Veterans in security
Ivanti, the software company that breaks down barriers between IT and security so that Everywhere Work can thrive, announced that it has named current Ivanti COO Dennis Kozak as Chief Executive Officer (CEO) in a planned transition, effective January 1, 2025. He succeeds Jeff Abbott, who will remain on the Company’s board of directors. Ivanti’s next CEO “Dennis has led our sales, marketing, and operations organisations through a period of rapid expansion with four acquisitio...
Cohesity, a pioneer in AI-powered data security announced the appointment of Vasu Murthy as SVP and Chief Product Officer. Vasu Murthy Murthy is a veteran with over 25 years of experience building enterprise software at scale. He has successfully led software launches at companies ranging from day-zero startups to large, global brands, with strengths in driving rapid growth and managing complex multi-product scaling efforts. Murthy will bring this vast experience in data protection, sec...
adCAPTCHA, a new specialist security verification platform, has launched with £1m funding to tackle the ‘bots epidemic’ and protect organisations against cyber fraud. The London-based company, founded by industry veteran and entrepreneur Alfie Scarborough, equips organisations with the capability to identify and block bots through its sophisticated in-house developed patent-pending human verification technology. Layered security solution adCAPTCHA’s layered...
The PSIA announced that two of its members actively supporting the PKOC specification will be speaking at the CONSULT 2024 Symposium. Since its inception, eight years ago, CONSULT has emerged as one of the premier and most unique events in the security industry. The symposium fills a largely unmet need in the security industry for manufacturers and consultants to interact with each other, to better understand security technologies, trends, and techniques as they impact security consultants...
SecurityCEU.com, a pioneering provider of online continuing education and systems integration training, announced the launch of its groundbreaking Frontline Project Management® Training course. This innovative program is specifically designed to meet the unique needs of Project Managers in the systems integration sectors. Biggest challenges For over two decades, the Frontline Project Management® Training course has consistently demonstrated its value, with thousands of particip...
ASIS International, the world’s largest association for security management professionals, celebrated Military and Law Enforcement Appreciation Day at Global Security Exchange (GSX) 2024 on 25 Wednesday. All law enforcement, military, and first responders received a free one-day pass to attend GSX. To honour those who serve and protect, ASIS began the day with a special breakfast event. This gathering celebrated the dedication of active duty and retired professionals from law enforcement,...
News
The Security Industry Association (SIA) has appointed Brett Feddersen – vice president of strategy and government affairs at D-Fend Solutions – as chair of the SIA Counter-UAS Working Group. Many facilities are limited in their ability to establish counter-uncrewed aircraft systems (UAS) given the myriad of regulatory nuances and lack of a clear national framework for addressing the topic. UAS National Action Plan SIA Counter-UAS Working Group was created in 2023 to support the work needed to accomplish actively The SIA Counter-UAS Working Group was created in 2023 to actively support the work needed to accomplish the recommendations of the Domestic Counter-UAS National Action Plan put forth by the Biden administration and further educate and give authorities options to mitigate UAS attacks. This group collaborates with external organisations and recruits industry experts aligned with this goal; tracks and monitors supportive legislation; and identifies, educates and engages with legislators. Innovative counter-UAS technologies “I am honoured to continue the hard work my predecessor, Bill Edwards, led in the Counter-UAS working group. Together with my security industry colleagues, we will advance the critical efforts of air domain awareness and safe drone threat mitigation and advocate for the broad acceptance of innovative counter-UAS technologies.” In his role with D-Fend Solutions, Feddersen is responsible for pioneering the company’s strategy, public policy and government relations efforts and engagements with various branches of the U.S. government, policymakers and regulators. He also plays a key role in supporting business development for D-Fend’s airports and aviation practice by supporting the company’s counter-UAS activities at U.S. airports. Roles of Feddersen Feddersen joined the team with vast senior leadership venture in major governmental agents Feddersen joined the team with extensive senior leadership experience in major governmental agencies, including the Federal Aviation Administration, the White House’s National Security Council, the Pentagon’s Joint Chiefs of Staff and the Defense Intelligence Agency. He spoke at SIA GovSummit 2024 on the topic of safeguarding sensitive environments in the era of the hostile drone threat. Feddersen is a U.S. Army combat veteran and a retired Pennsylvania state trooper. New chair of SIA’s Counter “SIA is honoured to welcome Brett Feddersen as the new chair of SIA’s Counter-UAS Working Group,” said SIA CEO Don Erickson. “While uncrewed systems offer tremendous benefits, they also pose security risks across various sectors, and there is a critical need for technologies to address these challenges and safeguard our drone-powered society." "Brett’s deep experience and expertise in navigating the complexities of countering threats will bring great value to the working group’s efforts to inform and educate our members about key topics related to drones and counter-drone technologies and advocate for measures that cater to key requirements while ensuring operational flexibility and continuity." Brett’s leadership SIA Counter-UAS Working Group’s efforts and acts have had to provide input on drone-related content Erickson added: "Through Brett’s leadership and the active involvement of working group members, SIA will continue to actively pursue the renewal of counter-UAS authorities and the long-overdue expansion of these policies to help mitigate threats posed by drones.” The SIA Counter-UAS Working Group’s key efforts and accomplishments have included providing input on counter-drone-related content and pioneering compelling presentations at top SIA and industry events, producing informative articles on important drone and counter-UAS topics, advocating on behalf of the security industry and engaging with legislators on drone-related concerns. Volunteer opportunities Employees of SIA member companies can make the most out of their memberships by getting more involved with the association. Volunteer opportunities include joining SIA committees or groups, lending expertise to SIA’s education and training programs, participating in SIA’s advocacy efforts, contributing to SIA’s publications and thought leadership and getting involved in SIA events.
Matrix is gearing up for its participation in the 6th edition of Intersec Saudi Arabia, to be held from 1st to 3rd October 2024. This esteemed event serves as a platform for Matrix to showcase its extensive security offerings, spanning IP Video Surveillance, Access Control, and Time-Attendance solutions. Next-generation security solutions At Intersec Saudi Arabia, 2024, Matrix will present its NDAA-compliant security portfolio, designed to meet the diverse needs of modern enterprises. Matrix is one of the first Indian companies to deliver end-to-end cyber-secure video surveillance solutions, ensuring comprehensive protection from capture to monitoring. VMS, bullet, and dome cameras Aligned with OWASP ASVS 4.0 L2 standards, these cameras also hold UL and CE certifications, setting a benchmark Its Video Management Software (VMS) recently earned cybersecurity certification, fully compliant with the OWASP Top 10 Desktop Security Risks. At Intersec Saudi Arabia, Matrix will proudly showcase its Project Series and Professional Series Bullet and Dome Cameras, renowned for their robust cybersecurity features. Aligned with OWASP ASVS 4.0 L2 standards, these cameras also hold UL and CE certifications, setting a benchmark in secure, high-performance surveillance. NVRs, VMSP, and All Color Network Cameras The exhibit will also feature a variety of Network Video Recorders and the newly launched Video Management Software Platform (VMSP), which integrates NVR, server, and VMS. Visitors will also get a chance to see Matrix All Color Network Cameras in action, which provide superior quality color images in low-light or no-light conditions. Access Control and Time-Attendance solutions Matrix will showcase its GDPR-compliant Access Control and Time-Attendance solutions, featuring WhatsApp Integration Matrix’s Access Control and Time-Attendance solutions provide a unified system for managing physical security and workforce operations, ensuring accurate time tracking and access control. At Intersec Saudi Arabia 2024, Matrix will showcase its GDPR-compliant Access Control and Time-Attendance solutions, featuring the latest WhatsApp Integration, which allows users to receive real-time alerts and notifications directly through the app. COSEC ARGO FACE200T Matrix will also unveil its state-of-the-art facial recognition time-attendance terminal, the COSEC ARGO FACE200T, renowned for its exceptional accuracy, fast identification speed, and high user capacity. This advanced device supports seamless connectivity through PoE and Ethernet, ensuring smooth integration. Enterprise-grade telecom solutions Matrix, a veteran pioneer in the telecom industry, will present its latest Telecom Solutions at the summit. Its range of IP-PBX systems, Unified Communication servers, and VoIP gateways is designed to enhance business communication and improve operational efficiency. As businesses grow, Matrix’s telecom solutions are built to scale, providing a dependable, robust, and high-quality communication infrastructure. Intersec KSA Intersec KSA unites industry pioneers in security, emergency response, and safety, from all corners of the world Strengthening Market Presence in Riyadh, Kingdom of Saudia Arabia Matrix has consistently portrayed its potential for growth in the region with its commitment to delivering high-quality, reliable, and scalable solutions. Intersec KSA unites industry pioneers in security, emergency response, and safety, from all corners of the world. From groundbreaking advancements to revolutionary technologies, the security and safety industry has been a hub of innovation. Matrix yearns for vital discussions on future foresight, featuring prominent global experts, concerning Security and Safety industry. Advanced, cyber-secure solutions Tarun Sharma, Marketing Head at Matrix Comsec, expressed his enthusiasm for the upcoming event, "Intersec Saudi Arabia is a pivotal opportunity for Matrix to engage with industry pioneers across the Middle East, a region with unique security challenges." "As infrastructure projects grow and critical assets expand, the demand for advanced, cyber-secure solutions has never been greater. We are eager to demonstrate how Matrix’s comprehensive security offerings, from robust video surveillance to intelligent access control, can enhance the safety and efficiency of enterprises across the region." Safeguarding assets and data "Our goal is to understand the specific needs of Middle Eastern organisations and provide solutions that safeguard both their physical assets and sensitive data with the highest level of protection." Visit Booth 1-D34 to learn more about Matrix offerings at Intersec Saudi Arabia 2024, from 1st to 3rd October 2024.
Allied Universal®, the globally renowned provider of security solutions for the government sector, provides critical security planning and mitigation recommendations for the upcoming debates in its recently released special report titled Physical Security During an Election: Expect the Unexpected and Prepare for it All. According to Allied Universal’s experienced team of security and intelligence professionals, a wide range of security measures must be planned, reviewed, revised as needed and then reviewed again prior to and on the day of the much-anticipated debates between U.S. Vice President Kamala Harris and former U.S. President Donald J. Trump and Vice President candidates Tim Walz and JD Vance. Physical and cyber security threats The report identifies potential physical and cyber security threats that could impact the safety The Allied Universal report leverages intelligence and expertise from the company’s more than 60 years of experience in the security industry, as well as insight from its team of veteran intelligence and security experts. The report identifies potential physical and cyber security threats that could impact the safety of the presidential nominees, debate moderators, audience members and the general public on Sept 10. “Presidential debates are pivotal events in the election cycle that draw significant attention from the public, the media and bad actors. The politically charged atmosphere of debates can heighten the potential for security issues,” said Allied Universal Global Chairman and CEO - Steve Jones. Potential security issues Steve Jones added: “By outlining potential security considerations, threat mitigation techniques and insights on contingency planning, our hope is that debate organisers and security personnel find the report a valuable tool offering suggestions and examples that support the deployment of comprehensive security strategies.” In addition to presidential debates, the report addresses security strategies and tactics for other election year events including election day and the presidential inauguration. Potential security issues are addressed in the report and include civil unrest, active shooter, crowd control, insider threats, infrastructure attacks, cyber threats, domestic extremism, and the spread of misinformation. Mitigation approaches are also included in the report.
i-PRO Co., Ltd. (formerly Panasonic Security) is pleased to announce that security industry veteran, James Rothstein has been appointed as Global Executive Advisor. In his new role, Rothstein will work closely with i-PRO’s Leadership Team to develop go-to-market strategies aimed at expanding the company's global footprint and driving strategic growth. Prior roles of Rothstein Rothstein brings over 30 years of executive experience in the security industry. Currently, he serves as Chairman of the Security Industry Association (SIA) Board of Directors. Before joining i-PRO, he was an Operating Partner at Lee Equity, a New York-based private equity firm. Before joining i-PRO, he was an Operating Partner at Lee Equity, a New York-based private equity firm He was also Senior Vice President of Global Security Solutions at Anixter International, overseeing the firm’s $2 billion global security and fire business. Prior to that, he served as Chief Sales and Marketing Officer, Executive Vice President, and Principal for Tri-Ed Distribution, North America's largest independent security distributor, which was sold to Anixter in 2015. i-PRO’s position "We are extremely pleased to be partnering with James," stated Masato Nakao, i-PRO’s CEO, adding "He has a long track record of growing companies, and his expertise will be invaluable in guiding our strategic initiatives and further solidifying i-PRO’s position as a global pioneer in the security industry." "After concluding my tenure as Chair of SIA, I was presented with numerous opportunities, and I am honoured to join i-PRO," stated James Rothstein. i-PRO's strategy James Rothstein adds: "What stood out to me was the team's dedication and their steadfast commitment to quality and engineering excellence. The impressive range of new products introduced over the past two years speaks to their innovative spirit." He continues, "i-PRO's strategy of nurturing deep, meaningful relationships with a select group of loyal integrators is a proven model for creating enduring partnerships. I am eager to contribute to the company’s ongoing success, driving innovation and fostering growth for i-PRO and its valued community of channel partners and systems integrators."
The Foundation for Advancing Security Talent (FAST) has named Jim Lantrip of Allied Universal Technology Services to the FAST Board of Directors. The FAST Board of Directors, drawn from the membership of the Electronic Security Association (ESA) and the Security Industry Association (SIA), defines and refines FAST’s strategic plan, as well as the foundation’s annual goals. Jim Lantrip Jim Lantrip is a seasoned security industry veteran with over 30 years of experience. Currently serving as the senior vice president of operations at Allied Universal Technology Services, a global systems integrator, he oversees the company’s operations, ensuring the delivery of innovative security solutions to clients on a global scale. Lantrip’s journey in the security industry began with a detour, initially joining ADT Security Services for sales experience, he unexpectedly found his niche and built a successful career spanning various roles, including sales, sales leadership, engineering, operations, and strategy. One-stop-shop solution His expertise extends to designing, delivering, and supporting a wide range of security products With a proven track record and a passion for mentoring, Lantrip has played a pivotal role in shaping the security industry. His expertise extends to designing, delivering, and supporting a wide range of security products, platforms, and services, making Allied Universal a one-stop shop for comprehensive security solutions. Work experience Before serving in his current role, Lantrip held leadership positions in several North American security companies, contributing to their growth and success. Beyond his professional accomplishments, he is committed to fostering the next generation of security professionals; he enjoys mentoring and motivating others, introducing them to the exciting and often overlooked opportunities within the industry. “We have an exciting, largely unknown, industry that needs to draw in and develop new talent through educating the world about all the possibilities in the security world,” said Lantrip. FAST Board of Directors The FAST Board of Directors includes the following members: Chair: Kerri Sutherland, manager, human resources business partnerships, Axis Communications Vice Chair: John Nemerofsky, chief operating officer, SAGE Integration Secretary: Erin Mann, senior manager, product operations, Brivo Treasurer: Ken Kocher, president, of Force Security Solutions Scott Harkins, vice president, sales, Resideo Jim Lantrip, senior vice president of operations, Allied Universal Technology Services Brendan McFall, East Coast operations manager, Northland Controls Michal Moss Early, executive director of corporate strategy, Digital Monitoring Products Rick Seymour, chief operating officer, Guardian Hawk Security Yaron Zussman, general manager, Magos America FAST The foundation brings awareness to the career advancement opportunities within the fast-paced technology FAST is a 501(c)(3) nonprofit organisation promoting careers in the physical security technology and life safety industry. Created in 2020 through a partnership of ESA and SIA – the industry’s major associations – FAST connects passionate, innovative professionals with new opportunities in electronic security and life safety. The foundation brings awareness to the career advancement opportunities within the fast-paced technology industry that serves to keep people, places, and property safe. FAST Jobs Board The FAST website offers job seekers information about the security industry’s growth and unique position at the convergence of cutting-edge technology and a mission that matters, the types of roles available in the industry, what employers are looking for, pioneering certifications in physical security and cybersecurity and a jobs board featuring immediate opportunities in security technology and life safety. The FAST Jobs Board allows job seekers to search by keyword, job title, and location and has featured thousands of jobs from over 800 companies. FAST’s key efforts The jobs board continues to grow in 2024 and has become the go-to destination for hiring and finding job opportunities in the security industry. FAST’s key efforts include outreach to schools, colleges, and universities to increase awareness of the exciting and rewarding careers available in security; research on the industry’s workforce development needs and possible solutions; recognition programs to celebrate the work of security technicians; events; and continuing education resources to help those already in the industry stay current with rapidly emerging and evolving technologies.
Global wireless solutions provider - Ramtech has accelerated its growth in the US market with the appointment of several key team members, boosting its business capability across the continent. New appointments Joining the team is marine and federal specialist - Morgan Davis, who brings specialist system integration and programming skills to the firm, alongside Business Development Manager - Luis Suarez. Both will be tasked with increasing awareness of Ramtech’s pioneering fire safety technology across construction and industry service sectors. Fire safety The recruits are among seven to have joined the business in the past year, with 13 partners aiding the deployment The recruits are among seven to have joined the business in the past year, with 13 partners aiding the deployment of Ramtech’s systems across the country, guided by the strategic appointment of Vice President - Joe Beecher in 2023. Joe Beecher said, "Our team’s growth reflects Ramtech’s commitment to improving fire safety across North America. Our ambition is to invest in new technologies that can help contractors and construction professionals save time and money, as well as aid worker protection on site." Construction safety Joe Beecher adds, "From our discussions with customers, we’re finding attitudes gradually shifting across the US. Traditional methods of fire protection, such as air horns, are no longer sufficient to alert construction workers to the hidden dangers on site, and technology can be omnipresent, protecting these environments when workers are less likely to be around, such as overnight or at weekends." He continues, "Construction safety is too often a secondary measure, but any fire accident or incident can have huge ramifications on human lives as well as project infrastructure." Bi-lingual colleagues Joe Beecher further states, "Guided by these encouraging signs of safety education, it is a really exciting period of development for everyone at Ramtech North America – we’ve onboarded bi-lingual colleagues, allowing us to potentially expand across Latin and South America, and we're working on some huge projects with some of the biggest names in construction." He adds, "We’re looking forward to continuing our expansion across the year and beyond." Key personnel Other key personnel to have joined the Ramtech team in the past year include 35-year construction veteran - Joel Pickering, sales engineers - Rae Kee and Andrew Medina, and Jiayao Wang, operating in product marketing. Joel, in particular, brings strategic regulatory knowledge to the Ramtech team, being an active member of the NFPA 241 committee and previously chairing an ANSI A-1026 subcommittee on ‘Emergency Procedures for Construction and Demolition Sites’. NFPA 241 standard Combined with its work on-site, it's these kinds of guiding principles that are driving forward the business The NFPA 241 standard – the national measuring standard for preventing or minimising fire damage to structures – was previously explored by Ramtech as part of an in-depth industry whitepaper, ‘No Site Left Behind’, which measured the state of fire safety knowledge across the US. Combined with its work on-site, it's these kinds of guiding principles that are driving forward the Nottingham-headquartered business worldwide, according to the Head of Global Business Development, James Pecz. Protecting construction environments James Pecz said, "Ramtech has been protecting construction environments for more than 30 years, and it's incredible to see the business transition from its beginnings in the Midlands, to a firm that holds strategic partnerships in Europe, the US, and even the Middle East." He adds, "Outdated safety attitudes are hard to dislodge, but combining our product knowledge with industry-pioneering advice is the best way to ensure our construction workers feel safe and protected at all times." Workers safety James Pecz continues, "We look forward to Joe and the team growing our operation in the US and building on the fantastic work already achieved to date." In June, Ramtech revealed its role in working with contractor - Barton Malow to protect more than 350 workers on site at Hudson’s Detroit, a $1 billion megaproject in downtown Detroit.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand car salesperson or estate agent of the popular imagination. Management of added services Yet we buy from retailers and marketplaces every day without complaint. As long as we see a middleman as providing value and convenience rather than getting in the way, they’re safe. This does mean, however, that resellers and integrators need to carefully manage how they are perceived and how much their added services are valued by their customers. The risk to security integrators Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies Businesses have often relied on security integrators to break down silos between security systems to strengthen both physical and cybersecurity postures. Typically, these have been seen as separate, but the increase in remote working and the adoption of cloud-based physical security has blurred the lines between the physical and the digital. Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies, rather than a siloed approach that will mean one is more secure than the other, and security integrators can help bridge this gap. Macroeconomic headwinds, digital transformation Security integrators have also proved invaluable in filling skill gaps within organisations. Not every business can be expected to have the staff and skills needed to successfully overcome integration challenges, they may have cybersecurity and physical security experts, but perhaps not both. And if they do have experts on staff, they may lack knowledge of the cutting-edge technologies that will protect their businesses best. This unique and esteemed role of security integrators is today at risk of disruption. Macroeconomic headwinds mean that businesses are scrutinising every budget line and asking if each is necessary. Digital transformation means they are questioning old ways of doing things are the providers they worked with five years ago, or longer, the same people who are going to give them the best value today? Research findings on current trends Unfortunately, many security integrators are not keeping up with change. Our research has found that only 26% of customers consider integrators up to date with the latest technologies. Businesses rely on these providers to navigate a new and confusing security landscape and only one in four say they are confident their partners have researched the road ahead. In the past, providers may have relied on having better knowledge than their customers. But 73% of security solutions buyers are doing their research on vendors and technology. Integrators risk being underprepared to serve a market that is more and more educated in the products they are providing a dangerous situation for any middleman. Finding the gap Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? The research suggests a shrinking gap for security integrators. Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? However, the problem may not be as dire as the research first suggests as long as integrators act to address the risks they face. Education Businesses are educating themselves about the market. They want to know what is available to stay safe, both in a physical environment and from online threats. This is understandable given how the news cycle, both of these spaces have seen an increase in potential threats, and the cost of cleaning up after a ransomware or similar attack has spiralled. Any sensible business will review what they have in place and their future options. Advance industry knowledge It has never been more important for the integrator community to advance their industry knowledge. They truly are the experts, and have an in-depth understanding of the latest trends, the advancement in cloud security, and the shifting demands of users. They also need to provide better service and consultancy. As the security world gets smarter and more cloud-based, security integrators who are well-informed and educated will have a clear advantage in the market. After all, most businesses don’t want to spend time researching and upskilling in areas where they can effectively outsource. Security integrators must be able to reassure their customers that they are up to the task. Bring on added value But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value The problem may be perceptions rather than the actual value that integrators can offer. If integrators are more informed than their customers realise, they need to do more to let their customers know. This could be down to being too reactive i.e., not anticipating customer needs and simply waiting for them to ask for particular services or products or not demonstrating knowledge as part of regular customer service. There is still very much of a gap for security integrators in today’s market. They can survive in this gap. But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value, more than a middleman, but a provider that can advise on the right products to meet specific needs and make those products work for their customers in an integrated way. Reinventing via consultancy They need to provide consultancy so their customers understand how best to ensure online and physical security work together to keep a business safe. Most of all, they need to demonstrate their knowledge to their customers and make sure they understand the value they bring. Businesses won’t be safer by relying on their research and knowledge to buy and install security products, but if they don’t understand the benefits of a specialist integrator, they may choose this route. It’s up to security integrators to reinvent themselves as the better kind of middleman if they want to remain relevant.
Security beat
Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for the larger companies. Acquisitions of Motorola Motorola Solutions has been among the most acquisitive of the larger players, recently adding several smaller companies to their growing portfolio. Just this year, Motorola has acquired Ava Security, a video security and analytics company; Calipsa, another analytics company; and Videotec, an Italian provider of ruggedized video solutions for critical infrastructure applications. Video solutions that help to enhance safety and streamline operations while supporting customers In one announcement, Motorola chairman and CEO Greg Brown stated the goal of acquisitions is “to support our customers’ evolving security needs by expanding our portfolio of intelligent video solutions that help to enhance safety and streamline operations.” Previously, Motorola Solutions acquired Envysion, a video analytics company for the retail market. On the access control side, Motorola acquired Openpath Security, a cloud-based, mobile access control provider, in 2021. Motorola entered the video surveillance business back in 2018 with the acquisition of Avigilon for around $1 billion. Also now a part of Motorola are IndigoVision and Pelco, among others. ACRE's mergers and acquisition Another company active in the mergers and acquisition market has been ACRE (Access Control Related Enterprises). The company began with a spinoff from Ingersoll Rand in 2012 to become Vanderbilt Industries. As ACRE, the parent company has been active both in acquisitions and divestitures over the next decade. Vanderbilt grew with the acquisition of Siemens’ Security Products in 2015. ACRE owned Mercury Security, a manufacturer of OEM hardware used by access control companies, from 2013 until it was sold to HID Global in 2017. The acquisition of Razberi enhances the ComNet portfolio while providing complementary technologies ACRE’s more recent access control acquisitions are RS2 Technologies (in 2019), Open Options (2018), Feenics (2021), and Matrix Systems (2021). They acquired ComNet, a manufacturer of video and data transmission equipment, in 2016. The acquisition of Razberi (in 2020) enhances the ComNet portfolio and provides complementary technologies to the access control brands. Acquisition of ACRE ACRE itself was acquired by European investment firm Triton in 2021, and Joseph Grillo, the company’s founder and CEO, announced his retirement in 2022. His knowledge of the security and access control markets helped to drive the company’s growth, including 11 successful acquisitions in all. Securitas acquiring Stanley Security The acquisition of Stanley Security is transformational for both Securitas and the security industry Stanley Security has also made headlines. In December 2021, Securitas signed an agreement to acquire the Electronic Security Business from Stanley Black & Decker for $3.2 billion in cash. Securitas President and CEO Magnus Ahlqvist says, “the acquisition of Stanley Security is transformational for both Securitas and the security industry.” Allegion plc, global security products and solutions provider, later signed an agreement to acquire Stanley Access Technologies and assets related to the automatic entrance solutions business from Stanley Black & Decker, Inc. for $900 million. Acquisition by HID Global, ADT Inc. & Allied Universal HID Global has acquired Vizinex RFID, thus increasing its presence and relevance in key vertical markets, including healthcare/medical, manufacturing, oil and gas, data centres, etc. and adding a key technology to HID Global’s RFID tag portfolio. ADT Inc. recently expanded its geographic reach with the acquisition of Key-Rite Security, a locally owned and operated security provider specializing in access control, surveillance, intrusion, and intercom systems in Colorado and for customers across the United States. Allied Universal continues its strategic growth with the acquisition of Attenti Group, an electronic monitoring company Allied Universal has acquired Star Protection Agency, the largest Hawaiian-owned and veteran-owned security company in the state. Although Star is primarily a guard patrol service, with workers at 125 sites throughout the state, it provides a range of security technology and consulting services. Internationally, Allied Universal continues its strategic growth with the acquisition of Attenti Group, an electronic monitoring company. Allied Universal will integrate Attenti Group with G4S Monitoring Technologies, to create Allied Universal Electronic Monitoring Services. SALTO Systems making acquisition news Also internationally, SALTO Systems has made acquisition news by investing in Bluefield Smart Access, thus strengthening their portfolio of access control solutions. SALTO Systems is a manufacturer of electronic access control and operating system solutions, designed to provide a seamless, keyless and mobile experience for modern buildings. Also joining the SALTO Group is Cognitec Systems, a face recognition company. The goal is to strengthen their research, development and market reach while working with SALTO on new technologies for expanding biometric markets. SALTO strategically selected Cognitec Systems to meet market requests for adding face recognition and artificial intelligence (AI) technologies to the company’s electronic access control and ticketing solutions. Acquisitions by MOBOTIX and Resideo Technologies Resideo Technologies, Inc. entered into an agreement to acquire First Alert, Inc., a provider of home safety products Further, on the international scene, MOBOTIX has reached an agreement to acquire Vaxtor Group, Tres Cantos, Spain, an artificial intelligence (AI) based video analytics provider, specializing in Optical Character Recognition (OCR) and Deep Learning technologies. On the residential system's front, Resideo Technologies, Inc. entered into an agreement to acquire First Alert, Inc., a provider of home safety products, from Newell Brands Inc. for $593 million in an all-cash transaction. Established in 1969 and based in Aurora, Illinois, First Alert offers a strong omnichannel presence serving end-users directly through retail and e-commerce channels and professional contractors through relationships with distributors and home builders.
Case studies
The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. ALCEA is the brand formerly known as ASSA ABLOY Global Solutions - Critical Infrastructure. The ALCEA Traffic Cabinet Locking Solution has gained traction with transportation infrastructure departments in major cities across the United States. It was developed by Jerry Burhans, managing director for North America, and Michael Woody, manager of the ALCEA Competence Centre in Irving, which shares a border with Grand Prairie. Now this access management solution is beginning to impact medium-sized communities like them. Proactive cybersecurity measures Perez said this skill project will save all city signal cabinets from tampering and unauthorised key Raul Perez, a 13-year transportation industry veteran who has served as Grand Prairie’s ITS Specialist for 2-1/2 years, said this installation project will protect all city signal cabinets from tampering and unauthorised access. Involving 240 smart locks, 210 high-security mechanical locks and padlocks on all city traffic cabinets plus 10 message boards, 191 mechanical locks for all school flashing sign cabinets, and 20 Bluetooth keys is in step with the city’s policy of adopting proactive cybersecurity measures. “Having control over who has access and when to our traffic cabinets was a major driver for this project,” he acknowledged. “We have not had people trying to force their entry into our cabinets, but we did have several occasions where contractors were gaining access to them without permission or notice. ALCEA was the clear choice for our smart lock needs, offering a solution that aligns with our requirements.” Substantial growth and the need to safeguard assets Grand Prairie has a long history associated with technology. Located in the Dallas-Fort Worth metroplex, it is the sixteenth largest city in Texas with a population of more than 207,000 people. During World War I and since, it began an association with the defence and aviation industries and served as an aircraft production site. The city sits 12 miles west of downtown Dallas and is only 10 minutes south of the Dallas-Fort Worth International Airport. With rail lines and major interstates 20 and 30 running through it, Grand Prairie has become a well-established distribution centre. The majority of the Great Southwest Industrial District’s approximately 80 million square-feet of space is in the city. State’s transportation infrastructure Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states Combine major attractions like the Lone Star Park horse racetrack and Epic Waters, one of the largest indoor waterparks in Texas, and the city’s 81 square miles of road experience heavy traffic activity all day long. Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states. After an unprecedented boom, the U.S. Census Bureau declared it is now home to more than 30 million residents following a 43% increase from 2020 to 2022. That development in part led to the Texas Department of Transportation announcing a $142 billion investment in the state’s transportation infrastructure last August as part of a 10-year state roadways plan. About the same time the announcement was made is when the city of Grand Prairie began researching options for a separately funded project to increase cybersecurity preparedness. Flexibility of a Hybrid Locking Solution “I started looking for smart locks and found ALCEA’s mechanical lock with a high security key during an online search. I was intrigued so I contacted them, inquired about their product and arranged a visit to their office for a presentation,” said Perez, who also evaluated the offerings of three other vendors. “It was then I learned about the capability of unlocking both the electronic and mechanical locks – including padlocks – and the versatility of their keys. I was very impressed by the user-friendly design of their Bluetooth smart key,” he said in reference to the ABLOY PROTEC2 CLIQÔ system. Mechanical and electromechanical locks Remote access control system mixes the parts of robotic and electromechanical locks The remote access management system combines the best characteristics of mechanical and electromechanical locks. After the initial meeting with ALCEA, Perez said he was convinced of the value of this hybrid solution but had to secure buy-in from his supervisor and department director. “Working with the ALCEA team, we tailored a price quote aimed at convincing our department director to allocate funds for this investment. The initiative was successfully integrated into our budget by the end of 2023, and the purchase order was placed in mid-January.” Demonstrated by the ALCEA team The city of Grand Prairie chose ALCEA for several key reasons. “Their product offered the advantage of securing all our enclosures with a single key, with efficiency and convenience,” said Perez. “The versatility of giving us the capability to integrate both mechanical and electronic locks, as well as padlocks, contributed to a more cost effective final solution. The user-friendly key system, coupled with the security features, ensures ease of use without compromising safety." “The expertise, customer service, and professionalism demonstrated by the ALCEA team added confidence in our decision-making process,” added Perez. “Being a local company, they are able to provide localised support.” Common problems with #2 keys protecting roadside equipment The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder. The electromechanical locks support electronic access control, key tracking, and audit trails with CLIQ Web Manager software. Perez says it instantly solves a problem that existed with their old system. “The challenges we encountered before are widespread in the transportation industry. Many traffic enclosures are accessible with a #2 key, which is impossible to track and makes unauthorised access a potential risk,” he explained. “Anyone can buy that type of key for a couple of dollars. This lack of accountability is a significant security concern, particularly with the increasing prevalence of cyber threats targeting government agencies.” Open cabinet locks and padlocks Perez says the ALCEA solution gives Grand Prairie continuity for its program. “Given the critical nature of our infrastructure and the investment in our high-tech signal control devices, protecting our assets is a top priority,” he acknowledged. “We now have versatility where the same key will open cabinet locks and padlocks, and it can be updated by using the CLIQ app, which is convenient for everyone on our team. Technicians and supervisors wiil be using most of the keys, and the others are for the contractors who need access to the traffic cabinets on an occasional basis.”
Wetlands, the "kidneys of the Earth", are considered one of the three major ecosystems on Earth, along with forests and oceans. Hosting a diverse range of terrestrial and aquatic plant and animal species, wetlands serve as crucial habitats for numerous bird species. Red-crowned cranes Beautiful Wetlands vs Critically Endangered Cranes The Red-crowned Crane is considered as the "God of Wetlands" and is highly sensitive to environmental changes. It is one of 14 bird species in China classified as critically endangered, with only around 2,000 wild Red-crowned Cranes remaining worldwide. Monitoring these rare bird species not only aids in their effective protection but also reflects changes in the wetland ecosystem to some extent. Red-crowned Cranes migrate between the regions of East China and Northeast China In China, during spring and autumn seasons, Red-crowned Cranes migrate between the regions of East China and Northeast China, requiring wetland management personnel to make all necessary preparations in advance every year. Recording and tracking data (e.g. time of arrival/departure, and total number) play a significant role in monitoring both the Red-crowned Cranes and the wetland ecosystem. Hence, monitoring rare bird species is essential not only for their conservation but also for understanding the changes in wetland ecological environments. Red-crowned crane captured by Dahua camera Vigilant cranes, eager for improved, smarter observation However, Red-crowned Cranes have extremely strong vigilance. Even while foraging or resting, there are often adult birds designated to be on alert, making warning calls and taking flight if any danger is detected. Therefore, it becomes challenging for monitoring personnel to observe them up close, as they need to maintain a distance of several hundred metres using binoculars to avoid disturbing the cranes. Such limitations in observation pose difficulties in monitoring the population distribution and activities of Red-crowned Cranes. To achieve efficient and intelligent monitoring while minimising human interference, many wetlands have enlisted the assistance of an intelligent "avian expert". Dahua: the guardian of cranes with smart technologies In recent years, avian intelligent recognition systems have been increasingly applied in wetland monitoring. Dahua Technology actively explores the integration of technology and wetland conservation to support the monitoring and protection of bird species across multiple wetlands. Rare bird species like the Red-crowned Crane can be automatically identified and counted By employing high-point video footage combined with avian intelligent recognition algorithms, rare bird species like the Red-crowned Crane can be automatically identified and counted. This allows monitoring personnel to discover and observe various bird species clearly and promptly without disturbing them. Additionally, techniques such as background removal and contour deformation processing help reduce the interference caused by lighting conditions and backgrounds, ensuring that the footage presents the identifying characteristics, location, and time for each bird. With this approach, comprehensive and accurate data recording and result analysis can be achieved without disturbing the Red-crowned Cranes up close. A brighter future for biodiversity using intelligent analysis In addition to population counting, vocalisations play a crucial role in bird research. By utilising voiceprint recognition, it becomes possible to track and study the population distribution of rare bird species. Many regions have established and improved databases of avian vocalisations, creating a foundation for biodiversity monitoring and analysis. These databases, combined with visual identification, are being cataloged in order to facilitate more comprehensive research and analysis, optimise timely conservation measures, and enhance dynamic and diverse science communication and education. Dahua Technology continues to empower biodiversity conservation through technology. The Dahua AI platform enables continuous algorithm training that helps reduce the development cycle of recognition algorithms for specific species. At present, Dahua has developed over 800 bird recognition algorithms, with more than 500 focused on waterfowl and migratory birds primarily inhabiting wetland environments. This extensive collection of algorithms greatly supports and contributes to biodiversity conservation efforts around the globe.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced a positive detection of an illegally brandished firearm in Hobbs, New Mexico that has resulted in criminal charges. At 6:35 p.m. MDT on November 30, 2023, ZeroEyes alerted the Hobbs Police Department and Eagle I.C. dispatch centre of an illegal gun detection captured on a security camera in the parking lot of Del Norte Pool. The ZeroEyes Operations Centre (ZOC) provided intelligent situational awareness about the threat, which involved individuals shooting sporting clays dangerously close to North Grimes Street. The responding officers detained the suspects and filed criminal charges against one of them. Rapid human verification ZeroEyes' AI gun detection and intelligent situational awareness software layers over living security cameras “My team and I were highly impressed with ZeroEyes’ AI detection and rapid human verification, which helped us stop this dangerous activity before anybody was hurt,” said Hobbs police chief August Fons. “In the past, something like this would have been missed entirely. We absolutely cannot have our citizens illegally firing guns in a public area, where anybody could walk by and get injured or even killed.” ZeroEyes' AI gun detection and intelligent situational awareness software layers over existing digital security cameras. When a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Visual description If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to law enforcement in as fast as three to five seconds from detection. “It is always gratifying to learn that our system has successfully prevented a potential shooting,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thankful that Hobbs PD acted swiftly to stop this illegal behaviour, and look forward to continued success working with the department.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its AI firearm detection and intelligent situational awareness platform will be deployed at the Merage Jewish Community Centre (JCC) of Orange County to protect its members and community from firearm threats. ZeroEyes is the latest addition to a layered security program that Merage JCC has implemented as a strategic response to rising threats amidst Jewish communities. The Federal Bureau of Investigation reported a 37% increase of anti-Jewish hate crimes in 2022, marking the highest number recorded since 1991, and antisemitism continues to intensify due to recent global events. AI firearm detection platforms Technology will increase our visibility across campus, ensuring a holistic approach to safeguarding" “We evaluated various AI firearm detection platforms and selected ZeroEyes based on its exceptional capabilities and customer service,” said Scott Braswell, CEO of Merage Jewish Community Centre of Orange County. “The technology will increase our visibility across campus, ensuring a holistic approach to safeguarding our community. With this added layer of security, our members can rest assured we’re using advanced technologies to create a safe, positive, and inviting environment.” Merage JCC security team Inside its 220,000-square-foot facility, the Merage Jewish Community Centre is a lively hub for more than 8,000 community members. The centre sees up to 50,000 visitors a month by offering a diverse range of amenities, including a state-of-the-art health and fitness complex, licenced preschool, teen lounge, and cultural spaces like a professional theatre and Holocaust Education Centre. The Merage Jewish Community Centre is a lively hub for more than 8,000 community members ZeroEyes' AI gun detection and intelligent situational awareness software layers over existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the Merage JCC security team as quickly as three to five seconds from detection. Author's quote "Ensuring public safety is critical, especially in settings that may be more vulnerable to hate crimes,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We applaud the Merage Jewish Community Centre for taking proactive steps to combat escalating security concerns and create a safer environment. We are proud that our AI firearm detection system will provide an additional layer of protection.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed at JPS Health Network in Fort Worth, Texas to mitigate gun-related violence. Located in Tarrant County, the 582-bed hospital includes an acute care facility, outpatient care centres, and psychiatric emergency room. Its Level I Trauma Centre receives over 125,000 emergency department visits annually from local and air EMS agencies, as well as others outside the county. HIPAA-compliant AI gun detection If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence “At the hospital, we witness first-hand the impact of gun violence, which is why we strive to safeguard our patients, staff, and visitors,” said Randell Hayen, Chief of the Tarrant County Hospital District Police Department. “Along with our onsite police department, adding ZeroEyes gives us another tool to use to do just that.” ZeroEyes' HIPAA-compliant AI gun detection and intelligent situational awareness software is now layered onto existing digital security cameras at JPS Health Network. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to the on-site hospital police department as quickly as three to five seconds from detection. Deployment of ZeroEyes The ZeroEyes Research Centre has found that nearly 50% of gun violence incidents at healthcare facilities take place within the building-among these incidents, 42% are targeted attacks, while 39% are spontaneous. Although hospitals are entrusted with caring for the victims of gun-related violence, this surge in violent incidents within healthcare facilities has prompted approximately 40 states to enact or strengthen laws regarding violence against healthcare workers. “Hospitals are inherently fast-paced environments where people are already vulnerable, and the size of the JPS facility makes the job of its police force and security teams even more challenging,” said Mike Lahiff, CEO, and co-founder of ZeroEyes. “I personally believe that the hospital’s deployment of ZeroEyes underscores its unwavering commitment to staying ahead of the curve in safety and security while providing exceptional care for its community.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, and AEGIX Global, a Utah-based provider of industry-pioneering critical incident management services, announced that the Utah State Board of Education has approved a contract to provide the joint solution for all Utah public K-12 schools, including charter schools. This effort began in the 2023 Utah legislative session and culminated with the passage of House Bill 61, which identified requirements and standards for firearm detection analytics and authorised the Utah State Board of Education to select a qualified vendor. AEGIX AIM’s map capabilities ZeroEyes’ platform was ultimately selected, marking the first time a state has codified this capability into statute. AEGIX Global has been contracted by ZeroEyes as the authorised reseller in Utah and the AEGIX AIM (Active Incident Management) platform will be provided as part of the overall solution. ZeroEyes’ platform was yet selected, marking the first time a state has codified this capability into statute ZeroEyes and the AEGIX AIM platform are integrated to create a multi-layered security solution for threat detection, situational awareness, incident management and response. ZeroEyes’ ability to detect visible guns with human-in-the-loop verification, combined with AEGIX AIM’s interactive map capabilities, provides key situational awareness for law enforcement to respond to incidents or threats quickly and efficiently. Author's quote “We strongly encourage all parents concerned about school safety to urge their local officials to apply for this grant in line with Utah State Board of Education guidance,” said Chet Linton, CEO of AEGIX. "This is an opportunity for Utah Public Schools to proactively address the gun-related violence epidemic and protect their communities. ZeroEyes and AEGIX AIM provide clarity to law enforcement when they respond to firearm incidents at schools, helping to save time and save lives.” AEGIX AIM platform AEGIX AIM platform cuts the chaos to drag guesswork and delays, saving special time in the emergency The AEGIX AIM platform cuts through the chaos to remove guesswork and delays, saving precious time in an emergency. The system allows individuals in an organisation such as a school to notify others of a crisis with the touch of a button. In a worst-case scenario, such as an active shooter event, teachers simply push a button in the app to let administrators and first responders know if they are “safe” or “unsafe.” AEGIX AIM can be operated from a desktop, laptop, or smartphone. ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC) If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the school security team in as fast as three to five seconds from detection. Utah local education agencies “We are grateful to the Utah legislature for allocating funds to safeguard the students and staff in their public school system,” said Mike Lahiff, CEO and co-founder of ZeroEyes. "We encourage more state legislatures to adopt the proactive mindset of Utah policymakers and provide funding to their respective school districts for our unique and highly differentiated capability.” Utah local education agencies can learn more about the grant, its requirements and how to apply by contacting the Utah State Board of Education and should anticipate forthcoming guidance.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Maximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadAccess control system planning phase 2
DownloadThe key to unlocking K12 school safety grants
Download