unparalleled AI capabilities to recognise security demands Recognising that security demands are as diverse as the industries they serve, Wisenet 9 has been engineered with unparalleled AI capabilities. This empowers users to tailor their security systems. § AI Packs: Wisenet 9 is compatible with AI Packs (Traffic, Retail, Factory), designed to deliver actionable insights specific to various sectors. AI Sound Classification AI-based sound classification enables rapid detection and directional awareness of critical events like gunshots, glass breaks, and screaming, to enhance situational awareness. Hanwha vision open platform Wisenet 9 empowers users to create customised security solutions by providing the flexibility to tailor their systems with custom applications for video analytics, storage, and other functionalities. Improved end-to-end protection Wisenet 9 significantly enhances end-to-end protection by building upon the robust security foundation of Wisenet 7. It inherits essential features like Secure Storage, OS, and Boot, which protect critical chipset data and prevent unauthorised software execution. Moreover, the inclusion of a FIPS 140-3 Level 3 elevates security to an exceptional standard. This certification guarantees that the chipset adheres to rigorous security protocols, assuring users of comprehensive data protection.
Omada by TP-Link and VIGI by TP-Link, TP-Link Systems Inc.’s exclusive business solutions brands, are set to make waves at ISC West 2025 with the debut of their groundbreaking unified networking and surveillance solutions. At the event, the brands will showcase a seamless integration of VIGI’s cutting-edge surveillance solutions, Omada’s comprehensive networking systems, and the Omada Central platform—a revolutionary cloud-based solution that unifies the management of networking and surveillance under one roof. Secure & scalable Focused exclusively on the B2B market, Omada and VIGI deliver reliable, secure, and intuitive networking and surveillance products tailored to the unique needs of SMBs and enterprises. Designed to address diverse scenarios—including retail, hospitality, offices, MDUs, and outdoor environments—Omada and VIGI empower businesses to enhance security, streamline operations, and drive efficiency. Unified networking and surveillance solutions Integrating networking and surveillance into a single platform, TP-Link eliminates the system managment complecity By integrating networking and surveillance into a single platform, TP-Link eliminates the complexity of managing multiple systems. This unified approach enables unified management; easy deployment and setup; and remote troubleshooting, reducing operational overhead while enhancing efficiency, scalability, and security for businesses across industries. Omada Central is the cornerstone of TP-Link’s unified approach, offering a single platform to manage both Omada networking devices and VIGI surveillance systems. This next-generation solution enables businesses to seamlessly manage gateways, switches, access points, and security surveillance equipment across multiple locations. Simplified Management It simplifies setup with intelligent device recognition, auto surveillance VLAN, and Zero-Touch Provisioning while reducing total cost of ownership with a single-vendor solution. The platform also offers a free version, Omada Central Essentials, making it accessible for businesses of all sizes. VIGI: professional surveillance solutions VIGI provides professional, reliable, and comprehensive surveillance solutions tailored for businesses. Offering a diverse product range—including bullet, turret, dome, and fisheye cameras, 4/8/16/32/64-channel NVRs, 90W/180W solar power systems, cloud and local VMS, and user-friendly apps—VIGI ensures robust security while enhancing operational efficiency and profitability. VIGI offers a comprehensive range of durable cameras designed to deliver guaranteed high-quality images. The product lineup includes: 180° Panoramic 4K Cameras with Red-Blue Warning Lights Dual-Lens Stitching 4K Cameras 4G Outdoor Cameras with 3 LAN Ports AI ISP-Powered ColorPro 2.0 Cameras 5X Optical Zoom Cameras Complementing these cameras are 64-Channel H.265+ NVRs featuring 4 SATAs with a up to 64TB storage capability and 320Mbps incoming/outgoing bandwidth. Additionally, VIGI’s easy-to-install and stable solar power solution ensures long standby performance, making it ideal for off-grid locations. VIGI CVM System VIGI’s Cloud Video Management System (VMS) provides free, centralised management for multiple sites, leveraging AWS-based reliability and zero-touch maintenance to reduce on-site troubleshooting costs and ensure seamless surveillance. Complementing this is VIGI’s NPU-powered AI technology, offering advanced detection and analysis capabilities such as Behavior and Object Detection; People and Vehicle Attributes Analysis; and Precise People Counting. Together, these innovations deliver smarter, more efficient security solutions that enhance operational efficiency and drive business success. Omada: Comprehensive Networking Solutions Omada delivers a complete set of SDN solutions, designed to meet the needs of businesses With a full portfolio that includes access points, gateways, hardware controllers, cloud controllers, and a diverse range of switches, Omada provides end-to-end networking solutions tailored for scalability, performance, and ease of management. Omada’s full lineup of Wi-Fi 7 access points redefine wireless connectivity, offering unparalleled speed and reliability for both indoor and outdoor environments. Complementing these are Outdoor 4G Wi-Fi Gateways and connectivity solutions, such as the Outdoor PoE Switch and Wireless Long-Range PtMP/PtP Bridge, which ensure reliable networking even in remote or challenging locations. The switch portfolio spans from unmanaged switches for plug-and-play simplicity to easy-managed switches and advanced L3/L2 + switches, catering to businesses of all sizes and complexities. Effortless surveillance connectivity The Agile Series of Easy Managed PoE Switches with Free Cloud, designed specifically for surveillance systems. Paired with Omada Central Essentials for free cloud access, the Agile Series features Auto IP Camera/NVR Recognition, Extend Mode for PoE up to 250m, enhanced PoE Auto Recovery, and Remote Troubleshooting Tools with Cable Test, Reboot PoE Port Management, and SSH to minimise downtime, making it an ideal choice for businesses seeking efficient and scalable networking solutions tailored to surveillance needs. Seamless connectivity Omada & VIGI unified networking and surveillance solutions are tailored to meet the needs of diverse industries, including retail, hospitality, offices, residential, and outdoor environments. By combining Omada’s networking expertise, VIGI’s surveillance solutions, and the Omada Central platform, TP-Link delivers agile, secure, and scalable ecosystems that simplify infrastructure and enhance operational efficiency across the board.
Colt Technology Services expanded its product portfolio with the launch of a new Managed Local Area Network (LAN) solution, available now across Colt’s 40+ countries. Ideal for businesses looking for enhanced performance, security, and cost efficiency benefits of a Local Area Network without the complexity and expense of managing it themselves, Colt’s new Managed LAN solution combines powerful digital infrastructure with an effortless service experience. Real-time data sharing Organisations are increasingly using Local Area Networks for fast, efficient and secure real-time data Organisations are increasingly selecting Local Area Networks for fast, efficient and secure real-time data sharing between devices within office buildings, local government or manufacturing sites, hospitals, retail stores and production facilities. This comes as more businesses explore AI-generating and processing higher volumes of data traffic and seek new ways to protect their organisations from sophisticated security threats. Colt’s Managed LAN solution Colt’s Managed LAN solution can quickly, easily and securely connect to a company’s cloud or on-premise network environment via networking services such as Colt’s SD WAN (Software Defined Wide Area Network) solution, providing businesses with a high-performing, secure, interconnected digital infrastructure – particularly valuable for organisations streamlining real estate, integrating newly-acquired sites through M&A or expanding into new premises as they grow organically. Benefits from Colt’s Managed LAN Businesses choosing Colt’s Managed LAN benefit from: Proactive network monitoring by an expert team using best-in-class software platforms, ensuring high performance and reliability without the hassle or investment of managing this directly Improved data security and network security, with Colt’s robust security standards, tools, and practices, including Colt’s Corporate Binding Rules Fast delivery times Better resource allocation, as IT teams are freed from day-to-day network management to focus on delivering business transformation goals Transparent and reduced operating costs and improved power consumption, as businesses only pay for and use power for the services they need Futureproofed technology as Colt invests in the latest energy-saving network technology trends, so their network is current, efficient, and supports their sustainability goals The peace-of-mind that comes from being a part of Colt’s industry-pioneering, proactive, and supportive customer experience New managed LAN service Tyler Hemmen, VP – Enterprise products and solutions, Colt Technology Services, said, "Organisations are reimagining their workspaces to meet changing consumer and employee needs. Connecting these spaces with powerful, secure digital infrastructure is critical, but it’s easy for businesses to lose their way as they try to link this intricate maze of different networks across different sites." Tyler Hemmen adds, "Our new managed LAN service removes this effort and complexity, delivering flexible, secure, optimised local area networks which can seamlessly interconnect to build intelligent, AI-ready architecture."
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., announced the expansion of its popular RIO™ solar-powered, mobile security solution lineup. Named RIO Mini, the new security solution is now in production, with the Company forecasting that it can add up to 500 units to its sales expectations this fiscal year. Mobile surveillance systems The Company joins LiveView Technologies Inc., which raised $50 million in a Series B round in 2022, in finding success and growth in this rapidly expanding market. LiveView Technologies has demonstrated strong demand for solar-powered mobile surveillance systems, validating the market opportunity that RAD is now addressing with RIO Mini. RAD’s award-winning ROSA™ device RIO Mini surpasses other affordable mobile security solutions in performance and value Utilising a dual configuration of RAD’s award-winning ROSA™ device, RIO Mini surpasses other affordable mobile security solutions in performance and value. ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics ROSA’s AI-driven security analytics include human and vehicle detection, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication is optimised for cellular, including live video from ROSA’s high-resolution, full-color, always-on cameras. RAD has published six Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at retail centres, hospital campuses, multi-family communities, car rental locations and construction sites across the country. RAD’s existing RIO lineup RIO Mini joins RAD’s existing RIO lineup, which includes the popular RIO 180 and RIO 360 units RIO Mini joins RAD’s existing RIO lineup, which includes the popular RIO 180 and RIO 360 units, further filling in the product family. RIO Mini is expected to achieve greater profitability than the primary RIO lineup while being substantially less expensive for clients. It will feature reduced analytics processing and limitations on other select features while maintaining RAD’s core Autonomous Intelligent Response capabilities. The device is enabled by a lower-cost modified version of RAD G’s RADPack, providing consistent performance in a compact and economical format. Development by AITX’s various subsidiaries Steve Reinharz, CEO/CTO of AITX and RAD, commented, “We are starting to see the benefits after years of hardware and software development by AITX’s various subsidiaries. Utilising internally developed analytics and electronics hardware and benefiting from our complete control of the supply chain, we are well-positioned to compete aggressively in the mobile surveillance unit marketplace." "This new solution will enable dealers and our internal sales team to expand their target markets to include clients that want the basics of intelligent autonomous response.” How RIO Mini’s streamlined design and accessible pricing The response from RAD’s channel partners, existing clients, and new prospects was positive As with all RAD security solutions, RIO Mini is supported by SARA™, the Company’s multiple award-winning AI-based software platform. SARA (Speaking Autonomous Responsive Agent) provides real-time responsiveness, centralised device management, and seamless integration across RAD’s ecosystem of autonomous security technologies. RIO Mini was introduced to the public last week during ISC West in Las Vegas, the security industry’s largest and most influential trade show. The response from RAD’s channel partners, existing clients, and new prospects was overwhelmingly positive. Many attendees expressed interest in how RIO Mini’s streamlined design and accessible pricing could open new markets and use cases that complement the existing RIO offerings. Introduction of RIO Mini With the introduction of RIO Mini, RAD is positioned to reach a broader segment of the market, including clients who may have previously hesitated to adopt advanced security solutions due to budget limitations. This addition to the product lineup reflects the Company’s ongoing focus on addressing evolving market demands with practical, high-performance offerings. RAD’s reputation for innovation RIO Mini reinforces RAD’s reputation for innovation and dependability while making intelligent autonomous response more accessible across a wider range of use cases. RIO Mini’s aggressive pricing has not been publicly disclosed. Interested dealers, clients, and prospects are encouraged to contact RAD directly for additional details and availability.
DeterTech, a pioneer in intruder detection and identification, is proud to announce the immediate availability of SmartSpray® for rental or purchase. It is considered a game-changer in tackling retail crime as it enables police to forensically link masked offenders back to the scene of their crime, even weeks after they’ve left the store. Effective CCTV storage Retail crime is at its highest level on record, with over 2,000 incidents of violence and abuse per day Retail crime is at its highest level on record, with over 2,000 incidents of violence and abuse per day, reported in the British Retail Consortium’s Annual Crime Survey. A key factor is perpetrators’ feeling emboldened that they can anonymously steal, assault and abuse staff, and escape before security or police can intervene. While in-store CCTV can be effective, it is easily defeated by the most organised and violent offenders who choose to obscure their faces. SmartSpray system The SmartSpray system can be deployed standalone or integrated with the existing security system. When triggered, it releases a precise spray of SmartWater®, a forensic liquid that contains a code unique to each specific store. This glows under UV light and remains on skin and clothing for weeks, allowing police to identify suspects and pursue convictions. DeterTech’s forensic scientists DeterTech’s forensic scientists supply analysis and testimony in support of a belief DeterTech’s forensic scientists provide analysis and testimony in support of a conviction to the police and courts free of charge. Furthermore, they need only a speck smaller than the full stop at the end of this sentence to conclusively link an individual back to the scene of their crime. SmartSpray installation and servicing SmartSpray is immediately available for rental or purchase on flexible terms, including installation and servicing. DeterTech has also committed to providing unlimited refills free of charge following any activation for which a crime reference number is supplied. It is hoped this will further incentivise retailers to report all incidents to the police so that the true scale of retail crime can be nationally recognised. Cutting-edge solutions DeterTech has also committed to providing total refills free of charge BT is one of the first retailers to have deployed SmartSpray in selected stores. Richie Iwanoff, Corporate Investigations Team Manager, BT, says: “The well-being of our staff and customers is our number one priority." "We’re proud to be using cutting-edge solutions to keep them safe at all times. I sleep easier knowing criminals will think twice before targeting us”. DeterTech with businesses and communities Gary Higgins, Director of Security and Risk, DeterTech, adds: “SmartSpray has been very well received by both retailers and the police who recognise it will deter offences and help put violent criminals behind bars. It supports our purpose here at DeterTech of working with businesses and communities every day to provide greater peace of mind.” Hazel Goss, Development Officer, Secured by Design, concludes, “This is exactly the kind of collaboration we want to see from retailers, security providers, and law enforcement. Enhancing the police’s chances of unmasking offenders is vital in combating retail crime, which is sadly soaring across the country.”
Corsha, the pioneer in securing machine-to-machine (M2M) traffic for operational systems and critical infrastructure. Has announced an $18 million Series A-1 funding round led by SineWave Ventures, with participation from Razor’s Edge Ventures and Ten Eleven Ventures. Automated Trust Chains Machine identities currently outnumber human identities by a ratio of 50:1 Machine identities currently outnumber human identities by a ratio of 50:1 and are poised to accelerate further with increases in automation and the emergence of agentic AI. Organisations require a machine identity provider to authenticate, manage, and govern the rapidly growing traffic between machines. Due to legacy systems connecting with modern cloud-native systems, M2M communication can be particularly risky in operational technology (OT) and critical infrastructure environments. Imagine the challenges of securely connecting AI/ML models in the cloud to robotic controllers or manufacturing pipelines on a shop floor. Machine identity security To address this growing challenge, Corsha syncs with traditional IdPs like EntraID, Amazon IAM, and keycloak, builds and manages dynamic machine identities, and brings MFA to machines, securing and auditing M2M connections across OT and cloud environments. Through Corsha’s Machine Identity Provider, the company ensures that all machine-to-machine communication anywhere across an organisation is secure and can be trusted. Securing operational infrastructure “There’s such a huge modernisation opportunity in connecting operational systems and critical infrastructure yet without a strong identity solution, the risk is too high,” said Anusha Iyer, Founder and CEO of Corsha. “That is why we are so committed to our vision to securely connect the operational systems that run our world, delivering the first IdP focused on machines. Today’s significant investment from SineWave, Razor’s Edge, and Ten Eleven Ventures represents a strong vote of confidence in the Corsha team and platform and a strong belief in the value we deliver for our customers.” “Corsha has already proven we can support some of the most challenging technology stacks in the U.S. public sector — including for the U.S. Air Force — and we are thrilled to use this funding to bring our platform to more organisations globally.” Machine-first security “As machines begin to outnumber humans as actors on operational networks and the cloud, Corsha's ability to securely identify these non-human actors and control their access to systems and data enables exciting new ways to securely get things done,” said Pat Muio, Partner at Sinewave Ventures. “It is a solution that is urgently needed.” Go-to-market expansion Corsha plans to use the funding for a variety of objectives, including: Expanding the company’s Go-to-Market team to help more customers in the operational systems, critical infrastructure, and manufacturing sectors Launching Corsha Labs, a physical and digital research space to showcase Corsha’s “shop floor to cloud” expertise and take the platform to the next level Scaling the use of AI/ML in the Corsha “m-IdP” to expand our agentless behavioral identities as well as adaptive identity and access management (IAM) for M2M communication Momentum milestones The funding builds upon Corsha’s already robust momentum, including: 100% YoY ARR by growth An authorisation to operate with the U.S. Government in critical manufacturing environments The addition of Jeff Hudson, CEO Emeritus of Venafi - a CyberArk company, to Corsha’s Board of Directors
The future of security requires smarter, more efficient and secure solutions, and Hanwha Vision is helping to drive this transformation with the launch of its most advanced AI-powered System on a Chip (SoC), Wisenet 9. After nearly four years of extensive research and testing, Wisenet 9’s advanced features help elevate our cameras into an AI-driven era, setting a new standard for performance, accuracy, and security. Unmatched clarity “With Wisenet 9, you can count on the superior image quality that delivers the best possible video in the toughest environments, as well as the accuracy of the AI-generated data, whether statistical or event-driven,” states John Lutz Boorman, Head of Product and Marketing at Hanwha Vision Europe. AI revolution at the Edge Wisenet 9’s enhanced edge AI capabilities are essential in this innovation era, where the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving this transformation is the two Neural Processing Units (NPUs), which have improved inference performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, preventing one function from impacting the performance of the other. Unveiling hidden details Wisenet 9 uses AI to analyse visual data with greater precision. By leveraging a powerful NPU, the system moves past traditional image processing to extract critical information, unlocking previously unseen details with remarkable clarity in tough environments. This enhanced visual intelligence is achieved through a suite of sophisticated AI features, including AI-based extreme Wide Dynamic Range, AI-powered noise reduction, alongside image enhancements. Combined, these technologies deliver exceptional clarity, even under the most challenging conditions. The AI-driven image enhancement, powered by an independent NPU, ensures that every detail, no matter how subtle, is captured and analysed. AI efficiency redefined The H.265 codec provides high video quality with optimised bandwidth AI is powerful, but it can also be resource-intensive. Wisenet 9 flips that script. It’s not just smart, it’s efficient - optimising every aspect of its operation.By intelligently reducing noise, Wisenet 9 achieves a remarkable level of efficiency in data volume reduction, resulting in significantly reduced bandwidth consumption and storage requirements. This core efficiency is further bolstered by the latest H.265 compression technology. The H.265 codec provides high video quality with optimised bandwidth, ensuring reliable, real-time video processing and transmission - critical for uninterrupted 24/7 security. Furthermore, this optimised H.265 support enables consistently high performance in demanding environments, essential for system stability, and streamlines data management in cloud environments, efficiently controlling storage and transfer costs. Seamless integration Wisenet 9’s H.265 codec, aligned with current industry standards and ONVIF profiles, ensures broad hardware compatibility and seamless integration with your existing security infrastructure and provides a dependable foundation for long-term system reliability. Beyond this, Wisenet 9 leverages AI for advanced analytics. Its enhanced AI technology provides detailed attribute analysis, including colour, bag, face mask, glasses, age, and gender, along with other key analytics like people and vehicle counting, slip and fall detection, crowd detection, heatmap, queue management, and more, enabling faster and more informed decision-making. Smart surveillance tech To further amplify its capabilities, Wisenet 9 incorporates several key technologies that power the next generation of efficiency, including: Re-Identification RE-ID technology is a deep learning-based approach to matching visual identities across non-overlapping camera views. RE-ID extracts feature vectors representing unique visual attributes, enabling video management systems to recognise and track individuals even with changes in appearance or conditions. For example, it can identify a person entering a building with an orange jacket and later recognise the same person leaving with the jacket unzipped and a hat, across different cameras. Dynamic Privacy Masking This AI-based feature efficiently safeguards biometric personal data, ensuring compliance with privacy regulations. Wisenet 9 offers flexible masking options, including both opaque and mosaic masking, allowing users to tailor privacy protection to their specific needs and preferences. Widening horizons with expandable AI Wisenet 9 has been engineered with unparalleled AI capabilities to recognise security demands Recognising that security demands are as diverse as the industries they serve, Wisenet 9 has been engineered with unparalleled AI capabilities. This empowers users to tailor their security systems. § AI Packs: Wisenet 9 is compatible with AI Packs (Traffic, Retail, Factory), designed to deliver actionable insights specific to various sectors. AI Sound Classification AI-based sound classification enables rapid detection and directional awareness of critical events like gunshots, glass breaks, and screaming, to enhance situational awareness. Hanwha vision open platform Wisenet 9 empowers users to create customised security solutions by providing the flexibility to tailor their systems with custom applications for video analytics, storage, and other functionalities. Improved end-to-end protection Wisenet 9 significantly enhances end-to-end protection by building upon the robust security foundation of Wisenet 7. It inherits essential features like Secure Storage, OS, and Boot, which protect critical chipset data and prevent unauthorised software execution. Moreover, the inclusion of a FIPS 140-3 Level 3 elevates security to an exceptional standard. This certification guarantees that the chipset adheres to rigorous security protocols, assuring users of comprehensive data protection.
Omada by TP-Link and VIGI by TP-Link, TP-Link Systems Inc.’s exclusive business solutions brands, are set to make waves at ISC West 2025 with the debut of their groundbreaking unified networking and surveillance solutions. At the event, the brands will showcase a seamless integration of VIGI’s cutting-edge surveillance solutions, Omada’s comprehensive networking systems, and the Omada Central platform—a revolutionary cloud-based solution that unifies the management of networking and surveillance under one roof. Secure & scalable Focused exclusively on the B2B market, Omada and VIGI deliver reliable, secure, and intuitive networking and surveillance products tailored to the unique needs of SMBs and enterprises. Designed to address diverse scenarios—including retail, hospitality, offices, MDUs, and outdoor environments—Omada and VIGI empower businesses to enhance security, streamline operations, and drive efficiency. Unified networking and surveillance solutions Integrating networking and surveillance into a single platform, TP-Link eliminates the system managment complecity By integrating networking and surveillance into a single platform, TP-Link eliminates the complexity of managing multiple systems. This unified approach enables unified management; easy deployment and setup; and remote troubleshooting, reducing operational overhead while enhancing efficiency, scalability, and security for businesses across industries. Omada Central is the cornerstone of TP-Link’s unified approach, offering a single platform to manage both Omada networking devices and VIGI surveillance systems. This next-generation solution enables businesses to seamlessly manage gateways, switches, access points, and security surveillance equipment across multiple locations. Simplified Management It simplifies setup with intelligent device recognition, auto surveillance VLAN, and Zero-Touch Provisioning while reducing total cost of ownership with a single-vendor solution. The platform also offers a free version, Omada Central Essentials, making it accessible for businesses of all sizes. VIGI: professional surveillance solutions VIGI provides professional, reliable, and comprehensive surveillance solutions tailored for businesses. Offering a diverse product range—including bullet, turret, dome, and fisheye cameras, 4/8/16/32/64-channel NVRs, 90W/180W solar power systems, cloud and local VMS, and user-friendly apps—VIGI ensures robust security while enhancing operational efficiency and profitability. VIGI offers a comprehensive range of durable cameras designed to deliver guaranteed high-quality images. The product lineup includes: 180° Panoramic 4K Cameras with Red-Blue Warning Lights Dual-Lens Stitching 4K Cameras 4G Outdoor Cameras with 3 LAN Ports AI ISP-Powered ColorPro 2.0 Cameras 5X Optical Zoom Cameras Complementing these cameras are 64-Channel H.265+ NVRs featuring 4 SATAs with a up to 64TB storage capability and 320Mbps incoming/outgoing bandwidth. Additionally, VIGI’s easy-to-install and stable solar power solution ensures long standby performance, making it ideal for off-grid locations. VIGI CVM System VIGI’s Cloud Video Management System (VMS) provides free, centralised management for multiple sites, leveraging AWS-based reliability and zero-touch maintenance to reduce on-site troubleshooting costs and ensure seamless surveillance. Complementing this is VIGI’s NPU-powered AI technology, offering advanced detection and analysis capabilities such as Behavior and Object Detection; People and Vehicle Attributes Analysis; and Precise People Counting. Together, these innovations deliver smarter, more efficient security solutions that enhance operational efficiency and drive business success. Omada: Comprehensive Networking Solutions Omada delivers a complete set of SDN solutions, designed to meet the needs of businesses With a full portfolio that includes access points, gateways, hardware controllers, cloud controllers, and a diverse range of switches, Omada provides end-to-end networking solutions tailored for scalability, performance, and ease of management. Omada’s full lineup of Wi-Fi 7 access points redefine wireless connectivity, offering unparalleled speed and reliability for both indoor and outdoor environments. Complementing these are Outdoor 4G Wi-Fi Gateways and connectivity solutions, such as the Outdoor PoE Switch and Wireless Long-Range PtMP/PtP Bridge, which ensure reliable networking even in remote or challenging locations. The switch portfolio spans from unmanaged switches for plug-and-play simplicity to easy-managed switches and advanced L3/L2 + switches, catering to businesses of all sizes and complexities. Effortless surveillance connectivity The Agile Series of Easy Managed PoE Switches with Free Cloud, designed specifically for surveillance systems. Paired with Omada Central Essentials for free cloud access, the Agile Series features Auto IP Camera/NVR Recognition, Extend Mode for PoE up to 250m, enhanced PoE Auto Recovery, and Remote Troubleshooting Tools with Cable Test, Reboot PoE Port Management, and SSH to minimise downtime, making it an ideal choice for businesses seeking efficient and scalable networking solutions tailored to surveillance needs. Seamless connectivity Omada & VIGI unified networking and surveillance solutions are tailored to meet the needs of diverse industries, including retail, hospitality, offices, residential, and outdoor environments. By combining Omada’s networking expertise, VIGI’s surveillance solutions, and the Omada Central platform, TP-Link delivers agile, secure, and scalable ecosystems that simplify infrastructure and enhance operational efficiency across the board.
Colt Technology Services expanded its product portfolio with the launch of a new Managed Local Area Network (LAN) solution, available now across Colt’s 40+ countries. Ideal for businesses looking for enhanced performance, security, and cost efficiency benefits of a Local Area Network without the complexity and expense of managing it themselves, Colt’s new Managed LAN solution combines powerful digital infrastructure with an effortless service experience. Real-time data sharing Organisations are increasingly using Local Area Networks for fast, efficient and secure real-time data Organisations are increasingly selecting Local Area Networks for fast, efficient and secure real-time data sharing between devices within office buildings, local government or manufacturing sites, hospitals, retail stores and production facilities. This comes as more businesses explore AI-generating and processing higher volumes of data traffic and seek new ways to protect their organisations from sophisticated security threats. Colt’s Managed LAN solution Colt’s Managed LAN solution can quickly, easily and securely connect to a company’s cloud or on-premise network environment via networking services such as Colt’s SD WAN (Software Defined Wide Area Network) solution, providing businesses with a high-performing, secure, interconnected digital infrastructure – particularly valuable for organisations streamlining real estate, integrating newly-acquired sites through M&A or expanding into new premises as they grow organically. Benefits from Colt’s Managed LAN Businesses choosing Colt’s Managed LAN benefit from: Proactive network monitoring by an expert team using best-in-class software platforms, ensuring high performance and reliability without the hassle or investment of managing this directly Improved data security and network security, with Colt’s robust security standards, tools, and practices, including Colt’s Corporate Binding Rules Fast delivery times Better resource allocation, as IT teams are freed from day-to-day network management to focus on delivering business transformation goals Transparent and reduced operating costs and improved power consumption, as businesses only pay for and use power for the services they need Futureproofed technology as Colt invests in the latest energy-saving network technology trends, so their network is current, efficient, and supports their sustainability goals The peace-of-mind that comes from being a part of Colt’s industry-pioneering, proactive, and supportive customer experience New managed LAN service Tyler Hemmen, VP – Enterprise products and solutions, Colt Technology Services, said, "Organisations are reimagining their workspaces to meet changing consumer and employee needs. Connecting these spaces with powerful, secure digital infrastructure is critical, but it’s easy for businesses to lose their way as they try to link this intricate maze of different networks across different sites." Tyler Hemmen adds, "Our new managed LAN service removes this effort and complexity, delivering flexible, secure, optimised local area networks which can seamlessly interconnect to build intelligent, AI-ready architecture."
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., announced the expansion of its popular RIO™ solar-powered, mobile security solution lineup. Named RIO Mini, the new security solution is now in production, with the Company forecasting that it can add up to 500 units to its sales expectations this fiscal year. Mobile surveillance systems The Company joins LiveView Technologies Inc., which raised $50 million in a Series B round in 2022, in finding success and growth in this rapidly expanding market. LiveView Technologies has demonstrated strong demand for solar-powered mobile surveillance systems, validating the market opportunity that RAD is now addressing with RIO Mini. RAD’s award-winning ROSA™ device RIO Mini surpasses other affordable mobile security solutions in performance and value Utilising a dual configuration of RAD’s award-winning ROSA™ device, RIO Mini surpasses other affordable mobile security solutions in performance and value. ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics ROSA’s AI-driven security analytics include human and vehicle detection, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication is optimised for cellular, including live video from ROSA’s high-resolution, full-color, always-on cameras. RAD has published six Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at retail centres, hospital campuses, multi-family communities, car rental locations and construction sites across the country. RAD’s existing RIO lineup RIO Mini joins RAD’s existing RIO lineup, which includes the popular RIO 180 and RIO 360 units RIO Mini joins RAD’s existing RIO lineup, which includes the popular RIO 180 and RIO 360 units, further filling in the product family. RIO Mini is expected to achieve greater profitability than the primary RIO lineup while being substantially less expensive for clients. It will feature reduced analytics processing and limitations on other select features while maintaining RAD’s core Autonomous Intelligent Response capabilities. The device is enabled by a lower-cost modified version of RAD G’s RADPack, providing consistent performance in a compact and economical format. Development by AITX’s various subsidiaries Steve Reinharz, CEO/CTO of AITX and RAD, commented, “We are starting to see the benefits after years of hardware and software development by AITX’s various subsidiaries. Utilising internally developed analytics and electronics hardware and benefiting from our complete control of the supply chain, we are well-positioned to compete aggressively in the mobile surveillance unit marketplace." "This new solution will enable dealers and our internal sales team to expand their target markets to include clients that want the basics of intelligent autonomous response.” How RIO Mini’s streamlined design and accessible pricing The response from RAD’s channel partners, existing clients, and new prospects was positive As with all RAD security solutions, RIO Mini is supported by SARA™, the Company’s multiple award-winning AI-based software platform. SARA (Speaking Autonomous Responsive Agent) provides real-time responsiveness, centralised device management, and seamless integration across RAD’s ecosystem of autonomous security technologies. RIO Mini was introduced to the public last week during ISC West in Las Vegas, the security industry’s largest and most influential trade show. The response from RAD’s channel partners, existing clients, and new prospects was overwhelmingly positive. Many attendees expressed interest in how RIO Mini’s streamlined design and accessible pricing could open new markets and use cases that complement the existing RIO offerings. Introduction of RIO Mini With the introduction of RIO Mini, RAD is positioned to reach a broader segment of the market, including clients who may have previously hesitated to adopt advanced security solutions due to budget limitations. This addition to the product lineup reflects the Company’s ongoing focus on addressing evolving market demands with practical, high-performance offerings. RAD’s reputation for innovation RIO Mini reinforces RAD’s reputation for innovation and dependability while making intelligent autonomous response more accessible across a wider range of use cases. RIO Mini’s aggressive pricing has not been publicly disclosed. Interested dealers, clients, and prospects are encouraged to contact RAD directly for additional details and availability.
DeterTech, a pioneer in intruder detection and identification, is proud to announce the immediate availability of SmartSpray® for rental or purchase. It is considered a game-changer in tackling retail crime as it enables police to forensically link masked offenders back to the scene of their crime, even weeks after they’ve left the store. Effective CCTV storage Retail crime is at its highest level on record, with over 2,000 incidents of violence and abuse per day Retail crime is at its highest level on record, with over 2,000 incidents of violence and abuse per day, reported in the British Retail Consortium’s Annual Crime Survey. A key factor is perpetrators’ feeling emboldened that they can anonymously steal, assault and abuse staff, and escape before security or police can intervene. While in-store CCTV can be effective, it is easily defeated by the most organised and violent offenders who choose to obscure their faces. SmartSpray system The SmartSpray system can be deployed standalone or integrated with the existing security system. When triggered, it releases a precise spray of SmartWater®, a forensic liquid that contains a code unique to each specific store. This glows under UV light and remains on skin and clothing for weeks, allowing police to identify suspects and pursue convictions. DeterTech’s forensic scientists DeterTech’s forensic scientists supply analysis and testimony in support of a belief DeterTech’s forensic scientists provide analysis and testimony in support of a conviction to the police and courts free of charge. Furthermore, they need only a speck smaller than the full stop at the end of this sentence to conclusively link an individual back to the scene of their crime. SmartSpray installation and servicing SmartSpray is immediately available for rental or purchase on flexible terms, including installation and servicing. DeterTech has also committed to providing unlimited refills free of charge following any activation for which a crime reference number is supplied. It is hoped this will further incentivise retailers to report all incidents to the police so that the true scale of retail crime can be nationally recognised. Cutting-edge solutions DeterTech has also committed to providing total refills free of charge BT is one of the first retailers to have deployed SmartSpray in selected stores. Richie Iwanoff, Corporate Investigations Team Manager, BT, says: “The well-being of our staff and customers is our number one priority." "We’re proud to be using cutting-edge solutions to keep them safe at all times. I sleep easier knowing criminals will think twice before targeting us”. DeterTech with businesses and communities Gary Higgins, Director of Security and Risk, DeterTech, adds: “SmartSpray has been very well received by both retailers and the police who recognise it will deter offences and help put violent criminals behind bars. It supports our purpose here at DeterTech of working with businesses and communities every day to provide greater peace of mind.” Hazel Goss, Development Officer, Secured by Design, concludes, “This is exactly the kind of collaboration we want to see from retailers, security providers, and law enforcement. Enhancing the police’s chances of unmasking offenders is vital in combating retail crime, which is sadly soaring across the country.”


Expert commentary
Retailers now often find themself in a precarious situation. Profit margins are being squeezed by widespread shoplifting: The Council on Criminal Justice reports that between the first half of 2023 and the first half of 2024, shoplifting reports increased by 24%. Meanwhile, the strategies used by shops to deal with this situation are alienating consumers and affecting total sales. Andy Jassy, the CEO of Amazon, stated during an earnings call that customers are now purchasing more pharmaceuticals from Amazon in response to other retailers locking their cabinets. Media reports This crisis impacts not only the large chains—more than 7,100 retail stores were closed in the U.S. in 2024, a 69% increase from the previous year—but also small, local businesses, whose profit margins are even narrower. Media reports out of Los Angeles show that small businesses in regions with greater shoplifting rates are more likely to close, and small business owners' job satisfaction and general well-being are negatively impacted by the fear of crime. How to safeguard staff and inventory Unchecked retail theft demoralises staff and makes the store less attractive to customers This is obviously not a sustainable situation. In addition to lowering revenue, unchecked retail theft demoralises staff and makes the store less attractive to customers. Unfortunately, making customers wait in line to enter a store or locking up toothpaste and deodorant only makes the customer relationship worse. Retailers need to figure out how to safeguard staff and inventory without alienating their customer base—and they need to figure it out fast. Advanced video security A new tool has come to the forefront of this fight: advanced video security. Of course, video surveillance has been used in stores for many years. However, the technology currently being used to reduce retail theft is very different from the outdated analog video systems of the past. With features like cloud-based flexibility and AI-enhanced analytics, this new generation of video surveillance systems has all the advantages of modern technological advancements, while also providing businesses with a competitive edge in the fight against retail theft. Security's new AI video standard Workers are constantly rushing from aisle to aisle in an effort to satisfy eager consumers Although the typical chain pharmacy may appear straightforward to the customer, retailers are aware of how intricate these spaces are. Hundreds or even thousands of shoppers may come and go on any given day, with a larger volume during busy seasons like holidays or special promotional events. It's common for shoppers to pick up merchandise and put it down in another part of the store, often far away from its original location. Meanwhile, workers are constantly rushing from aisle to aisle in an effort to satisfy eager consumers, particularly during these busy seasons. How much can recorded videos reveal in a busy Using traditional CCTV, managers and security teams can monitor some of this activity, but their viewpoint of events will always be incomplete. There is a limit to how much recorded videos can reveal in busy, fast-paced customer situations, and even the largest chain stores lack the staff and resources to continuously sort and evaluate all of the data they collect. When more customers are in the store for a special event, there’s also naturally a higher risk of theft. New generation of video security Using machine learning algorithms trained on large amounts of retail-specific data The new generation of video security aims to provide retailers with comprehensive intelligence that covers all aspects of their operations. Using machine learning algorithms trained on large amounts of retail-specific data, they are focused on predictive actions and can recognise problematic behaviour in real time from raw video footage. AI-powered surveillance For example, if someone entered a store with empty bags but bypassed the cashier and started heading to the exit with a full bag, AI could predict a potential theft before it happens. Instead of just recording the theft, security action could be triggered in the moment. AI-powered surveillance is like an all-seeing security officer, quickly analysing the thousands of variables at play and spotting the warning signs of a possible crime before it happens. This is especially crucial during the holidays and busy shopping periods. Security personnel required to monitor cameras Imagine a chain store with 500 locations and 32 cameras each: that’s 1,600 cameras Cameras with AI can also alert human security personnel of events that would have otherwise been missed. Imagine a chain store with 500 locations and 32 cameras each: that’s 1,600 cameras. Now just imagine the number of security personnel required to monitor all of those cameras – when it comes down to it, traditional security is a numbers game. AI is the differentiator here that will allow retailers to win this game. VSaaS: A new tool to Deter Theft The emergence of Video Surveillance as a Service (VSaaS), a surprisingly under-discussed aspect of the broader SaaS revolution, is an important part of video security’s evolution. VSaaS solutions are especially helpful for chains that require a high level of centralisation and coordination across hundreds or even thousands of locations. In addition to offering action alerts at the shop level, VSaaS offers comprehensive security systems accessible from any location. This gives corporate headquarters access to complete, aggregated insights on all aspects of business operations. Identify the best ways to deploy staff Retail operators are constantly in a state of triage, rushing to identify the best ways to deploy staff This is significant in part because of the importance that social engineering and store layout have in preventing theft. Stores are frequently more busy during specific hours than others, and consumers may congregate in particular areas of the store while others are comparatively empty. Retail operators are constantly in a state of triage, rushing to identify the best ways to deploy staff and organise inventory while accounting for all of these variables. Cloud-based VSaaS solutions Cloud-based VSaaS solutions help streamline this process by eliminating uncertainty, highlighting blind spots and bottlenecks, and informing retailers of what truly works. Another regrettable reality is that employees frequently steal from businesses they work at. Here, too, VSaaS solutions—when combined with sophisticated, integrated access controls—are essential. AI analytics technology Implementation and deployment of VSaaS is also easier and less costly than CCTV Implementation and deployment of VSaaS is also easier and less costly than CCTV. When new AI analytic updates become available, the client software and hardware don’t need to be upgraded, and the onsite technology and cameras also don’t need to be replaced. The AI analytics technology is upgraded in the cloud, enabling faster deployment and implementation of new technology. New VSaaS solutions Theft will always occur at some level; it's just a part of doing business. However, the growth in shoplifting that retailers have experienced in recent years is unacceptable, and if these figures keep rising, the consequences will be disastrous. In a time of dire need for retail, new VSaaS solutions have come to the forefront and are already turning the tide.
For businesses today, loss prevention is no longer just about safeguarding inventory from theft. While retail theft makes frequent headlines in the United States, and is indeed the leading cause of shrinkage, The National Retail Foundation (NRF) has reported that process failures, operational inefficiencies and employee theft also drive significant losses. Legacy security systems In 2022, the shrink loss is estimated to be $ 120 billion in the United States, and that’s for retail alone. Industries like hospitality, healthcare, manufacturing, and transportation all face similar challenges even though loss and inefficiency take different forms in each of these fields. As shrinks from theft and operational inefficiency have already put margins of companies under pressure, we are increasingly seeing more businesses demand AI-powered security systems with advanced video analytics, capable of addressing both security and operational inefficiencies that their legacy security systems could not. Understanding the full scope of loss Package theft is a common problem in commercial buildings, with which box detection in mailrooms Starbucks’ recent announcement of reinventing its franchise operation due to faltering sales is a great example of how operational efficiency can take a toll on business revenue. In restaurants or hotels, failing to anticipate customer flow can lead to long wait times or inefficient use of staff, frustrating guests. Take, for example, in hospitals, inefficient patient flow management can lead to overcrowded waiting areas and delays in care, compromising patient health. Similarly, in manufacturing, poorly optimised assembly lines create production bottlenecks, delaying output and raising overhead. Package theft is another common problem in commercial buildings, with which package detection in mailrooms can mitigate loss from deliveries. These invisible leaks creepingly drain profits across industries, and require future-proof solutions that not only confirm what’s already known but also provide actionable insights for improvement. Transforming security into a powerhouse for efficiency Progress continues to advance across these areas, fuelling optimism for what lies ahead. Thanks to the rise of artificial intelligence and data analytics, some security solutions are already integrated with facial recognition and licence plate detection capabilities, as well as Virtual Fences that help ensure that only authorised personnel or vehicles enter sensitive areas. This can be especially useful for manufacturing environments, where controlling access to high-risk zones and protecting valuable assets are critical. Some modern security systems can even offer more than a watchful eye, doubling as a data analytic tool beyond traditional surveillance limits. Heat mapping in security AI technology Heat mapping in security AI technology analyses ways of movement and behaviour in a retail environment Modern security systems are now capable of tracking foot traffic, analysing customer behaviour, and even identifying bottlenecks in real time by incorporating different technologies such as heatmapping, people counting and queue length monitoring for long lineups. Heat mapping in security AI technology analyses patterns of movement and behaviour in a retail environment by visually representing areas with high foot traffic. With tracking over time and identifying potential vulnerable and hot spots for potential theft and fraud, resulting in change of store layout, deploy additional resources in high traffic areas and physical security placement. Predictive security analytics AI people counting in security utilises sensors and cameras to accurately track the number of individuals entering and exiting a space in real time. This data helps businesses optimise staffing levels, enhance customer experience, and improve overall operational efficiency by aligning resources with foot traffic trends. Predictive security analytics, such as heat mapping and people counting, are not new inventions. But I believe the ability to integrate all these functionality into a single system will allow these technologies to further mature and expand their footprint in near future. Rather than relying on separate tools for each business function, businesses can now use a single, integrated system to gather actionable data while continuing to secure protection through video surveillance. You Can’t Manage What You Can’t Measure AI-powered security systems give businesses access to a wealth of data that they can use AI-powered security systems give businesses access to a wealth of data that they can use to precisely pinpoint where losses are happening. This is key to solving the problem of shrinkage, which often goes beyond simple theft. Consider the Starbucks case mentioned earlier, while Starbucks hasn't specified how it plans to achieve operational efficiency to “enhance the cafe experience”, an AI-powered security system could provide an all-encompassing solution to minimise bottlenecks during peak hours, optimise store layouts, and allocate staff more efficiently. The impact of this technology can be tremendous as it not only enhances the customer experience but also reduces inefficiencies that contribute to lost revenue. By analysing patterns, conducting Forensic Review with Smart Search to quickly locate incidents, and understanding the root causes of loss, companies can implement targeted solutions that reduce shrinkage and streamline operations. Future-proof solutions Walmart is using foot traffic analytics to predict demand and manage inventory Companies like Walmart are already using foot traffic analytics to predict demand and manage inventory. But beyond basic predictive inventory analysis and crowd control, the data gathered will have the potential to be combined with other business functions, smart energy management, pricing and marketing strategy, just to name a few. Investing in a security system that integrates AI video analytics, such as package detection, queue length monitoring, and Virtual Fences, can provide future-proof solutions that also enhance operational efficiency. Looking ahead With New York State's introduction of new Retail Security measures to encourage businesses to strengthen their security, we've seen increased interest. However, modern security systems with real-time analytics are now offering companies more than just protection—they’re providing valuable insights into operations, transforming security from a cost burden into a powerful tool for growth and efficiency. As businesses continue to adopt AI-powered security systems, it's clear that the role of security is evolving beyond traditional surveillance. These advanced systems are no longer just about protection, but help businesses grapple with increasingly complex challenges. By transforming security from a reactive expense into a proactive, data-driven asset, companies can stay ahead of the curve, managing not only what they can see, but also what they’ve been missing.
A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Fraud - a growing concern While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies. They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are empowered to improve the monitoring and analysis of gift card transaction patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Leveraging Latest AI And LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift cards, customer trust, and brand integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams, as well as customer trust and brand integrity.
Security beat
With the year 2025 stretched out before us, there are many techniques one could use to predict what will happen in the new year. You might analyse historical data and analyse future trends. Or you could try statistical or economic modelling. Or you could develop multiple scenarios based on various assumptions to explore potential outcomes. Or you could just check your email. At this time of year, my email is full of industry folks looking to predict what the future holds in 2025. Ranging from artificial intelligence (AI) to privacy, the retail market to drones, here is a sampling of forecasts for 2025 provided by various players in the security market, courtesy of my email messages. What’s Ahead for AI? From Faisal Pandit, VP & GM, Global Security Products, Johnson Controls (JCI): “The future of security operations includes customisable, scalable solutions where users can control if, when, and how they use AI to improve efficiency depending on the size and function of their organisation.” Says Kevin Woodworth, Vice President, Global Product Management, Intrusion, JCI: “Next year will see a growing focus from product developers on designing systems that streamline setup and configuration through increased AI integration. This reflects a broader trend of leveraging AI to simplify use and enhance adaptability as solutions evolve, rather simply employing it because it’s popular.” From Peter Evans, CEO of Xtract One Technologies: “AI algorithms will significantly advance in distinguishing between harmless, everyday items and potential threats. With this, we will see false alerts become even more rare.” Says JP Castellanos, Director of Threat Intelligence, Binary Defense: “Machine learning (ML)-powered anomaly detection will move beyond proof-of-concept to become mission-critical, enabling teams to uncover unknown threats and behavioural anomalies in real time – well before they escalate.” Evans of Xtract: “As AI becomes more advanced in threat detection, it will lead to more sophisticated protection of individual privacy. We can expect to see more AI techniques utilised for threat identification that do not capture personal data and are privacy-first.” Predictions on interoperability and compliance Woodworth of JCI: “New products added to singular systems must be interoperable. In 2025, organisations will need to embrace interoperability. AI will progress past reactive measures to achieve predictive capabilities.” Pandit of JCI: “With organisations increasing their focus on the regulatory environment, there will be an uptick in specialised certification programs to meet these needs. New security roles will emerge that will be focused on tracking and applying relevant regulatory changes.” Expanding capabilities for video cameras Woodworth of JCI: “Beyond capturing images, cameras will be able to detect potential threats and also mitigate them instantly, issuing vocal warnings, controlling access, or escalating issues without human intervention.” Looking ahead to retail developments Hansel Oh, Director of Product Marketing at Brivo: “Centralized, cloud-based security platforms will enhance credential management and monitor logistical operations to enable retailers to battle cargo theft.” Stephen Burd, Vice President, Essence Security: “With an increase in police response times, sophisticated crime, and smash and grabs, 2025 will see a huge demand for security solutions that go beyond simply notifying the police and will look to actively intervene and prevent damage or loss from occurring.” The role of drones and training Mary-Lou Smulders, CMO, Dedrone by Axon: “Drones will transition from being viewed as supplementary tools to becoming essential components of public safety operations. As departments recognise their effectiveness in various scenarios, the perception of drones will shift, and they will be integrated into core operational frameworks alongside traditional assets like patrol cars while replacing helicopters as a cost-effective and versatile alternative.” Erik Hohengasser, Electrical Technical Lead at NFPA: “As the skilled trades evolve, there will be an increasing demand for specialised and technical training. Predictive analytics, virtual simulations and hands-on experiential learning will become especially valuable due to allowing employees to gain real-world expertise in safe and controlled environments.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behaviour. Vacant retail space The total number of void private-sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with implementation of secure range key safes and lockboxes. The primary concern in such an approach is security. Even though property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivalled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as a proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
Richard Thorp has been fascinated with aviation since childhood. A self-described “aviation geek,” Thorp is now the Chief Technology Officer at Swissport International AG, where he leads IT infrastructure strategy for the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries, handling approximately 247 million airline passengers per year, as of the end of 2024. “If we were an airline, we’d actually be the biggest airline in the world in terms of a number of passengers we support and handle,” he says. Security challenges Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel. “If the things we do get people to their destinations safely and on time, then magically, we become more successful and profitable as an organisation,” he says. But casting that spell had been challenging for Swissport. Three years ago, legacy IT leadership at Swissport had overcome network challenges with Cato, but more work was needed to address their security challenges, particularly in securing endpoints. Thorp and Swissport CISO, Giles Ashton-Roberts, joined Swissport in the middle of the Cato deployment. Having deep experience with a legacy zero trust provider, they were skeptical that Cato could meet Swissport’s requirements. Cato platform Over the next 10 months of meetings, investigation, and testing Thorp and Ashton-Roberts challenged Cato, ultimately changing their perspective. “IT is no longer seen as a blocker; it just works,” says Thorp. “I relax a bit more with the Cato platform around. It’s given us holistic way of protecting ourselves today, and a secure foundation for everything we want to do in the future.” The challenges of a global, always-on operation Swissport’s network helps millions of passengers, cargo shipments, and lounges worldwide Swissport’s network supports millions of passengers, cargo shipments, and lounges worldwide. Three years ago, scale was an enormous challenge—ensuring reliable connectivity for operations spanning locations and time zones. The company relied on a mix of MPLS and regional SD-WAN solutions across its now 320+ sites and airport locations. But bandwidth limitations and performance variability impacted many applications, including cloud-based, mission-critical applications. As a result of that complicated network, expanding to new locations was resource-intensive, requiring manual setup and multiple vendor dependencies. Differences between networking tools made troubleshooting inconsistent and time-consuming. The IT team in turn had to maintain expertise in multiple networking technologies, increasing operational overhead. What security inspection existed for unencrypted traffic Visibility was an enormous challenge. With multiple network platforms in place, Swissport’s IT team lacked a centralised view of network performance and security threats. “In the past, working with multiple systems meant inconsistency,” says Thorp. “Different platforms required different configurations, which complicated troubleshooting and made security enforcement a challenge.” Swissport relied on a patchwork of security appliances, including firewalls and web gateways. Remote users are connected through different VPN servers deployed across different regions. The complex appliance stack required manual maintenance and lacked centralised visibility and control. Security patching was manual and error-prone and implementing consistent security policies was practically impossible, weakening Swissport’s security posture. What security inspection existed was relegated to unencrypted traffic due to the well-founded concern that inspecting encrypted traffic could break the application experience that in this case were airline partners’ systems. Finally, the lack of consistent, advanced threat detection worldwide limited Swissport’s ability to detect and stop threats. Visibility differentiates the Cato SASE cloud platform Thorp and the IT team had initially leaned away towards deploying that architecture Recognising these inefficiencies, Swissport’s legacy IT team initiated the Cato relationship, connecting many of the now 320+ sites and instances in AWS and Azure to the Cato SASE Cloud Platform. When Thorp and the new IT leadership joined Swissport, about two-thirds of the connections had been deployed. Having been familiar with a legacy cybersecurity provider, Thorp and the IT team had initially leaned away towards deploying that architecture. Hearing about the value of Cato they decided to have a closer look. “What really drew me to Cato is the visibility the platform provides. It’s incredibly easy to pinpoint connectivity issues, analyse traffic patterns, and secure our network from a single interface,” says Thorp. Cato uniquely stores the metadata of all enterprise traffic crossing the Cato SASE Cloud Platform — whether to the Internet or another location — from all endpoints — in the office and outside of it — in a single data store. This incredible resource provides Cato customers with deep, end-to-end insight into their complete network. Much improved security and a better network With a platform that is resilient, secure, and easy to manage, Swissport has been able to take a more proactive approach to security, streamline IT processes, and ensure a seamless digital experience for employees across the globe. Advanced threat prevention now operates globally and protects against malware and ransomware even in encrypted traffic. “Cato’s TLS Inspection gives us the ability to inspect encrypted traffic while avoiding unintended service disruptions,” says Ashton-Roberts. “It’s been a major improvement to our security posture.” Fine-grained access control through the always-on Cato Client connects remote users to Cato, granting access only to permitted resources. The Cato Client fully implements zero trust principles and operates outside and inside the office under one common policy set. “With Cato, every device—whether in a Swissport office or in an airport lounge—operates under the same set of security policies. That level of consistency wasn’t possible before,” says Ashton-Roberts. Deploying new network sites Cato not only delivers optimised network version worldwide but also makes deploying new networks Access is across the Cato Global Private Backbone built into the Cato SASE Cloud Platform, delivering an exceptional, secure user experience anywhere in the world. Cato not only delivers optimised network performance worldwide but also makes deploying new network sites effortless. “Connecting new airlines or contracts now takes just a few clicks,” says Thorp. Thorp’s team has also dramatically reduced network resolution times. “We recently identified and solved a performance issue in a South African location that would have taken us days before Cato,” says Thorp. “Within 15 minutes, our team identified excessive database traffic, blocked the device, and restored normal operations.” Transforming IT by transforming the infrastructure The transformative impact of the Cato SASE Cloud Platform on the IT team has been profound. Previously, managing multiple networking platforms required maintaining expertise in diverse technologies, creating an operational burden. The IT staff was constantly troubleshooting connectivity issues, manually configuring security appliances, and dealing with inconsistent policies across different locations. The shift to Cato not only simplified management but also allowed the IT team to focus on higher-value strategic initiatives. “Before Cato, we had to maintain different skill sets for different platforms, which spread the team thin. Now, we have one standardised system that allows us to be much more efficient,” Thorp says. Newfound network visibility Swissport has been able to optimise resource allocation and improve overall productivity By consolidating security and networking into a single platform, Swissport has been able to optimise resource allocation and improve overall productivity. The newfound network visibility has also brought a shift from reactive to a proactive IT strategy that has helped the company ensure consistent service delivery across its global operations. “For me, Cato future proofs Swissport’s IT infrastructure,” says Thorp. “The platform constantly evolves, adapts to new technologies, and provides the visibility and security we need to support our business today and tomorrow.” Partnership with Cato proved unique The success of Swissport’s IT transformation was built on more than just technology—it was about forming a strong, collaborative relationship with Cato Networks. From the start, Cato worked closely with Swissport to understand its unique challenges and deliver tailored solutions that addressed its global security and networking needs. “We worked directly with Cato’s product team to enhance capabilities—not just for us, but for all customers,” says Thorp. The success of Swissport’s IT transformation was built on more than just technology Features requested by Swissport were implemented on schedule, unlike other vendors who provided only lip service. Thorp says, “Many vendors say they listen, but Cato actually delivers on what they promise.” This close partnership has given Swissport confidence that its evolving needs will continue to be met as Cato refines its platform. “With Cato, we’re not just another customer; we’re part of a continuous innovation cycle that ensures our IT infrastructure remains future-ready,” says Thorp. “It’s rare to find a vendor so responsive and committed to delivering what they promise.” Looking ahead to the future Swissport IT requirements continue to evolve with Cato remaining a key pillar. “With Cato in place, we know that our network is not the limiting factor in our growth,” Thorp explains. The ongoing partnership between Swissport and Cato ensures that as technology continues to evolve, Swissport’s IT infrastructure remains secure, scalable, and adaptable to the demands of a fast-paced aviation industry. On a personal level, Cato has given Thorp peace of mind. “I relax a bit more with the Cato platform around. It’s given us a holistic way of protecting ourselves today and a secure foundation for everything we want to do in the future. Swissport’s IT leadership now can focus on innovation rather than crisis management.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness platform has been deployed by the Modesto Police Department (PD) in strategic locations throughout the city. This partnership reflects the Modesto Police Department’s commitment to utilising the latest tools to improve public safety and reduce crime in the community. Firearms and instant alerts “We want our community members to feel secure in their work, leisure, and daily lives,” said Cat McFadon, Police Civilian Manager of Modesto PD. “ZeroEyes’ ability to detect firearms and trigger instant alerts will allow us to respond more quickly and efficiently to gun-related threats. With this additional technology in our toolbelt, we’re reinforcing our efforts to drive down crime and make Modesto a safer place for everyone.” Effectiveness of ZeroEyes technology Pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions Modesto, a city of 216,000 residents in Northern California, is known for its progressive law enforcement efforts. The department has a long-standing dedication to equipping its officers with the most advanced technology to support their mission to protect life and property. This pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions, with the goal of expanding its use in key areas such as local schools and the city’s shopping mall. ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to Modesto PD as quickly as 3 to 5 seconds from detection. Modesto PD’s expectations “The Modesto PD’s commitment to increasing public safety through innovative technology aligns perfectly with our mission, and we look forward to the collaboration,” said Mike Lahiff, CEO of ZeroEyes. “We’re confident that ZeroEyes will not only meet but exceed Modesto PD’s expectations, enhancing response times and reducing the impact of gun-related threats.”
Like any retail franchise, car dealerships that have multiple locations nationwide require comprehensive, reliable, and scalable video surveillance solutions to protect their businesses. With dealership theft increasing by 7% since 2021, protecting high-value inventory, mitigating liability risks, and ensuring compliance with video data retention standards have become critical priorities. Future surveillance solutions BCD is vital to guarding functions, protecting valuable assets, and maintaining peace of mind Additionally, managing surveillance across multiple sites demands systems that are easy to deploy, cyber-hardened, and capable of centralised oversight. As dealerships continue to expand, investing in future-ready surveillance solutions with a trusted systems builder like BCD is essential to safeguarding operations, protecting valuable assets, and maintaining peace of mind. The challenge Car dealerships face distinct challenges when it comes to security and operations, such as: Asset Protection: Showrooms and lots house high-value vehicles and parts, making them prime targets for theft and vandalism. Cybersecurity Threats: Surveillance systems needed to be cyber-hardened to prevent breaches that could compromise sensitive footage or customer information. Reliable Recording: Continuous operation is essential to ensure no gaps in security coverage, particularly during off-hours or high-traffic events. Scalable Storage Across Locations: With multiple sites generating large volumes of video footage, dealerships need a solution to store data for 30-90 days to comply with industry regulations and internal policies. Centralised Management: Managing surveillance across dozens of locations required a solution that simplified oversight while enabling scalability for future growth. The solution BCD’s All-in-One Hybrid Cloud NVR is a cutting-edge video surveillance solution designed to address these challenges. The solution offers: Integrated PoE Switch: The All-in-One NVR includes a built-in Power over Ethernet (PoE) switch, simplifying installation and reducing the need for additional network infrastructure, which saves time and costs while simplifying the overall infrastructure. Cyber-Hardened Security: BCD’s solutions are all certified as cyber-hardened solutions to maximise data protection and minimise the risk of data breaches. Always-On Recording: With features like RAID storage for redundancy and failover capabilities, along with the Harmonise Remote Monitoring and Management plugin, the All-in-One solution ensures uninterrupted recording, and with customised notifications, can mitigate hardware or network disruptions. Hybrid Cloud Architecture: The All-in-One NVR provides 80TB of local storage for immediate access to live footage while seamlessly integrating with cloud storage for long-term retention. This hybrid approach ensures franchises can store footage for 30 days or more without overwhelming local resources. Centralised, Scalable Management: BCD’s solution is simple to deploy and typically takes 30 minutes or less, allowing franchises to monitor and manage surveillance across all locations from a single interface, simplifying administration and reducing operational overhead. The results Deploying BCD’s All-in-One Hybrid Cloud solution has the potential to drive significant improvements across multiple aspects of a franchise’s video surveillance operations, including: Enhanced Security: Reliable and cyber-hardened surveillance protect valuable inventory and reduce the risk of theft or vandalism. Continuous Uptime: The system’s failover mechanisms along with Harmonise Remote Monitoring and Management Plug-in ensures 24/7 recording with no interruptions, providing full coverage for liability and security events. Regulatory Compliance: Hybrid cloud storage allows each location to easily meet the 30-90-day retention requirement without costly local storage upgrades. Operational Efficiency: Centralized management and user-friendly tools reduce the complexity of overseeing surveillance across multiple locations, cutting costs and improving oversight. Future-Ready Scalability: As franchises expand, BCD’s solutions are designed to scale effortlessly to accommodate new locations and increased storage demands, providing a future-proof investment. Conclusion BCD’s All-in-One Hybrid Cloud NVR is an ideal solution for national franchises, such as car dealerships, and offers a secure, reliable, and scalable video data infrastructure. By leveraging hybrid cloud technology and simplified management, franchises will experience peace of mind knowing their assets are protected, compliance requirements are met, and their operations will be optimised for growth.
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behaviour. Vacant retail space The total number of void private-sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with implementation of secure range key safes and lockboxes. The primary concern in such an approach is security. Even though property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivalled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as a proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
Richard Thorp has been fascinated with aviation since childhood. A self-described “aviation geek,” Thorp is now the Chief Technology Officer at Swissport International AG, where he leads IT infrastructure strategy for the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries, handling approximately 247 million airline passengers per year, as of the end of 2024. “If we were an airline, we’d actually be the biggest airline in the world in terms of a number of passengers we support and handle,” he says. Security challenges Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel. “If the things we do get people to their destinations safely and on time, then magically, we become more successful and profitable as an organisation,” he says. But casting that spell had been challenging for Swissport. Three years ago, legacy IT leadership at Swissport had overcome network challenges with Cato, but more work was needed to address their security challenges, particularly in securing endpoints. Thorp and Swissport CISO, Giles Ashton-Roberts, joined Swissport in the middle of the Cato deployment. Having deep experience with a legacy zero trust provider, they were skeptical that Cato could meet Swissport’s requirements. Cato platform Over the next 10 months of meetings, investigation, and testing Thorp and Ashton-Roberts challenged Cato, ultimately changing their perspective. “IT is no longer seen as a blocker; it just works,” says Thorp. “I relax a bit more with the Cato platform around. It’s given us holistic way of protecting ourselves today, and a secure foundation for everything we want to do in the future.” The challenges of a global, always-on operation Swissport’s network helps millions of passengers, cargo shipments, and lounges worldwide Swissport’s network supports millions of passengers, cargo shipments, and lounges worldwide. Three years ago, scale was an enormous challenge—ensuring reliable connectivity for operations spanning locations and time zones. The company relied on a mix of MPLS and regional SD-WAN solutions across its now 320+ sites and airport locations. But bandwidth limitations and performance variability impacted many applications, including cloud-based, mission-critical applications. As a result of that complicated network, expanding to new locations was resource-intensive, requiring manual setup and multiple vendor dependencies. Differences between networking tools made troubleshooting inconsistent and time-consuming. The IT team in turn had to maintain expertise in multiple networking technologies, increasing operational overhead. What security inspection existed for unencrypted traffic Visibility was an enormous challenge. With multiple network platforms in place, Swissport’s IT team lacked a centralised view of network performance and security threats. “In the past, working with multiple systems meant inconsistency,” says Thorp. “Different platforms required different configurations, which complicated troubleshooting and made security enforcement a challenge.” Swissport relied on a patchwork of security appliances, including firewalls and web gateways. Remote users are connected through different VPN servers deployed across different regions. The complex appliance stack required manual maintenance and lacked centralised visibility and control. Security patching was manual and error-prone and implementing consistent security policies was practically impossible, weakening Swissport’s security posture. What security inspection existed was relegated to unencrypted traffic due to the well-founded concern that inspecting encrypted traffic could break the application experience that in this case were airline partners’ systems. Finally, the lack of consistent, advanced threat detection worldwide limited Swissport’s ability to detect and stop threats. Visibility differentiates the Cato SASE cloud platform Thorp and the IT team had initially leaned away towards deploying that architecture Recognising these inefficiencies, Swissport’s legacy IT team initiated the Cato relationship, connecting many of the now 320+ sites and instances in AWS and Azure to the Cato SASE Cloud Platform. When Thorp and the new IT leadership joined Swissport, about two-thirds of the connections had been deployed. Having been familiar with a legacy cybersecurity provider, Thorp and the IT team had initially leaned away towards deploying that architecture. Hearing about the value of Cato they decided to have a closer look. “What really drew me to Cato is the visibility the platform provides. It’s incredibly easy to pinpoint connectivity issues, analyse traffic patterns, and secure our network from a single interface,” says Thorp. Cato uniquely stores the metadata of all enterprise traffic crossing the Cato SASE Cloud Platform — whether to the Internet or another location — from all endpoints — in the office and outside of it — in a single data store. This incredible resource provides Cato customers with deep, end-to-end insight into their complete network. Much improved security and a better network With a platform that is resilient, secure, and easy to manage, Swissport has been able to take a more proactive approach to security, streamline IT processes, and ensure a seamless digital experience for employees across the globe. Advanced threat prevention now operates globally and protects against malware and ransomware even in encrypted traffic. “Cato’s TLS Inspection gives us the ability to inspect encrypted traffic while avoiding unintended service disruptions,” says Ashton-Roberts. “It’s been a major improvement to our security posture.” Fine-grained access control through the always-on Cato Client connects remote users to Cato, granting access only to permitted resources. The Cato Client fully implements zero trust principles and operates outside and inside the office under one common policy set. “With Cato, every device—whether in a Swissport office or in an airport lounge—operates under the same set of security policies. That level of consistency wasn’t possible before,” says Ashton-Roberts. Deploying new network sites Cato not only delivers optimised network version worldwide but also makes deploying new networks Access is across the Cato Global Private Backbone built into the Cato SASE Cloud Platform, delivering an exceptional, secure user experience anywhere in the world. Cato not only delivers optimised network performance worldwide but also makes deploying new network sites effortless. “Connecting new airlines or contracts now takes just a few clicks,” says Thorp. Thorp’s team has also dramatically reduced network resolution times. “We recently identified and solved a performance issue in a South African location that would have taken us days before Cato,” says Thorp. “Within 15 minutes, our team identified excessive database traffic, blocked the device, and restored normal operations.” Transforming IT by transforming the infrastructure The transformative impact of the Cato SASE Cloud Platform on the IT team has been profound. Previously, managing multiple networking platforms required maintaining expertise in diverse technologies, creating an operational burden. The IT staff was constantly troubleshooting connectivity issues, manually configuring security appliances, and dealing with inconsistent policies across different locations. The shift to Cato not only simplified management but also allowed the IT team to focus on higher-value strategic initiatives. “Before Cato, we had to maintain different skill sets for different platforms, which spread the team thin. Now, we have one standardised system that allows us to be much more efficient,” Thorp says. Newfound network visibility Swissport has been able to optimise resource allocation and improve overall productivity By consolidating security and networking into a single platform, Swissport has been able to optimise resource allocation and improve overall productivity. The newfound network visibility has also brought a shift from reactive to a proactive IT strategy that has helped the company ensure consistent service delivery across its global operations. “For me, Cato future proofs Swissport’s IT infrastructure,” says Thorp. “The platform constantly evolves, adapts to new technologies, and provides the visibility and security we need to support our business today and tomorrow.” Partnership with Cato proved unique The success of Swissport’s IT transformation was built on more than just technology—it was about forming a strong, collaborative relationship with Cato Networks. From the start, Cato worked closely with Swissport to understand its unique challenges and deliver tailored solutions that addressed its global security and networking needs. “We worked directly with Cato’s product team to enhance capabilities—not just for us, but for all customers,” says Thorp. The success of Swissport’s IT transformation was built on more than just technology Features requested by Swissport were implemented on schedule, unlike other vendors who provided only lip service. Thorp says, “Many vendors say they listen, but Cato actually delivers on what they promise.” This close partnership has given Swissport confidence that its evolving needs will continue to be met as Cato refines its platform. “With Cato, we’re not just another customer; we’re part of a continuous innovation cycle that ensures our IT infrastructure remains future-ready,” says Thorp. “It’s rare to find a vendor so responsive and committed to delivering what they promise.” Looking ahead to the future Swissport IT requirements continue to evolve with Cato remaining a key pillar. “With Cato in place, we know that our network is not the limiting factor in our growth,” Thorp explains. The ongoing partnership between Swissport and Cato ensures that as technology continues to evolve, Swissport’s IT infrastructure remains secure, scalable, and adaptable to the demands of a fast-paced aviation industry. On a personal level, Cato has given Thorp peace of mind. “I relax a bit more with the Cato platform around. It’s given us a holistic way of protecting ourselves today and a secure foundation for everything we want to do in the future. Swissport’s IT leadership now can focus on innovation rather than crisis management.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness platform has been deployed by the Modesto Police Department (PD) in strategic locations throughout the city. This partnership reflects the Modesto Police Department’s commitment to utilising the latest tools to improve public safety and reduce crime in the community. Firearms and instant alerts “We want our community members to feel secure in their work, leisure, and daily lives,” said Cat McFadon, Police Civilian Manager of Modesto PD. “ZeroEyes’ ability to detect firearms and trigger instant alerts will allow us to respond more quickly and efficiently to gun-related threats. With this additional technology in our toolbelt, we’re reinforcing our efforts to drive down crime and make Modesto a safer place for everyone.” Effectiveness of ZeroEyes technology Pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions Modesto, a city of 216,000 residents in Northern California, is known for its progressive law enforcement efforts. The department has a long-standing dedication to equipping its officers with the most advanced technology to support their mission to protect life and property. This pilot program is intended to assess the effectiveness of ZeroEyes technology in real-world conditions, with the goal of expanding its use in key areas such as local schools and the city’s shopping mall. ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to Modesto PD as quickly as 3 to 5 seconds from detection. Modesto PD’s expectations “The Modesto PD’s commitment to increasing public safety through innovative technology aligns perfectly with our mission, and we look forward to the collaboration,” said Mike Lahiff, CEO of ZeroEyes. “We’re confident that ZeroEyes will not only meet but exceed Modesto PD’s expectations, enhancing response times and reducing the impact of gun-related threats.”
Like any retail franchise, car dealerships that have multiple locations nationwide require comprehensive, reliable, and scalable video surveillance solutions to protect their businesses. With dealership theft increasing by 7% since 2021, protecting high-value inventory, mitigating liability risks, and ensuring compliance with video data retention standards have become critical priorities. Future surveillance solutions BCD is vital to guarding functions, protecting valuable assets, and maintaining peace of mind Additionally, managing surveillance across multiple sites demands systems that are easy to deploy, cyber-hardened, and capable of centralised oversight. As dealerships continue to expand, investing in future-ready surveillance solutions with a trusted systems builder like BCD is essential to safeguarding operations, protecting valuable assets, and maintaining peace of mind. The challenge Car dealerships face distinct challenges when it comes to security and operations, such as: Asset Protection: Showrooms and lots house high-value vehicles and parts, making them prime targets for theft and vandalism. Cybersecurity Threats: Surveillance systems needed to be cyber-hardened to prevent breaches that could compromise sensitive footage or customer information. Reliable Recording: Continuous operation is essential to ensure no gaps in security coverage, particularly during off-hours or high-traffic events. Scalable Storage Across Locations: With multiple sites generating large volumes of video footage, dealerships need a solution to store data for 30-90 days to comply with industry regulations and internal policies. Centralised Management: Managing surveillance across dozens of locations required a solution that simplified oversight while enabling scalability for future growth. The solution BCD’s All-in-One Hybrid Cloud NVR is a cutting-edge video surveillance solution designed to address these challenges. The solution offers: Integrated PoE Switch: The All-in-One NVR includes a built-in Power over Ethernet (PoE) switch, simplifying installation and reducing the need for additional network infrastructure, which saves time and costs while simplifying the overall infrastructure. Cyber-Hardened Security: BCD’s solutions are all certified as cyber-hardened solutions to maximise data protection and minimise the risk of data breaches. Always-On Recording: With features like RAID storage for redundancy and failover capabilities, along with the Harmonise Remote Monitoring and Management plugin, the All-in-One solution ensures uninterrupted recording, and with customised notifications, can mitigate hardware or network disruptions. Hybrid Cloud Architecture: The All-in-One NVR provides 80TB of local storage for immediate access to live footage while seamlessly integrating with cloud storage for long-term retention. This hybrid approach ensures franchises can store footage for 30 days or more without overwhelming local resources. Centralised, Scalable Management: BCD’s solution is simple to deploy and typically takes 30 minutes or less, allowing franchises to monitor and manage surveillance across all locations from a single interface, simplifying administration and reducing operational overhead. The results Deploying BCD’s All-in-One Hybrid Cloud solution has the potential to drive significant improvements across multiple aspects of a franchise’s video surveillance operations, including: Enhanced Security: Reliable and cyber-hardened surveillance protect valuable inventory and reduce the risk of theft or vandalism. Continuous Uptime: The system’s failover mechanisms along with Harmonise Remote Monitoring and Management Plug-in ensures 24/7 recording with no interruptions, providing full coverage for liability and security events. Regulatory Compliance: Hybrid cloud storage allows each location to easily meet the 30-90-day retention requirement without costly local storage upgrades. Operational Efficiency: Centralized management and user-friendly tools reduce the complexity of overseeing surveillance across multiple locations, cutting costs and improving oversight. Future-Ready Scalability: As franchises expand, BCD’s solutions are designed to scale effortlessly to accommodate new locations and increased storage demands, providing a future-proof investment. Conclusion BCD’s All-in-One Hybrid Cloud NVR is an ideal solution for national franchises, such as car dealerships, and offers a secure, reliable, and scalable video data infrastructure. By leveraging hybrid cloud technology and simplified management, franchises will experience peace of mind knowing their assets are protected, compliance requirements are met, and their operations will be optimised for growth.


Round table discussion
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products


Videos

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download