Veterans in security
Cobb County-based security company, LOUD Security Systems Inc., just got LOUD-er with the recent acquisition of Vytis Security Systems, an Atlanta-based company with a focus on 100% commercial systems. The acquisition will help solidify LOUD Security as a leading commercial security provider. Like LOUD Security, Vytis provides security solutions to business challenges through video surveillance, access control, fire systems and monitored security. The company services all levels of security nee...
Matrix, a pioneer in cutting-edge security and telecom solutions, is excited to announce its participation in the SAFE South Expo 2024, scheduled to be held from July 5th - 6th at the Chennai Trade Centre. This premier event will provide a platform for Matrix to showcase its innovative offerings in IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions. Advanced security solutions At SAFE South Expo 2024, Matrix will demonstrate its robust security portfolio...
The Federal Public Service Policy and Support (BOSA), a key component of Belgium’s federal administration, with support from Cryptomathic, a global pioneer in data security and cryptography, has successfully launched one of Europe’s first digital identity wallets. In line with the European Digital Identity Framework Regulation, eIDAS 2.0, the Federal Government of Belgium has launched MyGov.be, a single app providing access to a wide range of digital public services, information an...
ASIS International, the organisation for security management professionals worldwide announced the appointment of William 'Bill' Tenney as its new Chief Executive Officer, effective 1 July 2024. Tenney brings close to 35 years of security leadership experience from both the public and private sectors to his new role heading the acclaimed global security association. William 'Bill' Tenney As ASIS International’s CEO, Tenney will spearhead the organisation's strategic vision, workin...
Hanwha Vision has named Jason Swanson as Business Development Manager for the Restaurant and Retail markets. The industry veteran will draw on his extensive store and food service experience to ensure Hanwha solutions address operators’ unique surveillance challenges and requirements for protecting their premises, employees and customers. Swanson’s appointment continues Hanwha’s commitment to building teams that include subject matter experts with first-hand market knowle...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has achieved substantial growth in the state of Pennsylvania over the last year. The company has more than doubled its footprint in the state, hiring dozens of Pennsylvania veterans, technologists, and skilled employees for high-paying emerging technology jobs with a global impact. With concerns for public safety on the ri...
News
LiveAction, a pioneering provider in end-to-end network security and performance visibility, has announced pivotal appointments to its EMEA leadership team. The strategic hires of Ian Gallagher as Regional Sales Director for Northern Europe, Guntram Allfen as Regional Sales Director for Central Europe, and Sebastien Texier as Regional Sales Director for France, underscore LiveAction's commitment to accelerating growth and customer success across the European region. Strengthening LiveAction's connection Gallagher brings a wealth of expertise in networking and security from his enterprise roles With over two decades of selling experience in enterprise and global markets, Ian Gallagher brings a wealth of expertise in networking and security from his enterprise roles at VMware, Extreme Networks and Brocade. Guntram Allfen, who previously led sales for the DACH region at Avi Networks (acquired by VMware in 2019), has a deep understanding of network and security offerings, coupled with his experience at NetIQ, NetScout, and Riverbed. Sebastien Texier, an accomplished veteran with over 25 years of experience in networks, analytics, and cloud computing, joins LiveAction after a successful stint at ThousandEyes, a Cisco company, further strengthening LiveAction's connection to the Cisco ecosystem. Unparalleled network intelligence “Ian, Guntram, and Sebastien are exceptional sales pioneers with proven success in delivering value to customers and partners in the European market," said Carlos Ferro, Senior Vice President and General Manager of International at LiveAction. “Their appointments strengthen our commitment to providing unparalleled network intelligence and support to enterprises across the region as they navigate increasingly complex networking and security challenges.” Comprehensive network visibility As enterprises embrace digital transformation and adopt hybrid cloud architectures, the need for comprehensive network visibility and performance management has become paramount. LiveAction's industry-pioneering solutions empower organisations to gain end-to-end visibility and unified control over their networks, applications, and security posture. With a growing presence and deep expertise in the European market, LiveAction is well-positioned to support enterprises in optimising their network infrastructures and ensuring business continuity.
The CMOOR Group, a global provider of cloud-based compliance and continuous education solutions for the security, fire, and life safety industry, has announced the appointment of Dan DeBlasio as Director of Business Development. DeBlasio brings over 25 years of experience in enterprise software and enterprise sales, with a specific focus on security solutions, making him a valuable asset to The CMOOR Group team. Dan DeBlasio's responsibilities In his new role, Dan DeBlasio will spearhead efforts to strengthen The CMOOR Group's brand recognition within the security, fire, and life safety markets. He will target key verticals including manufacturers, integrators, and dealers, focusing on both direct sales growth and strategic relationship building. This will involve cultivating a robust sales pipeline and establishing high-level connections with existing customers and potential partners. Dan DeBlasio's work experience DeBlasio's impressive background includes diverse leadership positions within the security sector DeBlasio's impressive background includes diverse leadership positions within the security sector. Before joining The CMOOR Group, he served as an account manager at Xerox, senior director and consultant at Secure Consulting, and director of business development for HID Global, Security Dealer Marketing, and Irvine Sensors. His experience encompasses the convergence of physical and logical access solutions, along with a proven ability to bring licensing and certification offerings to market successfully. Dan DeBlasio's contribution Dan DeBlasio will actively contribute across all of The CMOOR Group's divisions. This includes SecurityCEU.com, ShowMYBadge.com, the SUTRA Learning Management System, License Consulting, Custom Content Development, and the Obsequio Compliance Management System. "Dan's extensive experience in the security industry, coupled with his strong network of contacts and dedication to building relationships, makes him a perfect fit for The CMOOR Group," said Connie Moorhead, CEO of the company, adding "We are confident that he will significantly contribute to our customer base and the continued growth of The CMOOR Group." Training and services "I am incredibly excited to join a company as respected as The CMOOR Group, a pioneer in delivering exceptional training and services within the security domain," said Dan DeBlasio, adding "I look forward to collaborating with the team and contributing to the company's ongoing success."
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions is pleased to announce that industry veteran Charles Burns has joined the company and will serve in the newly created role of Director of Commercial Facilities. With more than two decades of experience as a security pioneer, Burns will work to drive increased adoption of ISS’ industry-pioneering video intelligence solutions in stadiums, arenas, convention centers, and other large-scale commercial facilities throughout North America. Charles Burns' experience Burns, who originally began his career in law enforcement with the Indiana State Police, has an extensive background in the spectator sports industry, most recently serving as Vice President of Security for the NFL’s Miami Dolphins and Hard Rock Stadium and as Vice President of Security and Risk Management for the NBA’s Cleveland Cavaliers and Rocket Mortgage Field House before that. Additionally, he has also worked at the highest levels of security in motorsports, having served as Director of Corporate Security for the Indy Racing League and Indianapolis Motor Speedway, home of the Indianapolis 500, as well as General Manager of the Chevrolet Detroit Belle Isle Grand Prix. Video intelligence His career also includes stops at rideshare giant Uber, where he served as Global Head of Security, New Mobility His career also includes stops at rideshare giant Uber, where he served as Global Head of Security, New Mobility, and ASM Global, one of the largest venue management firms in the world, where he worked as Vice President and Chief Security Officer. “Having spent more than 20 years as a security executive, I believe I bring a unique perspective to my new role at ISS. I have had the opportunity to personally evaluate and leverage the latest and greatest solutions our industry has to offer throughout my career and I believe that video intelligence will drive a new technological revolution in the market,” said Burns. AI-powered software “In looking at the video intelligence landscape, it was apparent to me that ISS has the most comprehensive suite of AI-powered software on the market that not only delivers insights that others can’t match, but that also routinely performs at accuracy rates of 90% or greater." "I look forward to lending my expertise to other security pioneers throughout the industry as they further explore how AI and video analytics can address their security, safety, and operational needs." Lessons-learned approach “At ISS, our goal is to bring a lessons-learned approach to our customers and partners,” added Matt Powell, Managing Director for North America at ISS "Topics like AI, video intelligence, and analytics are challenging to understand and we knew we needed someone to help translate our capabilities to the needs of customers in the commercial facilities space." Matt's comment “Charles’ experience as an end-user helps us to better orient our product toward the challenges that end-users face while simultaneously helping those same users understand how our capabilities match their needs. We are excited to have him on our team and can't wait to see how he helps us change the industry in the future.” Burns is the third subject matter expert to join the ISS team since November when Scott McGinnis and Joe Harvey joined the company as ISS healthcare and ITS market pioneers respectively.
Allied Universal®, the world’s major security and facility services provider, has been selected by BMO Stadium as its event services provider, offering comprehensive temporary staffing, consulting, and security. Allied Universal’s expertise in supporting large venues enables BMO Stadium to focus on ensuring the success of concerts and sporting events. BMO Stadium BMO Stadium in Los Angeles hosts concerts by world-renowned music artists and is home to the Los Angeles Football Club (LAFC) and Angel City Football Club. In addition, Allied Universal is actively recruiting to fill more than 500 positions to support the 22,000-seat stadium which is located south of the University of Southern California campus. Event services expertise “Allied Universal is pleased to bring our decades of expertise in event services to support BMO Stadium and the Southern California community it serves,” said Ty Richmond, President of Allied Universal Events Services. Ty Richmond adds, “In addition, we are excited to offer opportunities for members of the community to apply for event services positions which provides them with a unique opportunity to not only attend concerts and sports events but get paid to experience the excitement surrounding their favorite artists and soccer teams.” Employment opportunities “Allied Universal offers careers and long-term growth in the thriving and essential security industry,” said Steve Jones, Global Chairman and CEO of Allied Universal, adding “We have countless examples of individuals who began their career as a security professional and are in senior leadership positions today.” Global employee survey In a recent global employee survey completed by nearly a half million Allied Universal security professionals, workplace satisfaction was high among team members with the areas of “feeling respected by their leadership team” and “recommending their workplace to family and friends” coming in on top. More than 80% of employees are proud to be a member of the Allied Universal team. More than 75% are satisfied with their job and feel that Allied Universal has a positive effect on society and local communities.
Exabeam, a global cybersecurity pioneer that delivers AI-driven security operations announced two pioneering cybersecurity features, Threat Center and Exabeam Copilot, to its market-pioneering AI-driven Exabeam Security Operations Platform. Threat Center A first-to-market combination, Threat Center is a unified workbench for threat detection, investigation, and response (TDIR) that simplifies and centralises security analyst workflows, while Exabeam Copilot uses generative AI to help analysts quickly understand active threats and offers best practices for rapid response. These pioneering-edge innovations greatly reduce learning curves for security analysts and accelerate their productivity in the SOC. Simple, central interface “We built Threat Center with Exabeam Copilot to give security analysts a simple, central interface to execute their most critical TDIR functions, automate routine tasks, and supercharge investigations for analysts at any skill level,” said Steve Wilson, Chief Product Officer, Exabeam. “These new features amp up the value of our AI-driven security operations platform and take analyst productivity, efficiency, and effectiveness to new heights." Lightening the workload "Threat Center helps security analysts overcome one of the biggest challenges we’ve heard from them having to deal with too many fragmented interfaces in their environments." "By combining Threat Center with Exabeam Copilot we not only improve security analyst workflows, we also lighten their workload.” Solving for lack of visibility and automation Security operations teams are often challenged with managing multiple security tools Security operations teams are often challenged with managing multiple security tools, which can lead to siloed data and a lack of visibility into threats. This can make it difficult to understand their entire threat landscape and execute TDIR on time. According to Exabeam’s recent The State of Threat Detection, Investigation, and Response (TDIR) Report 2023, organisations globally reported that they can “see” or monitor only 66% of their IT environments, leaving ample room for blind spots. Outcomes Navigator feature Exabeam customers are already using the Outcomes Navigator feature as a driver to know what parts of their environments they can monitor for TDIR and where coverage improvement may still be needed. Threat Center streamlines these processes further to remediate threats against covered areas faster. AI and automation With Threat Center and Exabeam Copilot, the Exabeam Security Operations Platform applies AI The report also reveals that only slightly more than half (53%) of global organisations have automated 50% or less of their TDIR workflow. With Threat Center and Exabeam Copilot, the Exabeam Security Operations Platform applies AI and automation to security operations workflows for a holistic approach to cyber threats, helping companies solve for a lack of automation and ultimately accelerating response. Accurate and consistent TDIR Powered by AI-driven detection, the Exabeam platform easily pinpoints high-risk threats by learning the normal behaviour of users and entities and prioritising threats with context-aware risk scoring, all presented through the Threat Center interface for faster, more accurate, and consistent TDIR. Revealed as the second most identified need in the Exabeam TDIR report, 35% of respondents reported a desire for an improved understanding of normal user and entity, and peer group behaviour within their organisation. Generative AI model Threat Center unifies threat management, investigation tools, and automation to accelerate and efficiently investigate and respond to threats. Powered by an advanced security-trained, generative AI model, Exabeam Copilot supercharges security analyst investigations. Threat Center with Exabeam Copilot helps analysts: Understand an entire threat that spans multiple detections to tell a complete story of what happened. Conduct complex powerful search queries in plain natural language. Understand a threat, and know how to respond, using generative AI threat explanations for clear cross-organisation communication. Automate routine tasks, expose hidden threats, and greatly accelerate response times. Prioritise alerts and cases, with context-aware risk scoring. Reduce the number of alerts that analysts need to investigate – detection grouping associates related entities and events. Optimise SOC team collaboration with case sharing, case escalation, and shared notes. Visualise evidence with interactive threat timelines and instant access to relative data including behavioural models, users, and endpoints. Author automation rules critical to SOC workflows, such as escalating specific alerts to cases or queues via APIs or webhooks. Utilise pre-built playbooks with the ability to view, disable, or clone for easy customisation. Maximise Microsoft Sentinel investment with Exabeam The AI-driven Exabeam Security Operations Platform helps security teams realise the full potential In addition to identifying high-risk threats, providing faster, more accurate investigation and response, and improving threat coverage, the AI-driven Exabeam Security Operations Platform helps security teams realise the full potential of their security investments. Also announced, customers can add Exabeam TDIR capabilities on top of existing Microsoft Sentinel deployments. Extending industry-pioneering Exabeam analytics and automation to Microsoft Sentinel helps organisations realise the new potential of their SIEM. Automated workflows With Exabeam, Microsoft Sentinel users can see new detections with broader insights and automate workflows, ingest data from a wide range of Microsoft and best-of-breed security products, and accelerate the TDIR capabilities of their SIEM deployment. The Collector for Microsoft Sentinel adds to a growing list of supported SIEM products - Splunk and IBM QRadar, to name a few. Customer feedback Dayforce “The potential of generative AI to drive accuracy and speed within the SOC delivering increased productivity is becoming a reality through features like Threat Center and Exabeam Copilot,” said Colin Anderson, Chief Information Security Officer, Dayforce. “Threat Center will save analysts countless hours by enabling SOC analysts to work from one single interface performing investigations and taking actions against identified threats. The Exabeam Copilot AI virtual assistant will be a force multiplier for SOC teams helping to improve cybersecurity across organisations.” SA Power Networks “We are pleased to see the new detection grouping logic inside Threat Center that will give us the comprehensive context we need in one spot about multiple security alerts without having to pivot to another location, this will be especially helpful when multiple alerts turn out to be related to a single threat impacting more than one user or entity on the network,” said Lindbergh Caldeira, Cyber Security Operations Manager, SA Power Networks. “We are equally excited to work with Exabeam Copilot, which is like having a subject matter expert right by your side as you investigate and respond to incidents. Exabeam Copilot will help veteran and new analysts alike be far more efficient in the SOC.” VyStar Credit Union “We are excited to see Exabeam’s generative AI-powered features integrated into their latest technology. You don’t choose your threats. Your threats choose you with little to no warning. We look forward to using Threat Center for a cohesive platform that will allow us to protect our members’ assets and financial data,” said Carl Scaffidi, Chief Information Security Officer, VyStar Credit Union. “Exabeam Copilot will let us ask very specific questions and get immediate actionable answers, speeding up threat hunting, investigation, and response times.” The general availability of the new features begins in March 2024.
Brinks Home™, one of North America’s pioneering home security and alarm monitoring companies, welcomes sales veteran Mike Hackett as its Senior Vice President of Enterprise Business Development. With a proven track record of driving growth and establishing successful partnerships throughout his more than 25 years of sales and marketing experience, Hackett is set to play a pivotal role in advancing Brinks Home's strategic initiatives. Mike's extensive experience In his new role, Hackett will oversee the overall strategic direction of Brinks Home’s business development and enterprise partnerships efforts. “We are thrilled to welcome Mike to our team,” said William Niles, CEO of Brinks Home. “Mike's extensive experience and profound understanding of product and sales, coupled with his connections in the industry, align seamlessly with our vision for our brand, growth, and innovation. We are confident that his strategic insights will play a crucial role in driving our enterprise partnerships to new heights and further solidifying our position in the market.” Prior roles of Hackett Hackett spent 10 years in multiple positions at eBay, focusing on business development Hackett has led and advanced the capabilities of large organisations in the security, technology, e-commerce, and manufacturing industries. Before joining Brinks Home, Hackett was Vice President of Global Sales and Marketing for Johnson Controls. He also co-founded Silicon Valley-based security and smart home manufacturer Qolsys and held a Vice President of Sales and Marketing role throughout his tenure. Earlier in his career, Hackett spent 10 years in multiple positions at eBay, focusing on business development and growth through key partnerships. Hackett holds a Bachelor of Science in Advertising from San Jose State University. Realm of smart home security “I’m excited to join the Brinks Home team, leveraging the strength of the brand to develop enterprise partnerships in adjacent industries such as energy management, insurance, residential construction, and telecommunications. As consumer demand for smart homes moves from early adopters to mass market, Brinks Home is uniquely positioned to deliver next-generation smart home solutions, a trusted brand and a national footprint,” added Hackett. Brinks Home is committed to enhancing its capabilities and pioneering innovative solutions in the realm of smart home security. Investing in business development reinforces the mission of empowering individuals with cutting-edge technologies and comprehensive security measures, ensuring that Brinks Home remains a trusted partner in protecting homes and loved ones across the nation.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand car salesperson or estate agent of the popular imagination. Management of added services Yet we buy from retailers and marketplaces every day without complaint. As long as we see a middleman as providing value and convenience rather than getting in the way, they’re safe. This does mean, however, that resellers and integrators need to carefully manage how they are perceived and how much their added services are valued by their customers. The risk to security integrators Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies Businesses have often relied on security integrators to break down silos between security systems to strengthen both physical and cybersecurity postures. Typically, these have been seen as separate, but the increase in remote working and the adoption of cloud-based physical security has blurred the lines between the physical and the digital. Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies, rather than a siloed approach that will mean one is more secure than the other, and security integrators can help bridge this gap. Macroeconomic headwinds, digital transformation Security integrators have also proved invaluable in filling skill gaps within organisations. Not every business can be expected to have the staff and skills needed to successfully overcome integration challenges, they may have cybersecurity and physical security experts, but perhaps not both. And if they do have experts on staff, they may lack knowledge of the cutting-edge technologies that will protect their businesses best. This unique and esteemed role of security integrators is today at risk of disruption. Macroeconomic headwinds mean that businesses are scrutinising every budget line and asking if each is necessary. Digital transformation means they are questioning old ways of doing things are the providers they worked with five years ago, or longer, the same people who are going to give them the best value today? Research findings on current trends Unfortunately, many security integrators are not keeping up with change. Our research has found that only 26% of customers consider integrators up to date with the latest technologies. Businesses rely on these providers to navigate a new and confusing security landscape and only one in four say they are confident their partners have researched the road ahead. In the past, providers may have relied on having better knowledge than their customers. But 73% of security solutions buyers are doing their research on vendors and technology. Integrators risk being underprepared to serve a market that is more and more educated in the products they are providing a dangerous situation for any middleman. Finding the gap Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? The research suggests a shrinking gap for security integrators. Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? However, the problem may not be as dire as the research first suggests as long as integrators act to address the risks they face. Education Businesses are educating themselves about the market. They want to know what is available to stay safe, both in a physical environment and from online threats. This is understandable given how the news cycle, both of these spaces have seen an increase in potential threats, and the cost of cleaning up after a ransomware or similar attack has spiralled. Any sensible business will review what they have in place and their future options. Advance industry knowledge It has never been more important for the integrator community to advance their industry knowledge. They truly are the experts, and have an in-depth understanding of the latest trends, the advancement in cloud security, and the shifting demands of users. They also need to provide better service and consultancy. As the security world gets smarter and more cloud-based, security integrators who are well-informed and educated will have a clear advantage in the market. After all, most businesses don’t want to spend time researching and upskilling in areas where they can effectively outsource. Security integrators must be able to reassure their customers that they are up to the task. Bring on added value But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value The problem may be perceptions rather than the actual value that integrators can offer. If integrators are more informed than their customers realise, they need to do more to let their customers know. This could be down to being too reactive i.e., not anticipating customer needs and simply waiting for them to ask for particular services or products or not demonstrating knowledge as part of regular customer service. There is still very much of a gap for security integrators in today’s market. They can survive in this gap. But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value, more than a middleman, but a provider that can advise on the right products to meet specific needs and make those products work for their customers in an integrated way. Reinventing via consultancy They need to provide consultancy so their customers understand how best to ensure online and physical security work together to keep a business safe. Most of all, they need to demonstrate their knowledge to their customers and make sure they understand the value they bring. Businesses won’t be safer by relying on their research and knowledge to buy and install security products, but if they don’t understand the benefits of a specialist integrator, they may choose this route. It’s up to security integrators to reinvent themselves as the better kind of middleman if they want to remain relevant.
Security beat
Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for the larger companies. Acquisitions of Motorola Motorola Solutions has been among the most acquisitive of the larger players, recently adding several smaller companies to their growing portfolio. Just this year, Motorola has acquired Ava Security, a video security and analytics company; Calipsa, another analytics company; and Videotec, an Italian provider of ruggedized video solutions for critical infrastructure applications. Video solutions that help to enhance safety and streamline operations while supporting customers In one announcement, Motorola chairman and CEO Greg Brown stated the goal of acquisitions is “to support our customers’ evolving security needs by expanding our portfolio of intelligent video solutions that help to enhance safety and streamline operations.” Previously, Motorola Solutions acquired Envysion, a video analytics company for the retail market. On the access control side, Motorola acquired Openpath Security, a cloud-based, mobile access control provider, in 2021. Motorola entered the video surveillance business back in 2018 with the acquisition of Avigilon for around $1 billion. Also now a part of Motorola are IndigoVision and Pelco, among others. ACRE's mergers and acquisition Another company active in the mergers and acquisition market has been ACRE (Access Control Related Enterprises). The company began with a spinoff from Ingersoll Rand in 2012 to become Vanderbilt Industries. As ACRE, the parent company has been active both in acquisitions and divestitures over the next decade. Vanderbilt grew with the acquisition of Siemens’ Security Products in 2015. ACRE owned Mercury Security, a manufacturer of OEM hardware used by access control companies, from 2013 until it was sold to HID Global in 2017. The acquisition of Razberi enhances the ComNet portfolio while providing complementary technologies ACRE’s more recent access control acquisitions are RS2 Technologies (in 2019), Open Options (2018), Feenics (2021), and Matrix Systems (2021). They acquired ComNet, a manufacturer of video and data transmission equipment, in 2016. The acquisition of Razberi (in 2020) enhances the ComNet portfolio and provides complementary technologies to the access control brands. Acquisition of ACRE ACRE itself was acquired by European investment firm Triton in 2021, and Joseph Grillo, the company’s founder and CEO, announced his retirement in 2022. His knowledge of the security and access control markets helped to drive the company’s growth, including 11 successful acquisitions in all. Securitas acquiring Stanley Security The acquisition of Stanley Security is transformational for both Securitas and the security industry Stanley Security has also made headlines. In December 2021, Securitas signed an agreement to acquire the Electronic Security Business from Stanley Black & Decker for $3.2 billion in cash. Securitas President and CEO Magnus Ahlqvist says, “the acquisition of Stanley Security is transformational for both Securitas and the security industry.” Allegion plc, global security products and solutions provider, later signed an agreement to acquire Stanley Access Technologies and assets related to the automatic entrance solutions business from Stanley Black & Decker, Inc. for $900 million. Acquisition by HID Global, ADT Inc. & Allied Universal HID Global has acquired Vizinex RFID, thus increasing its presence and relevance in key vertical markets, including healthcare/medical, manufacturing, oil and gas, data centres, etc. and adding a key technology to HID Global’s RFID tag portfolio. ADT Inc. recently expanded its geographic reach with the acquisition of Key-Rite Security, a locally owned and operated security provider specializing in access control, surveillance, intrusion, and intercom systems in Colorado and for customers across the United States. Allied Universal continues its strategic growth with the acquisition of Attenti Group, an electronic monitoring company Allied Universal has acquired Star Protection Agency, the largest Hawaiian-owned and veteran-owned security company in the state. Although Star is primarily a guard patrol service, with workers at 125 sites throughout the state, it provides a range of security technology and consulting services. Internationally, Allied Universal continues its strategic growth with the acquisition of Attenti Group, an electronic monitoring company. Allied Universal will integrate Attenti Group with G4S Monitoring Technologies, to create Allied Universal Electronic Monitoring Services. SALTO Systems making acquisition news Also internationally, SALTO Systems has made acquisition news by investing in Bluefield Smart Access, thus strengthening their portfolio of access control solutions. SALTO Systems is a manufacturer of electronic access control and operating system solutions, designed to provide a seamless, keyless and mobile experience for modern buildings. Also joining the SALTO Group is Cognitec Systems, a face recognition company. The goal is to strengthen their research, development and market reach while working with SALTO on new technologies for expanding biometric markets. SALTO strategically selected Cognitec Systems to meet market requests for adding face recognition and artificial intelligence (AI) technologies to the company’s electronic access control and ticketing solutions. Acquisitions by MOBOTIX and Resideo Technologies Resideo Technologies, Inc. entered into an agreement to acquire First Alert, Inc., a provider of home safety products Further, on the international scene, MOBOTIX has reached an agreement to acquire Vaxtor Group, Tres Cantos, Spain, an artificial intelligence (AI) based video analytics provider, specializing in Optical Character Recognition (OCR) and Deep Learning technologies. On the residential system's front, Resideo Technologies, Inc. entered into an agreement to acquire First Alert, Inc., a provider of home safety products, from Newell Brands Inc. for $593 million in an all-cash transaction. Established in 1969 and based in Aurora, Illinois, First Alert offers a strong omnichannel presence serving end-users directly through retail and e-commerce channels and professional contractors through relationships with distributors and home builders.
Case studies
The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. ALCEA is the brand formerly known as ASSA ABLOY Global Solutions - Critical Infrastructure. The ALCEA Traffic Cabinet Locking Solution has gained traction with transportation infrastructure departments in major cities across the United States. It was developed by Jerry Burhans, managing director for North America, and Michael Woody, manager of the ALCEA Competence Centre in Irving, which shares a border with Grand Prairie. Now this access management solution is beginning to impact medium-sized communities like them. Proactive cybersecurity measures Perez said this skill project will save all city signal cabinets from tampering and unauthorised key Raul Perez, a 13-year transportation industry veteran who has served as Grand Prairie’s ITS Specialist for 2-1/2 years, said this installation project will protect all city signal cabinets from tampering and unauthorised access. Involving 240 smart locks, 210 high-security mechanical locks and padlocks on all city traffic cabinets plus 10 message boards, 191 mechanical locks for all school flashing sign cabinets, and 20 Bluetooth keys is in step with the city’s policy of adopting proactive cybersecurity measures. “Having control over who has access and when to our traffic cabinets was a major driver for this project,” he acknowledged. “We have not had people trying to force their entry into our cabinets, but we did have several occasions where contractors were gaining access to them without permission or notice. ALCEA was the clear choice for our smart lock needs, offering a solution that aligns with our requirements.” Substantial growth and the need to safeguard assets Grand Prairie has a long history associated with technology. Located in the Dallas-Fort Worth metroplex, it is the sixteenth largest city in Texas with a population of more than 207,000 people. During World War I and since, it began an association with the defence and aviation industries and served as an aircraft production site. The city sits 12 miles west of downtown Dallas and is only 10 minutes south of the Dallas-Fort Worth International Airport. With rail lines and major interstates 20 and 30 running through it, Grand Prairie has become a well-established distribution centre. The majority of the Great Southwest Industrial District’s approximately 80 million square-feet of space is in the city. State’s transportation infrastructure Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states Combine major attractions like the Lone Star Park horse racetrack and Epic Waters, one of the largest indoor waterparks in Texas, and the city’s 81 square miles of road experience heavy traffic activity all day long. Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states. After an unprecedented boom, the U.S. Census Bureau declared it is now home to more than 30 million residents following a 43% increase from 2020 to 2022. That development in part led to the Texas Department of Transportation announcing a $142 billion investment in the state’s transportation infrastructure last August as part of a 10-year state roadways plan. About the same time the announcement was made is when the city of Grand Prairie began researching options for a separately funded project to increase cybersecurity preparedness. Flexibility of a Hybrid Locking Solution “I started looking for smart locks and found ALCEA’s mechanical lock with a high security key during an online search. I was intrigued so I contacted them, inquired about their product and arranged a visit to their office for a presentation,” said Perez, who also evaluated the offerings of three other vendors. “It was then I learned about the capability of unlocking both the electronic and mechanical locks – including padlocks – and the versatility of their keys. I was very impressed by the user-friendly design of their Bluetooth smart key,” he said in reference to the ABLOY PROTEC2 CLIQÔ system. Mechanical and electromechanical locks Remote access control system mixes the parts of robotic and electromechanical locks The remote access management system combines the best characteristics of mechanical and electromechanical locks. After the initial meeting with ALCEA, Perez said he was convinced of the value of this hybrid solution but had to secure buy-in from his supervisor and department director. “Working with the ALCEA team, we tailored a price quote aimed at convincing our department director to allocate funds for this investment. The initiative was successfully integrated into our budget by the end of 2023, and the purchase order was placed in mid-January.” Demonstrated by the ALCEA team The city of Grand Prairie chose ALCEA for several key reasons. “Their product offered the advantage of securing all our enclosures with a single key, with efficiency and convenience,” said Perez. “The versatility of giving us the capability to integrate both mechanical and electronic locks, as well as padlocks, contributed to a more cost effective final solution. The user-friendly key system, coupled with the security features, ensures ease of use without compromising safety." “The expertise, customer service, and professionalism demonstrated by the ALCEA team added confidence in our decision-making process,” added Perez. “Being a local company, they are able to provide localised support.” Common problems with #2 keys protecting roadside equipment The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder. The electromechanical locks support electronic access control, key tracking, and audit trails with CLIQ Web Manager software. Perez says it instantly solves a problem that existed with their old system. “The challenges we encountered before are widespread in the transportation industry. Many traffic enclosures are accessible with a #2 key, which is impossible to track and makes unauthorised access a potential risk,” he explained. “Anyone can buy that type of key for a couple of dollars. This lack of accountability is a significant security concern, particularly with the increasing prevalence of cyber threats targeting government agencies.” Open cabinet locks and padlocks Perez says the ALCEA solution gives Grand Prairie continuity for its program. “Given the critical nature of our infrastructure and the investment in our high-tech signal control devices, protecting our assets is a top priority,” he acknowledged. “We now have versatility where the same key will open cabinet locks and padlocks, and it can be updated by using the CLIQ app, which is convenient for everyone on our team. Technicians and supervisors wiil be using most of the keys, and the others are for the contractors who need access to the traffic cabinets on an occasional basis.”
Wetlands, the "kidneys of the Earth", are considered one of the three major ecosystems on Earth, along with forests and oceans. Hosting a diverse range of terrestrial and aquatic plant and animal species, wetlands serve as crucial habitats for numerous bird species. Red-crowned cranes Beautiful Wetlands vs Critically Endangered Cranes The Red-crowned Crane is considered as the "God of Wetlands" and is highly sensitive to environmental changes. It is one of 14 bird species in China classified as critically endangered, with only around 2,000 wild Red-crowned Cranes remaining worldwide. Monitoring these rare bird species not only aids in their effective protection but also reflects changes in the wetland ecosystem to some extent. Red-crowned Cranes migrate between the regions of East China and Northeast China In China, during spring and autumn seasons, Red-crowned Cranes migrate between the regions of East China and Northeast China, requiring wetland management personnel to make all necessary preparations in advance every year. Recording and tracking data (e.g. time of arrival/departure, and total number) play a significant role in monitoring both the Red-crowned Cranes and the wetland ecosystem. Hence, monitoring rare bird species is essential not only for their conservation but also for understanding the changes in wetland ecological environments. Red-crowned crane captured by Dahua camera Vigilant cranes, eager for improved, smarter observation However, Red-crowned Cranes have extremely strong vigilance. Even while foraging or resting, there are often adult birds designated to be on alert, making warning calls and taking flight if any danger is detected. Therefore, it becomes challenging for monitoring personnel to observe them up close, as they need to maintain a distance of several hundred metres using binoculars to avoid disturbing the cranes. Such limitations in observation pose difficulties in monitoring the population distribution and activities of Red-crowned Cranes. To achieve efficient and intelligent monitoring while minimising human interference, many wetlands have enlisted the assistance of an intelligent "avian expert". Dahua: the guardian of cranes with smart technologies In recent years, avian intelligent recognition systems have been increasingly applied in wetland monitoring. Dahua Technology actively explores the integration of technology and wetland conservation to support the monitoring and protection of bird species across multiple wetlands. Rare bird species like the Red-crowned Crane can be automatically identified and counted By employing high-point video footage combined with avian intelligent recognition algorithms, rare bird species like the Red-crowned Crane can be automatically identified and counted. This allows monitoring personnel to discover and observe various bird species clearly and promptly without disturbing them. Additionally, techniques such as background removal and contour deformation processing help reduce the interference caused by lighting conditions and backgrounds, ensuring that the footage presents the identifying characteristics, location, and time for each bird. With this approach, comprehensive and accurate data recording and result analysis can be achieved without disturbing the Red-crowned Cranes up close. A brighter future for biodiversity using intelligent analysis In addition to population counting, vocalisations play a crucial role in bird research. By utilising voiceprint recognition, it becomes possible to track and study the population distribution of rare bird species. Many regions have established and improved databases of avian vocalisations, creating a foundation for biodiversity monitoring and analysis. These databases, combined with visual identification, are being cataloged in order to facilitate more comprehensive research and analysis, optimise timely conservation measures, and enhance dynamic and diverse science communication and education. Dahua Technology continues to empower biodiversity conservation through technology. The Dahua AI platform enables continuous algorithm training that helps reduce the development cycle of recognition algorithms for specific species. At present, Dahua has developed over 800 bird recognition algorithms, with more than 500 focused on waterfowl and migratory birds primarily inhabiting wetland environments. This extensive collection of algorithms greatly supports and contributes to biodiversity conservation efforts around the globe.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced a positive detection of an illegally brandished firearm in Hobbs, New Mexico that has resulted in criminal charges. At 6:35 p.m. MDT on November 30, 2023, ZeroEyes alerted the Hobbs Police Department and Eagle I.C. dispatch centre of an illegal gun detection captured on a security camera in the parking lot of Del Norte Pool. The ZeroEyes Operations Centre (ZOC) provided intelligent situational awareness about the threat, which involved individuals shooting sporting clays dangerously close to North Grimes Street. The responding officers detained the suspects and filed criminal charges against one of them. Rapid human verification ZeroEyes' AI gun detection and intelligent situational awareness software layers over living security cameras “My team and I were highly impressed with ZeroEyes’ AI detection and rapid human verification, which helped us stop this dangerous activity before anybody was hurt,” said Hobbs police chief August Fons. “In the past, something like this would have been missed entirely. We absolutely cannot have our citizens illegally firing guns in a public area, where anybody could walk by and get injured or even killed.” ZeroEyes' AI gun detection and intelligent situational awareness software layers over existing digital security cameras. When a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Visual description If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to law enforcement in as fast as three to five seconds from detection. “It is always gratifying to learn that our system has successfully prevented a potential shooting,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thankful that Hobbs PD acted swiftly to stop this illegal behaviour, and look forward to continued success working with the department.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its AI firearm detection and intelligent situational awareness platform will be deployed at the Merage Jewish Community Centre (JCC) of Orange County to protect its members and community from firearm threats. ZeroEyes is the latest addition to a layered security program that Merage JCC has implemented as a strategic response to rising threats amidst Jewish communities. The Federal Bureau of Investigation reported a 37% increase of anti-Jewish hate crimes in 2022, marking the highest number recorded since 1991, and antisemitism continues to intensify due to recent global events. AI firearm detection platforms Technology will increase our visibility across campus, ensuring a holistic approach to safeguarding" “We evaluated various AI firearm detection platforms and selected ZeroEyes based on its exceptional capabilities and customer service,” said Scott Braswell, CEO of Merage Jewish Community Centre of Orange County. “The technology will increase our visibility across campus, ensuring a holistic approach to safeguarding our community. With this added layer of security, our members can rest assured we’re using advanced technologies to create a safe, positive, and inviting environment.” Merage JCC security team Inside its 220,000-square-foot facility, the Merage Jewish Community Centre is a lively hub for more than 8,000 community members. The centre sees up to 50,000 visitors a month by offering a diverse range of amenities, including a state-of-the-art health and fitness complex, licenced preschool, teen lounge, and cultural spaces like a professional theatre and Holocaust Education Centre. The Merage Jewish Community Centre is a lively hub for more than 8,000 community members ZeroEyes' AI gun detection and intelligent situational awareness software layers over existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the Merage JCC security team as quickly as three to five seconds from detection. Author's quote "Ensuring public safety is critical, especially in settings that may be more vulnerable to hate crimes,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We applaud the Merage Jewish Community Centre for taking proactive steps to combat escalating security concerns and create a safer environment. We are proud that our AI firearm detection system will provide an additional layer of protection.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed at JPS Health Network in Fort Worth, Texas to mitigate gun-related violence. Located in Tarrant County, the 582-bed hospital includes an acute care facility, outpatient care centres, and psychiatric emergency room. Its Level I Trauma Centre receives over 125,000 emergency department visits annually from local and air EMS agencies, as well as others outside the county. HIPAA-compliant AI gun detection If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence “At the hospital, we witness first-hand the impact of gun violence, which is why we strive to safeguard our patients, staff, and visitors,” said Randell Hayen, Chief of the Tarrant County Hospital District Police Department. “Along with our onsite police department, adding ZeroEyes gives us another tool to use to do just that.” ZeroEyes' HIPAA-compliant AI gun detection and intelligent situational awareness software is now layered onto existing digital security cameras at JPS Health Network. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to the on-site hospital police department as quickly as three to five seconds from detection. Deployment of ZeroEyes The ZeroEyes Research Centre has found that nearly 50% of gun violence incidents at healthcare facilities take place within the building-among these incidents, 42% are targeted attacks, while 39% are spontaneous. Although hospitals are entrusted with caring for the victims of gun-related violence, this surge in violent incidents within healthcare facilities has prompted approximately 40 states to enact or strengthen laws regarding violence against healthcare workers. “Hospitals are inherently fast-paced environments where people are already vulnerable, and the size of the JPS facility makes the job of its police force and security teams even more challenging,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “I personally believe that the hospital’s deployment of ZeroEyes underscores its unwavering commitment to staying ahead of the curve in safety and security while providing exceptional care for its community.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, and AEGIX Global, a Utah-based provider of industry-pioneering critical incident management services, announced that the Utah State Board of Education has approved a contract to provide the joint solution for all Utah public K-12 schools, including charter schools. This effort began in the 2023 Utah legislative session and culminated with the passage of House Bill 61, which identified requirements and standards for firearm detection analytics and authorised the Utah State Board of Education to select a qualified vendor. AEGIX AIM’s map capabilities ZeroEyes’ platform was ultimately selected, marking the first time a state has codified this capability into statute. AEGIX Global has been contracted by ZeroEyes as the authorised reseller in Utah and the AEGIX AIM (Active Incident Management) platform will be provided as part of the overall solution. ZeroEyes’ platform was yet selected, marking the first time a state has codified this capability into statute ZeroEyes and the AEGIX AIM platform are integrated to create a multi-layered security solution for threat detection, situational awareness, incident management and response. ZeroEyes’ ability to detect visible guns with human-in-the-loop verification, combined with AEGIX AIM’s interactive map capabilities, provides key situational awareness for law enforcement to respond to incidents or threats quickly and efficiently. Author's quote “We strongly encourage all parents concerned about school safety to urge their local officials to apply for this grant in line with Utah State Board of Education guidance,” said Chet Linton, CEO of AEGIX. "This is an opportunity for Utah Public Schools to proactively address the gun-related violence epidemic and protect their communities. ZeroEyes and AEGIX AIM provide clarity to law enforcement when they respond to firearm incidents at schools, helping to save time and save lives.” AEGIX AIM platform AEGIX AIM platform cuts the chaos to drag guesswork and delays, saving special time in the emergency The AEGIX AIM platform cuts through the chaos to remove guesswork and delays, saving precious time in an emergency. The system allows individuals in an organisation such as a school to notify others of a crisis with the touch of a button. In a worst-case scenario, such as an active shooter event, teachers simply push a button in the app to let administrators and first responders know if they are “safe” or “unsafe.” AEGIX AIM can be operated from a desktop, laptop, or smartphone. ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC) If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the school security team in as fast as three to five seconds from detection. Utah local education agencies “We are grateful to the Utah legislature for allocating funds to safeguard the students and staff in their public school system,” said Mike Lahiff, CEO and co-founder of ZeroEyes. "We encourage more state legislatures to adopt the proactive mindset of Utah policymakers and provide funding to their respective school districts for our unique and highly differentiated capability.” Utah local education agencies can learn more about the grant, its requirements and how to apply by contacting the Utah State Board of Education and should anticipate forthcoming guidance.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?