Testing & Approvals
Suprema, a global pioneer of AI-based security solutions hosted the 'Suprema Global Partner Program (SGPP) 2024' in Malta, a Mediterranean island in Europe. The event brought together partners from around the world to discuss Suprema’s future vision and business strategies. SGPP 2024 The two-day event, held from November 20th to 21st, marked SGPP’s 13th anniversary. Inspired by Malta’s mythological significance as a turning point in Odysseus’s journey in The Odyssey, 2...
U.K. fire and rescue services (FRSs) Hereford and Worcester FRS, Shropshire FRS, Cleveland Fire Brigade, and Country Durham & Darlington FRS have selected Motorola Solutions to deploy a new Control Room Solution (CRS) utilising a shared control room platform to allow the four control rooms to work independently as well as a collaborative services hub. The new solution integrates workflows from initial call-taking to dispatch, into an intuitive and unified response system. It will...
AV-Comparatives, a globally recognised independent organisation specialising in cybersecurity testing, is pleased to announce the results of its 2024 Advanced Threat Protection (ATP) Test for enterprise cybersecurity solutions. This comprehensive evaluation provides Chief Information Security Officers (CISOs) with critical insights into the efficacy of leading endpoint protection products against sophisticated, targeted cyber threats. ATP Test The ATP Test rigorously assesses each product's a...
The Association of University Chief Security Officers (AUCSO), the renowned organisation for security professionals working in Higher and Further Education around the world, is to host its first European Region Winter Conference at Leiden University in the Netherlands. The Conference, which takes place from Wednesday, 27 November 2024 until Friday, 29 November 2024, is free to all AUCSO members. European Winter Conference Benny Vandenberghe, Chair of the European Region for AUCSO will o...
Invicti Security announces Kevin Gallagher’s return to the company as President. Gallagher brings over 20 years of experience working with a range of established organisations like Brinqa, Sun Microsystems, and BeyondTrust. Gallagher most recently held the position of CEO of Cososys, a data loss prevention software provider, where he helped lead the company to a profitable exit. Previously, he served as Chief Revenue Officer at Netsparker, Acunetix, and Invicti, where he managed global sa...
Secure Logiq is proud to mark the second anniversary of its regional headquarters in Business Bay, Dubai, on November 7, 2024. Impact in Dubai Since opening the office in 2022, Secure Logiq has made significant strides in the Middle East, forging impactful partnerships, winning industry awards, and supporting high-profile projects across the region. Driven by the immense potential and unique demands of the Middle Eastern market, Secure Logiq’s Dubai office has made its presence known ov...
News
Detection Technology, a global pioneer in X-ray detector solutions, unveils a comprehensive portfolio of flat panel X-ray detectors at the RSNA 2024 exhibition to advance medical imaging. This unique medical flat panel lineup includes 20 solutions that combine high frame rates with exceptional image quality at low doses and a wide dynamic range. Medical applications The newly enhanced portfolio is optimised for a range of medical applications, including image-guided surgery, wireless radiography, fluoroscopy, oncology, and dental imaging. “Our surgical imaging solutions offer versatile options with both amorphous silicon (a-Si) and IGZO (indium gallium zinc oxide) technology-based detectors,” explained Tuomas Holma, Director of Product Management at Detection Technology. X-Panel 2121a FDM “For example, we have the X-Panel 2121a FDM, featuring a 200 µm pixel size a-Si-TFT design, and the X-Panel 2323z FDM with a 148 µm pixel IGZO-TFT, both ideal for image intensifier replacement." "At the top of our surgical imaging and CBCT (Cone Beam Computed Tomography) range, the X-Panel 3030z FDM-TG-X, equipped with a 99 µm pixel and a 10 G Ethernet interface, delivers rapid 40 fps (1x1) imaging.” X-Panel 4343a FRM The portfolio extends to a-Si and IGZO detectors for dental imaging, oncology, and portable digital radiography For fluoroscopy, Detection Technology’s offerings include the X-Panel 4343a FRM with 140 µm a-Si-TFT and the X-Panel 4343z FDM with a 140 µm pixel IGZO-TFT, capable of operating at 40 fps (1x1). The portfolio also extends to a-Si and IGZO detectors for dental imaging, oncology, and portable digital radiography. Beyond flat panel detectors, Detection Technology is showcasing its off-the-shelf CT (Computed Tomography) detector solutions for all medical modalities. The comprehensive CT range includes the X-ACE 16 HD, a value-oriented solution; the X-ACE 32 for mainstream imaging; and the high-performance X-Tile for advanced volumetric CT systems. Enhanced patient experience “Our CT portfolio delivers lower radiation doses, faster scans, and superior imaging for an enhanced patient experience. Designed for quicker time-to-market and cost savings, it offers a reliable, one-stop solution built on trusted platforms, because in health and safety, only the most dependable solutions are acceptable.” Detection Technology is also providing a glimpse into the future of imaging technology with its exploration of photon-counting CT (PCCT) detectors, a promising advancement in imaging accuracy and detail. Detail and accuracy “Photon-counting CT represents a transformative leap in imaging technology, offering unprecedented detail and accuracy." "It’s a groundbreaking advancement that will empower clinicians with deeper insights and elevate patient care to new levels. We aim to lead the way in photon-counting CT and other next-generation imaging technologies.”
Bromsgrove-based security and monitoring company, Ecl-ips, is counting down to the North Worcestershire Business Awards on Thursday 21 November 2024 at Hogarths Stone Manor near Kidderminster. The company is among the 30 local businesses that have been short-listed for an award. Ecl-ips is a finalist in the ‘best use of technology’ award category along with Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer. Vape detector The nomination form Ecl-ips centered on the advanced technology that is provided by its vape detector offering, the HALO Smart Sensor. manufactured by IPVideo in the USA. Ecl-ips was one of the first companies in the UK to identify the potential of the technology that provides real-time alerts of vaping as well as providing indoor air quality monitoring. With all its solutions Ecl-ips aims to find the best partners to help meet the needs of its clients. HALO Smart Sensor The vape detector has proved to be very effective at improving pupil behaviour and reducing vaping This smart sensor has supported schools in the UK to tackle the problem of the rising numbers of young people who are vaping. Schools are finding that students are disrupting lessons by asking to go to the toilet and creating an intimidating atmosphere in the school toilets because more students are gathering in them to vape. When combined with strengthened behaviour policies and the use of CCTV outside the toilets to confirm the identities of students, the vape detector has proved to be very effective at improving pupil behaviour and reducing vaping at school. Customer comments Ecl-ips customer, Matthew Carpenter, Principal at Baxter College in Kidderminster, said, “It has transformed the amount of antisocial behaviour in toilets, children are more confident in going to the toilets." "It has also reduced the number of students asking to go to the toilet during lessons.” North Worcestershire Business Awards The North Worcestershire Business Awards are judged by an independent panel that said the finalists reflect “an impressive range of diverse businesses, all showcasing their commitment to growth, sustainability and adding extra value for customers.” In their sixth year, the awards are organised by North Worcestershire Business Leaders (NWBL) and the local authorities in North Worcestershire in partnership with Hogarths Stone Manor.
SoundThinking, Inc., a public safety technology company, has officially entered the rapidly growing licence Plate Recognition (LPR) industry with its new solution, PlateRanger™, powered by Rekor®. Building on its success in public safety technologies, SoundThinking is expanding its capabilities to include vehicle and licence plate recognition for law enforcement and public safety agencies across the country. End-to-end LPR solution Designed in collaboration with Rekor Systems, Inc., PlateRanger offers law enforcement agencies a cost-effective, end-to-end LPR solution that provides advanced investigative insights into vehicle-related crime. With an expected market value of $3.2 billion globally, the LPR industry has become critical for enhancing roadway intelligence and public safety. Reliable, actionable data “PlateRanger provides law enforcement with an essential tool to quickly identify and track vehicles involved in criminal activity, from theft and hit-and-runs to gun crimes and abductions,” said David Tawadras, Senior Director of Product Marketing at SoundThinking. “With PlateRanger, agencies can act swiftly on reliable, actionable data, allowing officers to focus resources where they’re needed most and resolve cases faster, making our communities safer and more secure.” PlateRanger This solution’s versatility supports agencies in improving both standalone investigations and gun crime response PlateRanger is equipped with a comprehensive package that includes solar power options, seamless integration with other SoundThinking solutions, and enhanced customer service, all available through a single subscription model. This solution’s versatility supports agencies in improving both standalone investigations and gun crime response when used in conjunction with SoundThinking’s ShotSpotter® technology. Privacy and security Additionally, privacy and security have been prioritised in PlateRanger’s design. SoundThinking has extended its robust privacy and data protection measures to ensure community safety and address privacy concerns related to licence plate recognition technology. SafetySmart™ platform expansion The entry into the LPR industry aligns with SoundThinking’s strategic growth and further expands its SafetySmart™ platform, which includes tools like ShotSpotter® for gunshot detection, CrimeTracer™ for investigative search, and CaseBuilder™ for investigation management. PlateRanger is available for immediate demonstration and quotation, providing agencies with a streamlined path to implement cutting-edge LPR capabilities.
The Department of Homeland Security (DHS), in consultation with the Department of labour (DOL), announced that it expects to make an additional 64,716 H-2B temporary nonagricultural worker visas available for Fiscal Year (FY) 2025, on top of the congressionally mandated 66,000 H-2B visas that are available each fiscal year. Additional H-2B visas These additional H-2B visas represent the maximum permitted under the authority provided by Congress and are identical to the additional temporary visas provided in FY 2024. DHS, in coordination with DOL, has authorised supplemental cap numbers in FY 2017, FY 2018, FY 2019, FY 2021, FY 2022, FY 2023, and FY 2024 under the time-limited statutory authority granted for each of those fiscal years by Congress. Supplemental visa allocation American businesses turn to seasonal and other temporary workers in the H-2B programme to help them American businesses in industries such as hospitality and tourism, landscaping, seafood processing, and more turn to seasonal and other temporary workers in the H-2B programme to help them meet demand for their goods and services. The supplemental visa allocation will help address the need for seasonal and temporary workers in areas where too few U.S. workers are available, willing, and qualified to do the temporary work and address the labour needs of American businesses. Robust protections Consistent with prior years, the Department is publicly announcing its plans to make these supplemental visas available early in FY 2025—just as it did in FY2023 and FY2024—to ensure American businesses with workforce needs can plan and find the seasonal and other temporary workers they need. At the same time, DHS and DOL have put in place robust protections for American and foreign workers alike, including by ensuring that employers first seek out and recruit American workers for the jobs to be filled, as the H-2B programme requires, and that foreign workers hired are not exploited by unscrupulous employers. Maximising the use of H-2B visa “The Department of Homeland Security is committed to further growing our nation’s strong economy,” said Secretary of Homeland Security Alejandro N. Mayorkas. “By maximising the use of the H-2B visa programme, the Department of Homeland Security is helping to ensure the labour needs of American businesses are met, keeping prices down for consumers while strengthening worker protections and deterring irregular migration to the United States.” H-2B supplemental rule The regulation would allocate supplemental visas for returning workers between the first half and second half The H-2B supplemental rule would include an allocation of 20,000 visas to workers from Guatemala, El Salvador, Honduras, Haiti, Colombia, Ecuador, or Costa Rica and a separate allocation of 44,716 supplemental visas that would be available to returning workers who received an H-2B visa or were otherwise granted H-2B status, during one of the last three fiscal years. The regulation would allocate the supplemental visas for returning workers between the first half and second half of the fiscal year to account for the need for additional seasonal and other temporary workers over the year, with a portion of the second half allocation reserved to meet the demand for workers during the peak summer season. H-2B programme The H-2B visa programme permits eligible employers to hire noncitizens to perform temporary nonagricultural labour or services in the United States. The employment must be temporary, such as a one-time occurrence, seasonal need, peak load need, or intermittent need. Employers seeking H-2B workers must take a series of steps to test the U.S. labour market. They must obtain certification from DOL that there are not enough U.S. workers who are able, willing, qualified, and available to perform the temporary work for which they seek a prospective foreign worker, and that employing H-2B workers will not adversely affect the wages and working conditions of similarly employed U.S. workers. Period of stay A person who has held H-2B nonimmigrant status for a total of three years must depart The maximum period of stay in the H-2B classification is three years. A person who has held H-2B nonimmigrant status for a total of three years must depart and remain outside of the United States for an uninterrupted period of three months before seeking readmission as an H-2B nonimmigrant. Eligibility and filing requirements DHS and DOL are committed to protecting H-2B workers from exploitation and abuse, and to ensuring, consistent with the law, that employers do not refuse to hire or appropriately recruit U.S. workers who are able, willing, qualified, and available to perform the temporary work. Additional details on H-2B programme safeguards, as well as eligibility and filing requirements, will be available in the temporary final rule when published and on the USCIS webpage.
Luminys Systems Corp (Luminys), a provider of smart, sustainable, and connected technology solutions announced the launch of its latest suite of security technology products designed for the North American market. The release is scheduled for a public unveiling during the "Luminys Phase 2 Product Launch" webinar on Nov. 15, showcasing an innovative product lineup that meets the modern demands for scalable, intelligent, and compliant security. Product lineup The new suite includes an array of network cameras, Network Video Recorders (NVRs), and the LumiCloud platform, a cloud-based Video Surveillance as a Service (VSaaS) solution. These offerings provide businesses with end-to-end security capabilities tailored for smart building and retail applications, reinforcing Luminys' industry-pioneering technology and longstanding as a pioneer in the security technology space. The product lineup integrates seamlessly with third-party applications and is compatible with existing Luminys technologies, enabling centralised control through the LumiCloud platform. FCC and NDAA compliance standards Freddy Kuo, chairman of Luminys, commented on the launch, "Our new product suite is designed to empower security professionals with tools for diverse applications to stay ahead in today's rapidly evolving landscape." "By aligning with stringent FCC and NDAA compliance standards and focusing on proactive innovation, Luminys is setting a new standard for comprehensive security solutions in North America." Key product highlights LumiCloud VSaaS Platform: Delivers real-time access, advanced analytics, and scalable cloud storage, enabling centralised management of security systems with customisable alerts and remote monitoring through smartphones and web browsers. LumiCenter Video Management Software (VMS): Seamlessly integrates surveillance cameras and AI-powered analytics, providing real-time object tracking, adaptive bandwidth management, and a fully interactive 3D mapping interface. LumiDeterrent Cameras: Featuring advanced LumiDeterrent technology, these cameras use AI-driven red and blue flashing lights, sound alarms, and full-color video capabilities for enhanced deterrence and 24/7 surveillance, even in low-light conditions. R5 LumiSearch NVR Series: Equipped with AI-driven search functionality, the R5 Series enables rapid identification and tracking across multiple camera feeds and supports long-distance Power over Ethernet (PoE) through Luminys's proprietary LumiPower technology. Innovative technology for comprehensive security This lineup is powered by Luminys's proprietary technologies, including: LumiAnalytics for people counting, behaviour analysis, and predictive insights. LumiTracking for automatic tracking of people and vehicles, enabling swift responses to potential security issues. LumiLuxSmart for adaptive lighting control, capturing full-color video when motion is detected and switching to infrared in low-activity environments. Webinar & availability This product launch will be live-streamed on Nov. 15 at 10 a.m. PT. Attendees will gain exclusive insights and demonstrations, including the LumiLuxSmart, LumiDeterrent, and LumiColor camera series. Luminys products will be available through certified dealers beginning Nov. 25, 2024, with pricing details and order information accessible via the Luminys MVP portal.
In a move set to reshape the industrial Augmented Reality (AR) market, RealWear, the global pioneer in wearable computing for industrial applications, today announced its acquisition of Almer Technologies, a Swiss pioneer in ultra-compact, user-friendly AR headsets. This acquisition, strategically and financially backed by TeamViewer, the leading provider of enterprise AR software, marks a significant leap forward in the mission to empower frontline workers worldwide with cutting-edge AR technology. Wearable AR devices As the industrial sector increasingly turns to digital solutions to enhance productivity and safety, the demand for intuitive, wearable AR devices has surged. This acquisition unites RealWear's market leadership with Almer's innovative approach to meet this demand. AR adoption "I'm extremely excited to welcome Almer and its founders, Timon Binder and Sebastian Beetschen to RealWear," said Dr. Chris Parkinson, CEO of RealWear. "Their successes in Europe are paralleled by a vision to drive AR adoption worldwide. This impact can now be brought to the global market as part of the RealWear ecosystem." Subscription-based hardware renting model "Almer's innovative subscription-based hardware renting model will enhance our existing portfolio to offer more flexible and scalable solutions for our partners and customers." "We have secured TeamViewer's renewed commitment and backing, strengthening our longstanding collaboration with the leading software company in the enterprise AR industry." Compact design Almer quickly gained recognition as a disruptive force in enterprise AR and set a new industry standard The acquisition brings together a powerful combination of strengths. RealWear's established market presence and rugged, voice-operated solutions are complemented by Almer's innovative, subscription-based AR headsets, known for their compact design and user-friendliness. With a relentless focus on execution and customer-centric solutions, Almer quickly gained recognition as a disruptive force in enterprise AR and set a new industry standard. Intuitive and effortless Sebastian Beetschen, CEO of Almer Technologies, added, "Almer's innovative approach for frontline workers has enabled us to deliver industrial AR solutions that are the most intuitive and most effortless to use." "We're excited to bring in our expertise and speed of execution to RealWear and push the boundaries of frontline worker solutions." Wearable technology TeamViewer has been a key partner and a strategic minority investor to RealWear and Almer before the acquisition TeamViewer has been a key partner and a strategic minority investor to both RealWear and Almer before the acquisition and will maintain this role moving forward. Global giants such as Coca-Cola HBC, Ford, Samsung SDS, and many more have experienced significant efficiency gains and cost reductions by leveraging the combined power of TeamViewer's software, RealWear's, and Almer's wearable technology. Integrating hardware and software Oliver Steil, CEO of TeamViewer, who has joined RealWear's Board of Directors, commented, "RealWear and Almer together unite the brightest minds in wearable computing to shape the future of the industry." "Investing in RealWear and supporting its growth is a strategic move for us and a stride into the future of industrial digital transformation. Our shared vision is to continue to integrate software and hardware innovatively, delivering world-class industrial productivity solutions for maximum customer value." Accessible and user-friendly As part of the acquisition, Almer's co-founders will join RealWear's executive team, creating a unified leadership focused on accelerating global AR adoption. Ultimately, this acquisition is set to make advanced technology more accessible and user-friendly for frontline workers across the globe. With this strategic acquisition and the continued backing of TeamViewer, RealWear is poised to lead the charge in the industrial wearables market. By blending software and hardware, the company aims to deliver world-class productivity solutions for maximum customer value.
Expert commentary
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasises not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification programme developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The programme emphasises the importance of both physical and digital security, recognising that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardised procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardised procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centres. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasising a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
HID, a worldwide pioneer in trusted identity and access control solutions, announced that Deskbee, a global provider of corporate space management solutions, has integrated HID Mobile Access and Identity Positioning technologies into its platform. With an already robust workplace management application, Deskbee wanted to enhance security and optimise operational efficiencies by integrating digital credentials and real-time positioning into its platform. HID Mobile Access With HID Mobile Access, Deskbee app users can employ their smartphones and tablets to securely access facilities, eliminating the need for physical cards and reducing the risks associated with lost or misused credentials. This implementation not only enhances convenience and security but also seamlessly integrates with existing systems, simplifying the issuance and revocation of credentials from a single platform. Identity Positioning technology By analysing occupancy data, managers can optimise space planning, improve resource allocation Furthermore, Identity Positioning technology enables building managers to track employee and visitor locations in real-time, providing valuable insights for optimising space planning and resource allocation. By analysing occupancy data, managers can optimise space planning, improve resource allocation (such as energy, water, and HVAC), and enhance overall operational efficiency. Secure, efficient, and personalised experience “The integration of HID’s Mobile Identities solutions demonstrates the enormous potential that application development companies have to transform access control systems and workplace management,” said Rogerio Coradini, HID’s Commercial Director of Physical Access Control in Latin America. “Through collaboration with HID, developers of mobile platforms and applications can adapt to the changing needs of the market and provide a more secure, efficient, and personalised experience for their clients.” Detailed monitoring and improved access management Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage Due to HID mobile identity technologies, Deskbee offers real-time dashboards that allow for detailed monitoring of space and access usage, providing accurate data on occupancy, location, and duration of stay. “The ability to automate the registration process and improve access management has been a significant change. HID's reliability and support have been fundamental to these advancements, and we are seeing how these results are positively impacting our clients. The trust in the brand and its support has been essential to our success,” said Gorguet. Employee badge integration Headquartered in Brazil, Deskbee has experienced rapid growth, consolidating its position in the Brazilian market and expanding its operations to more than 25 countries, including Mexico, Chile, Argentina, the United States, Portugal, Spain, Germany, and the United Kingdom. Still this year, the company will offer employee badge integration with Google Wallet, also powered by HID technology.
Matrix's client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs but also strategically positioned it for future advancements and scalability.
Type of Site: Apartment Building Location: Nagodziców 6-18, Warszawa, Poland The situation This is an older housing estate located in Nagodziców 6-18, Poland with 3 entrance gates and 105 apartments. The investor wants to retrofit the property to improve community safety and elevate residents' smart living experience. One of the main challenges in this retrofit is managing the wiring. How can the project minimize disruption to the building’s occupants and reduce the impact on residents’ daily activities? Additionally, how can costs be kept down to make the retrofit more economically attractive? Solution highlights No Wiring No Indoor Units Fast, Cost-Saving Retrofits Future-Proof Intercom Solution Installed products S615 4.3” Facial Recognition Android Door Station Smart Pro, an App-based Service without a Physical Indoor Monitor Solution benefits No Indoor Units, Cost-effectiveness: Users pay for a subscription-based service, which is often more affordable and predictable DNAKE cloud-based intercom services eliminate the need for expensive hardware infrastructure and maintenance costs associated with traditional intercom systems. Users don't have to invest in indoor units or wiring installations. Instead, users pay for a subscription-based service, which is often more affordable and predictable. No Wiring, Ease of Deployment: Setting up DNAKE cloud-based intercom service is relatively easier and quicker compared to traditional systems. There's no need for extensive wiring or complicated installations. Residents can connect to the intercom service using their smartphones, making it more convenient and accessible. Easy and Multiple Access Ways: In addition to facial recognition, PIN code, and IC/ID card, there are also multiple app-based access methods available, including calling & app unlocking, QR code, temp key, and Bluetooth. Residence can manage access from anywhere at any time.
Type of Site: Apartment Building Location: Chodkiewicza 10, Warszawa, Poland The situation This housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. One entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution highlights Easy Intercom Retrofitting with Existing Cables. Remote Access with App-based Features. Good Scalability for Easy Addition of New Units or Expansion. Installed products S615 4.3” Facial Recognition Android Door Station 290-S8 7” Linux Indoor Monitor (2-wire Version) Solution benefits Future-proofing: With DNAKE 2-wire IP intercom solution, residents can enjoy high-quality audio and video communication, multiple access options including remote access, and integration with surveillance systems, providing a more versatile and secure living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
Oskar Strøm, a renowned expedition pioneer, heads film expeditions in Svalbard. These expeditions focus on documenting polar bears in their natural Arctic habitat. To capture unique footage, the film crew lives in extreme conditions: enduring very low temperatures, residing in small sleeping pods, and positioning themselves near polar bears. Strøm required a solution to secure the camp and protect his team and valuable equipment from polar bears wandering around searching for food. Challenge Protecting a remote site from furry intruders and ensuring fire safety under extreme conditions Living next to polar bears in Svalbard to film them presents unique safety risks for Oskar Strøm’s crew. Hungry polar bears often dare into human camps to search for food and can threaten crew members or damage valuable equipment. Moreover, the lack of infrastructure necessitates generators, increasing fire risks. The crew’s compact sleeping pods create concerns about carbon monoxide buildup. This combination of wildlife threats, fire hazards, and potential CO poisoning in a remote Arctic location demands a comprehensive and reliable security solution capable of simultaneously addressing multiple risks in extreme conditions. System requirements Designlarm’s task was to develop a system to detect polar bear intrusions and alert the crew immediately. The solution had to protect personnel and expensive equipment, including generators and filming gear, while also including fire and carbon monoxide detection. The system needed to be easy and intuitive to install, requiring minimal maintenance, and capable of operating without laid cables or constant internet connectivity. This comprehensive security setup had to function effectively and self-sufficiently in Svalbard’s harsh environment, where technical support is not readily accessible. Solution A comprehensive wireless security system that withstands extreme Arctic conditions Designlarm chose the Ajax system for Oskar Strøm’s expeditions for its versatility, reliability, and intuitiveness. The Ajax ecosystem offers a comprehensive range of products that address all the expedition’s security needs. The system’s wireless operation was crucial for covering the camp area, where sleeping pods are spread out, and there are no structures for cable attachment. This wireless capability allowed for flexible placement of devices across the entire site, ensuring protection without the need for complex wiring. Hub 2 Plus Jeweller The security system for the Arctic expedition is built around Hub 2 Plus Jeweller. This control panel uses Ajax proprietary radio protocols Jeweller to ensure reliable communication between all devices without leaning on internet access. This feature is crucial in the Arctic, where 2G/3G/4G coverage is nonexistent, and the team relies on limited and expensive Starlink internet access. Two-way communication Due to reliable two-way communication, Hub 2 Plus Jeweller receives alarms from detectors and delivers them to users. This ensures no alarm will be missed, guaranteeing protection even without Wi-Fi or cellular communication. At the same time, occasional internet connections allow for system updates. Powered by a 12-24V PSU (type A), the Ajax hub operates on low-voltage sources instead of relying on a standard power grid, which is absent in remote Svalbard. DualCurtain Outdoor Jeweller detectors Four DualCurtain Outdoor Jeweller detectors are placed around the camp’s perimetre to guard the camp against polar bear intrusions. Each device features two narrow-angle motion detectors facing opposite directions and providing a total detection range of up to 30 metres (15 metres in each direction). This way, the bear’s approach will be registered in advance, not on the doorsteps of the sleeping pods. Software algorithm The viewing angle can be adjusted by 3 degrees horizontally on each side, eliminating blind spots and ensuring comprehensive coverage. To minimise false alarms caused by snow or small animals, the detectors use a software algorithm that analyses signals from IR sensors. When triggered, DualCurtain Outdoor Jeweller detectors send alarms to indoor and outdoor sirens, effectively alerting the crew if a polar bear enters the camp. MotionCam Outdoor (PhOD) Jeweller detectors MotionCam Outdoor (PhOD) Jeweller detectors serve as a second line of defense and provide motion detection with visual verification of alarms. When a polar bear crosses the perimetre, monitored by DualCurtain Outdoor Jeweller detectors, the system immediately triggers an alarm. While the bear moves around the camp, the built-in camera from MotionCam Outdoor (PhOD) Jeweller takes a series of photos, which the crew can see in the Ajax app within 9 seconds when connection to the internet is available. This visual verification allows the team to monitor the bear’s actions and exact location within the camp. Indoor and outdoor sirens They serve a dual purpose: warn the crew about an intrusion and aim to deter approaching polar bears Indoor and outdoor sirens were installed in the camp to alert the team of security violations and deter curious or aggressive polar bears. HomeSiren Jeweller devices are installed inside sleeping pods to quickly wake the crew if a polar bear breaches the camp perimetre. The sirens provide immediate notification of danger and are impossible to ignore. StreetSiren Jeweller devices are deployed for external alerting. They serve a dual purpose: warn the crew about an intrusion and aim to deter approaching polar bears thanks to a tone. StreetSiren can produce a sound of up to 113 dB, lasting up to 3 minutes. Ajax SpaceControl Jeweller key fob The Ajax SpaceControl Jeweller key fob is an essential component of Oskar Strøm’s security system. This compact device allows control of the alarm system even without the internet. With the key fob, users can arm, disarm, set night mode, or trigger an alarm manually. Its impressive 1,300-metre connection range to the hub ensures system control from various points around the camp. FireProtect 2 (Heat/Smoke/CO) Jeweller detectors In addition to the threat of polar bears, the expedition team faced the invisible danger of carbon monoxide poisoning. This risk is high in their small, tightly sealed sleeping pods, where CO can quickly accumulate to dangerous levels. To address this issue, Designlarm installed FireProtect 2 (Heat/Smoke/CO) Jeweller detectors. They have a built-in siren and LED indicator to alert when a sensor detects a threatening CO level. The detector is always active and reacts 24/7, regardless of the system’s security mode. In addition, the detector will also alert the team of the fire. Its unique smoke chamber doesn’t require regular cleaning, while a dual-spectrum sensor differentiates smoke from steam, reducing false alarms. Durability and reliability The Ajax security system has demonstrated remarkable durability and reliability even in extreme Arctic conditions. Despite being rated for temperatures down to –40 °C, the system operated effectively at –45 °C. For over 1.5 months, outdoor devices such as DualCurtain Outdoor Jeweller, MotionCam Outdoor (PhOD) Jeweller, and StreetSiren Jeweller have been operating without issues in these severe conditions. The only notable effect of extreme cold was faster battery drainage, which is expected at such low temperatures. However, this wasn’t a significant issue as the system informs users about low battery levels in advance. Anticipating this challenge, the expedition team had prepared by bringing an ample supply of spare batteries. Why Ajax Performance surpassing expectations. Ajax devices have demonstrated exceptional reliability in harsh Arctic conditions and outperformed their specified operational parametres. They provided dependable protection against polar bear encounters and other potential threats in one of the world’s most challenging environments. Reliable operation without constant connectivity. An Ajax security system functions effectively without continuous connection to the internet. Hub 2 Plus Jeweller maintains communication between all devices and continues to process and respond to alarms even when there is no internet connection. System mobility and ease of installation. One person managed to install and configure the entire system using the intuitive Ajax app. The whole process is fast and does not require specialised tools. Products Hub 2 Plus Jeweller: Security system control panel. 12-24V PSU (type A): Power supply unit for the device operation on a low-voltage power source. DualCurtain Outdoor Jeweller: Wireless bidirectional curtain IR motion detector. For outdoor and indoor use. MotionCam Outdoor (PhOD) Jeweller: Wireless IR motion detector that takes on-demand photos and photos by alarm, schedule, and scenario. For outdoor and indoor use. FireProtect 2 (Heat/Smoke/CO) Jeweller: Wireless fire detector with heat, smoke, and CO sensors. Version with replaceable batteries. HomeSiren Jeweller: Wireless indoor siren. StreetSiren Jeweller: Wireless outdoor siren with vandalism resistance. Ajax SpaceControl Jeweller: A key fob for controlling security modes.
Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. However, in the end, overlooking critical factors can undermine the totality of system performance. We asked this week's Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimise the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download