Voice recognition systems
As organisations navigate an increasingly complex threat landscape, security pioneers are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intellig...
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, faci...
Fime has supported ELAN Microelectronics, a global pioneer in human-machine interfaces, in achieving FIDO Biometric Component Certification for its fingerprint authentication solution. FIDO authenticators can now integrate the sensors to further strengthen customer authentication and support the industry drive to reduce the world’s reliance on passwords. Access to digital services The use of a certified biometric component is optional for level 1 and level 2 FIDO authenticators The FID...
IDEMIA Public Security, the provider of secure and trusted biometric-based solutions, proudly announces its top-ranking results in the Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T) Remote Identity Validation Technology Demonstration (RIVTD). IDEMIA emerged as a clear pioneer in Track 3: Liveness Detection, showcasing unparalleled biometric accuracy and fairness. RIVTD series The RIVTD series is a rigorous evaluation designed to challenge and advanc...
Alcatraz AI, a global provider of frictionless, AI-powered biometric access control solutions revolutionising security through facial authentication, announced the appointment of Patrick Merfert as the company’s next Vice President (VP) of Marketing. Rapidly growing market With over 15 years of experience as a technology startup marketing pioneer, venture capital investor, and strategy consultant, Merfert contributes a vast wealth of identity and security-based technology marketing...
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its final 2024 year-end results have again shattered the company’s previous high-water marks. Elite’s industry-pioneering remote guarding services are having an extraordinary impact on preventing crimes, as documented by achieving more than double the voice-down command centre interventions since 2021 and teaming with law enforce...
News
IDEMIA Public Security North America, the provider of secure and trusted biometric-based solutions, in partnership with the West Virginia Division of Motor Vehicles (DMV), is proud to announce the launch of the next generation of mobile ID (MID) in the state. West Virginia residents will have access to enhanced security and convenience when presenting their ID for airport security screening, age-restricted products, and other identity checks. West Virginia mID app The West Virginia mID app, available for free download from the Apple App Store or Google Play, allows residents to store and manage their identification credentials on their smartphones, incorporating advanced encryption and biometric authentication to protect personal information. West Virginia Residents can use the app to verify their identities directly from their mobile phones at TSA PreCheck® Checkpoints at participating airports across the country. Digital solution West Virginia residents can also expect to see mobile ID expand to OEM wallets in the future This digital solution is designed to streamline interactions with government agencies, businesses, and various service providers, offering a modern method of identification. West Virginia residents can also expect to see mobile ID expand to OEM wallets in the future. Convenient, digital, and secure services "Under the Leadership of Governor Justice and Secretary Wriston, the West Virginia DMV has continued to offer faster, more convenient, digital, and secure services for the citizens of West Virginia." "Having the opportunity to provide the State of West Virginia with a Mobile ID will only enhance the citizen experience by moving the State in a direction that keeps us moving forward with more advanced technology," said Everett Frazier, Commissioner for the West Virginia Division of Motor Vehicles. Privacy and interoperability The app is designed to conform to the ISO standard for ISO 18013-5 offering a high level of assurance As an advanced and secure identity credential, the West Virginia mID app was created with IDEMIA’s patented technologies, robust security features, and a focus on privacy and interoperability at the forefront of the technology. The app is also designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5), offering a high level of assurance that West Virginia residents and relying parties of mobile ID can trust. Contactless alternative IDs "I’m excited that we have worked with West Virginia to bring their residents an efficient and contactless alternative to physical IDs. It is also secure as only mobile ID holders can unlock their app using their biometrics or a personal six-digit PIN, ensuring exclusive access," said Donnie Scott, CEO of IDEMIA Public Security North America "Even better users have full control over when and with whom they share their information, giving them more privacy compared to traditional physical credentials. They can decide to share complete personal information, or for example, just their birth date when making an age-restricted purchase." Mobile ID The launch of mobile ID in West Virginia demonstrates IDEMIA’s ongoing efforts to advance digital identity and solutions for public and private sector use. Arizona, Delaware, Iowa, Mississippi, and New York are additional states that have rolled out IDEMIA’s mobile ID technology, with more states to launch later this year.
RecFaces confirms its participation in Intersec 2025, the world’s largest business event focused on security. RecFaces will feature its pioneering facial recognition solutions, Id-Guard and Id-Gate, at booth SA-F29 in the Security Pavilion from January 14-16, 2025, at the Dubai World Trade Centre. With more than 200 installations worldwide backed by a diversified team with more than 15 years of experience in Facial Biometrics, its flagship products are Id-Guard, for enhancing security operations using advanced video surveillance with rapid person identification capabilities, and Id-Gate for making access control systems seamless for identity verification will play an essential role in shaping the future of security and surveillance at Intersec 2025. Insights to drive innovation RecFaces firmly believes in the success of facial biometrics through a collaborative ecosystem of diverse stakeholders, including Technological Partners, Distributors, System Integrators, End-Users, Security Professionals, etc., all of whom bring valuable insights to drive innovation and effectiveness in security solutions and are looking forward to connecting with them at their booth. "To constantly steal a march from the threat actors, organisations need to adopt a proactive mindset—always alert. Through Facial Recognition, we empower businesses to embrace this forward-thinking approach," said Eugenia Marina, Business Development, Director, MENA region.
Verkada is sharing 2025 predictions related to each of its various product categories, ranging from how AI will unlock new insights for security teams to how advancements in camera technology will enhance accuracy and decision-making. Here are some comments from Verkada’s security professionals looking ahead to the new year. AI in security "Large language and vision models reduce investigation times and unlock deeper insights. AI is already transforming the ways that security teams search for people, vehicles, and objects, and that will only continue to evolve." "Soon, organisations will be able to use large language and vision models to search through a wider range of situations, like using natural language to search for specific sounds or actions like a window breaking. Ultimately, these new efficiencies will save precious time in moments when—especially for security and safety—every second matters," Yunchao Gong, VP of Engineering, Cameras at Verkada. Cameras "Convolutional neural network (CNN) based computer vision at the edge will drive faster, more accurate real-time monitoring and enhanced decision-making capabilities in security. For example, while legacy systems might rely on basic motion detection or predefined triggers, a CNN-powered camera can instantly differentiate between an authorised employee and an unauthorised intruder, alert security teams, and trigger automated responses such as locking nearby doors or redirecting cameras for better coverage. Ultimately, this will drive more innovation around how security operations are managed and optimised," Yunchao Gong, VP of Engineering, Cameras at Verkada. "Edge-based transformers unlock deeper insights with greater accuracy. Edge-based transformers excel in accurately identifying precise motions or activities, which will be a game-changer when it comes to safety and security. Take hospitals, for example—monitoring patients for falls and ensuring immediate response is a constant priority." "Compared to traditional transformers that rely on sending data to the cloud for processing (which can introduce delays and errors), edge-based transformers process everything locally on the device. This enables more accurate fall detection and real-time alerts, ensuring faster and more reliable responses when it matters most," Yunchao Gong, VP of Engineering, Cameras at Verkada. Access control "Mobile credentials will become ubiquitous. Smartphones have become an essential multifaceted tool for everyday life and, as a result, an item most people wouldn’t think of leaving behind. This has primed consumers to adopt mobile credentials. Because they already rely on their phones for everyday life, people want to access mobile credentials across more parts of their lives—from digital driver’s licences in place of physical identification at airports to mobile key cards for hotel rooms." "Digital wallets like Apple Wallet are also making it easier to deploy mobile credentials at scale. This appetite for convenient, secure identity verification and access control solutions is just at the beginning and will likely drive mobile credential adoption across nearly every other use case and sector," Jake Leichtling, Director of Product Management, Access Control. Intercoms "Large language and vision models are changing the ways that Intercoms can be leveraged for organisations. For example, real-time speech-to-text transcription can help security teams find relevant audio recordings for specific incidents in seconds by searching for keywords such as names or the stated purpose of a visit. Paired with edge computing—which powers in-call person-of-interest alerts and enables natural language video searches—intercoms can instantly verify and alert front desk staff if a person is not permitted to enter the premises as well as help security teams track down specific footage using natural language search terms like “person in red shirt with black baseball hat.” "As intercoms shift from being simple communication devices into powerful multi-functional tools, new technology like intelligent voice recognition and expanded applications of natural language processing will unlock even more use cases for organisations to reduce friction in the visitor experience and streamline security operations," David Zhai, Lead Product Manager, Intercoms at Verkada. Environmental Sensors "OSHA is broadening its remit to protect workers amid growing climate concerns. OSHA’s new heat index requirement in California—a regulation that requires workplaces to monitor and track temperature and humidity levels to prevent heat-related illnesses—reflects a growing trend of government agencies expanding the environmental conditions that workplaces must monitor." "This trend is spreading nationwide, with OSHA now proposing heat protection standards at the federal level as well. To comply with new environmental requirements and safeguard employee health, organisations will need technology that can monitor a wider range of environmental conditions—not just CO2 levels or particulate matter," Dominic Komarek, Product Manager, Verkada.
Suprema, a global pioneer in AI-powered biometric and security solutions, showcased its next-generation enterprise security innovations at Intersec 2025, the largest security trade fair in the Middle East, held in Dubai from January 14th to 16th. At its booth, Suprema demonstrated its commitment to transforming enterprise security solution providers by offering a comprehensive portfolio of solutions embedded with cutting-edge technologies, including AI, cloud, and video. Innovative video features BioStar 2, equipped with the MCS to seamlessly manage extensive device networks At the booth, Suprema showcased the new BioStar, integrating its proprietary AI-powered intelligent video analytics and surveillance technology into the access control system. By demonstrating these innovative video features, the Suprema booth garnered significant attention and high expectations from attendees. Additionally, BioStar 2, equipped with the Multi-Communication Server (MCS) to seamlessly manage extensive device networks and large-scale user enrolments, has been successfully deployed at large-scale sites such as the Government Complex Sejong in South Korea and the Mohammed VI University Hospital in Morocco, delivering enterprise-level scalability and reliability. Deployment of security systems Suprema also showcased an upgraded hardware lineup. The BioEntry W3, a mullion-type AI-powered facial authentication device designed for durability and robust data privacy, has received an overwhelmingly positive market response, with deployments rapidly increasing across various industries since its launch three months ago. Additionally, Suprema introduced the CoreStation 20, a newly designed controller built to enable the cost-effective and scalable deployment of security systems, suitable for both large-scale sites and small offices. Suprema’s cloud expertise Suprema’s cloud expertise was exemplified through CLUe, an open cloud integration platform Suprema’s cloud expertise was exemplified through CLUe, an open cloud integration platform. CLUe provides seamless integration with third-party systems via standard REST APIs and supports various authentication methods, including QR codes and biometrics. One of its standout features is the versatility allowing customers to customise the platform to meet specific needs, such as access control, membership/visitor management, or time and attendance management. New standard for security solutions “This year’s Intersec marks the beginning of Suprema’s next chapter, setting a new standard for security solutions worldwide,” said Hanchul Kim, CEO of Suprema Inc. “Our focus is on providing innovative, reliable, and scalable solutions that empower organisations to strengthen security and enhance operational efficiency in today’s dynamic global landscape.”
TOA Canada's D5000 Series provides unprecedented speech clarity, delivering the presenter’s voice to audiences in any speaking scenario. Whether for the classroom, office meeting rooms, banquet halls, courthouses, or multipurpose halls, the D-5000 delivers audio with clarity and ease of use. To this point, this series has been a special-order product, but TOA Canada are happy to announce that they are now officially bringing it into the extensive catalogue of sound solutions. Suite of features The core inspiration of this series was 'voice clarity and comfort for any speaking scenario'. And with this series checking off those criteria and then some, they’re excited to be able to bring this series into TOA Canada’s Catalogue. This series boasts a suite of features developed to benefit the user and use-case alike, including: TOA’s proprietary digital audio processing ensures optimal sound quality and intelligibility for speech applications. Up to 32 simultaneous channels. Region dependent. 15 compatible channels per 6 MHz, 20 compatible channels per 8 MHz TV channel. Proprietary encryption settings to prevent data leakage. Approx. 100 m operating range (line of sight). Dedicated maintenance software for visual monitoring of any jam radio waves or changes to incoming radio waves. Assured signal stability via the digital diversity method. Control of peripherals is possible using contact output.
The CNI Security Group will be holding its next event at Guildhall London, on Wednesday 26th February. Beginning at 10.00 am, the day is entitled, ‘Is AI the future of security?’ and will concentrate on AI (Artificial Intelligence) and the extent of its application within real end-user case studies. AI in CNI security With technology examples and seminars from a host of expert speakers, including Pauline Norstrom FRSA, FIoD, FBCS, Founder and CEO - Anekanta®AI, Anekanta®Consulting and Non-Executive Director – BSIA, and Andy Schofield, CTO at Reliance and the Chair of the Special Interest Group (SIG) for AI & Biometrics at the BSIA, attendees will hear different perspectives on the applicability of AI in the CNI (Critical National Infrastructure) security sector, while gaining valuable insights into the latest developments and available technologies. Hosted by each of the CNI Security Group’s manufacturer members, integrated product solutions will be discussed to provide invaluable security technology information applicable for high security, CNI, and Government end-users, consultants, and system designers. End-to-end AI solutions The event promotes the CNI Security Group’s initiative, underpinned by world-class experience from technology Aimed at providing fully integrated, secure, and futureproofed end-to-end AI solutions, the event promotes the CNI Security Group’s initiative, underpinned by world-class experience from technology members barox, Nedap, ISM, and Harper Chalice - alongside guest partners Dallmeier & Commend. At the event, member manufacturer stands will display a mix of class-pioneering equipment specifically chosen to meet the demanding needs of AI applications, and will include surveillance cameras, industrial ethernet switches, analytics, access control, and perimeter intrusion detection systems. Sharing real-world view “I am delighted to announce that our next event with focus on AI, a topic that is very much ‘front and forward’ when it comes to designing more sophisticated, efficient systems of the future, without compromise on security,” says Sara Fisher, barox International Market Development Specialist. “We have a fabulous line-up of speakers, including end users, who will be sharing with attendees their real-world view of AI deployment in practice - addressing the benefits, considerations, and challenges faced when designing and utilising the technology." AI in practice "Alongside a unique insight, they will promote a debate on the big question of whether there is a place for AI in CNI and high-security applications." “We’re also looking forward to welcoming both Commend and Dallmeier as guest partners to this AI-focused event.”
IDEMIA Public Security North America, the provider of secure and trusted biometric-based solutions, in partnership with the West Virginia Division of Motor Vehicles (DMV), is proud to announce the launch of the next generation of mobile ID (MID) in the state. West Virginia residents will have access to enhanced security and convenience when presenting their ID for airport security screening, age-restricted products, and other identity checks. West Virginia mID app The West Virginia mID app, available for free download from the Apple App Store or Google Play, allows residents to store and manage their identification credentials on their smartphones, incorporating advanced encryption and biometric authentication to protect personal information. West Virginia Residents can use the app to verify their identities directly from their mobile phones at TSA PreCheck® Checkpoints at participating airports across the country. Digital solution West Virginia residents can also expect to see mobile ID expand to OEM wallets in the future This digital solution is designed to streamline interactions with government agencies, businesses, and various service providers, offering a modern method of identification. West Virginia residents can also expect to see mobile ID expand to OEM wallets in the future. Convenient, digital, and secure services "Under the Leadership of Governor Justice and Secretary Wriston, the West Virginia DMV has continued to offer faster, more convenient, digital, and secure services for the citizens of West Virginia." "Having the opportunity to provide the State of West Virginia with a Mobile ID will only enhance the citizen experience by moving the State in a direction that keeps us moving forward with more advanced technology," said Everett Frazier, Commissioner for the West Virginia Division of Motor Vehicles. Privacy and interoperability The app is designed to conform to the ISO standard for ISO 18013-5 offering a high level of assurance As an advanced and secure identity credential, the West Virginia mID app was created with IDEMIA’s patented technologies, robust security features, and a focus on privacy and interoperability at the forefront of the technology. The app is also designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5), offering a high level of assurance that West Virginia residents and relying parties of mobile ID can trust. Contactless alternative IDs "I’m excited that we have worked with West Virginia to bring their residents an efficient and contactless alternative to physical IDs. It is also secure as only mobile ID holders can unlock their app using their biometrics or a personal six-digit PIN, ensuring exclusive access," said Donnie Scott, CEO of IDEMIA Public Security North America "Even better users have full control over when and with whom they share their information, giving them more privacy compared to traditional physical credentials. They can decide to share complete personal information, or for example, just their birth date when making an age-restricted purchase." Mobile ID The launch of mobile ID in West Virginia demonstrates IDEMIA’s ongoing efforts to advance digital identity and solutions for public and private sector use. Arizona, Delaware, Iowa, Mississippi, and New York are additional states that have rolled out IDEMIA’s mobile ID technology, with more states to launch later this year.
RecFaces confirms its participation in Intersec 2025, the world’s largest business event focused on security. RecFaces will feature its pioneering facial recognition solutions, Id-Guard and Id-Gate, at booth SA-F29 in the Security Pavilion from January 14-16, 2025, at the Dubai World Trade Centre. With more than 200 installations worldwide backed by a diversified team with more than 15 years of experience in Facial Biometrics, its flagship products are Id-Guard, for enhancing security operations using advanced video surveillance with rapid person identification capabilities, and Id-Gate for making access control systems seamless for identity verification will play an essential role in shaping the future of security and surveillance at Intersec 2025. Insights to drive innovation RecFaces firmly believes in the success of facial biometrics through a collaborative ecosystem of diverse stakeholders, including Technological Partners, Distributors, System Integrators, End-Users, Security Professionals, etc., all of whom bring valuable insights to drive innovation and effectiveness in security solutions and are looking forward to connecting with them at their booth. "To constantly steal a march from the threat actors, organisations need to adopt a proactive mindset—always alert. Through Facial Recognition, we empower businesses to embrace this forward-thinking approach," said Eugenia Marina, Business Development, Director, MENA region.
Verkada is sharing 2025 predictions related to each of its various product categories, ranging from how AI will unlock new insights for security teams to how advancements in camera technology will enhance accuracy and decision-making. Here are some comments from Verkada’s security professionals looking ahead to the new year. AI in security "Large language and vision models reduce investigation times and unlock deeper insights. AI is already transforming the ways that security teams search for people, vehicles, and objects, and that will only continue to evolve." "Soon, organisations will be able to use large language and vision models to search through a wider range of situations, like using natural language to search for specific sounds or actions like a window breaking. Ultimately, these new efficiencies will save precious time in moments when—especially for security and safety—every second matters," Yunchao Gong, VP of Engineering, Cameras at Verkada. Cameras "Convolutional neural network (CNN) based computer vision at the edge will drive faster, more accurate real-time monitoring and enhanced decision-making capabilities in security. For example, while legacy systems might rely on basic motion detection or predefined triggers, a CNN-powered camera can instantly differentiate between an authorised employee and an unauthorised intruder, alert security teams, and trigger automated responses such as locking nearby doors or redirecting cameras for better coverage. Ultimately, this will drive more innovation around how security operations are managed and optimised," Yunchao Gong, VP of Engineering, Cameras at Verkada. "Edge-based transformers unlock deeper insights with greater accuracy. Edge-based transformers excel in accurately identifying precise motions or activities, which will be a game-changer when it comes to safety and security. Take hospitals, for example—monitoring patients for falls and ensuring immediate response is a constant priority." "Compared to traditional transformers that rely on sending data to the cloud for processing (which can introduce delays and errors), edge-based transformers process everything locally on the device. This enables more accurate fall detection and real-time alerts, ensuring faster and more reliable responses when it matters most," Yunchao Gong, VP of Engineering, Cameras at Verkada. Access control "Mobile credentials will become ubiquitous. Smartphones have become an essential multifaceted tool for everyday life and, as a result, an item most people wouldn’t think of leaving behind. This has primed consumers to adopt mobile credentials. Because they already rely on their phones for everyday life, people want to access mobile credentials across more parts of their lives—from digital driver’s licences in place of physical identification at airports to mobile key cards for hotel rooms." "Digital wallets like Apple Wallet are also making it easier to deploy mobile credentials at scale. This appetite for convenient, secure identity verification and access control solutions is just at the beginning and will likely drive mobile credential adoption across nearly every other use case and sector," Jake Leichtling, Director of Product Management, Access Control. Intercoms "Large language and vision models are changing the ways that Intercoms can be leveraged for organisations. For example, real-time speech-to-text transcription can help security teams find relevant audio recordings for specific incidents in seconds by searching for keywords such as names or the stated purpose of a visit. Paired with edge computing—which powers in-call person-of-interest alerts and enables natural language video searches—intercoms can instantly verify and alert front desk staff if a person is not permitted to enter the premises as well as help security teams track down specific footage using natural language search terms like “person in red shirt with black baseball hat.” "As intercoms shift from being simple communication devices into powerful multi-functional tools, new technology like intelligent voice recognition and expanded applications of natural language processing will unlock even more use cases for organisations to reduce friction in the visitor experience and streamline security operations," David Zhai, Lead Product Manager, Intercoms at Verkada. Environmental Sensors "OSHA is broadening its remit to protect workers amid growing climate concerns. OSHA’s new heat index requirement in California—a regulation that requires workplaces to monitor and track temperature and humidity levels to prevent heat-related illnesses—reflects a growing trend of government agencies expanding the environmental conditions that workplaces must monitor." "This trend is spreading nationwide, with OSHA now proposing heat protection standards at the federal level as well. To comply with new environmental requirements and safeguard employee health, organisations will need technology that can monitor a wider range of environmental conditions—not just CO2 levels or particulate matter," Dominic Komarek, Product Manager, Verkada.
Suprema, a global pioneer in AI-powered biometric and security solutions, showcased its next-generation enterprise security innovations at Intersec 2025, the largest security trade fair in the Middle East, held in Dubai from January 14th to 16th. At its booth, Suprema demonstrated its commitment to transforming enterprise security solution providers by offering a comprehensive portfolio of solutions embedded with cutting-edge technologies, including AI, cloud, and video. Innovative video features BioStar 2, equipped with the MCS to seamlessly manage extensive device networks At the booth, Suprema showcased the new BioStar, integrating its proprietary AI-powered intelligent video analytics and surveillance technology into the access control system. By demonstrating these innovative video features, the Suprema booth garnered significant attention and high expectations from attendees. Additionally, BioStar 2, equipped with the Multi-Communication Server (MCS) to seamlessly manage extensive device networks and large-scale user enrolments, has been successfully deployed at large-scale sites such as the Government Complex Sejong in South Korea and the Mohammed VI University Hospital in Morocco, delivering enterprise-level scalability and reliability. Deployment of security systems Suprema also showcased an upgraded hardware lineup. The BioEntry W3, a mullion-type AI-powered facial authentication device designed for durability and robust data privacy, has received an overwhelmingly positive market response, with deployments rapidly increasing across various industries since its launch three months ago. Additionally, Suprema introduced the CoreStation 20, a newly designed controller built to enable the cost-effective and scalable deployment of security systems, suitable for both large-scale sites and small offices. Suprema’s cloud expertise Suprema’s cloud expertise was exemplified through CLUe, an open cloud integration platform Suprema’s cloud expertise was exemplified through CLUe, an open cloud integration platform. CLUe provides seamless integration with third-party systems via standard REST APIs and supports various authentication methods, including QR codes and biometrics. One of its standout features is the versatility allowing customers to customise the platform to meet specific needs, such as access control, membership/visitor management, or time and attendance management. New standard for security solutions “This year’s Intersec marks the beginning of Suprema’s next chapter, setting a new standard for security solutions worldwide,” said Hanchul Kim, CEO of Suprema Inc. “Our focus is on providing innovative, reliable, and scalable solutions that empower organisations to strengthen security and enhance operational efficiency in today’s dynamic global landscape.”
TOA Canada's D5000 Series provides unprecedented speech clarity, delivering the presenter’s voice to audiences in any speaking scenario. Whether for the classroom, office meeting rooms, banquet halls, courthouses, or multipurpose halls, the D-5000 delivers audio with clarity and ease of use. To this point, this series has been a special-order product, but TOA Canada are happy to announce that they are now officially bringing it into the extensive catalogue of sound solutions. Suite of features The core inspiration of this series was 'voice clarity and comfort for any speaking scenario'. And with this series checking off those criteria and then some, they’re excited to be able to bring this series into TOA Canada’s Catalogue. This series boasts a suite of features developed to benefit the user and use-case alike, including: TOA’s proprietary digital audio processing ensures optimal sound quality and intelligibility for speech applications. Up to 32 simultaneous channels. Region dependent. 15 compatible channels per 6 MHz, 20 compatible channels per 8 MHz TV channel. Proprietary encryption settings to prevent data leakage. Approx. 100 m operating range (line of sight). Dedicated maintenance software for visual monitoring of any jam radio waves or changes to incoming radio waves. Assured signal stability via the digital diversity method. Control of peripherals is possible using contact output.
The CNI Security Group will be holding its next event at Guildhall London, on Wednesday 26th February. Beginning at 10.00 am, the day is entitled, ‘Is AI the future of security?’ and will concentrate on AI (Artificial Intelligence) and the extent of its application within real end-user case studies. AI in CNI security With technology examples and seminars from a host of expert speakers, including Pauline Norstrom FRSA, FIoD, FBCS, Founder and CEO - Anekanta®AI, Anekanta®Consulting and Non-Executive Director – BSIA, and Andy Schofield, CTO at Reliance and the Chair of the Special Interest Group (SIG) for AI & Biometrics at the BSIA, attendees will hear different perspectives on the applicability of AI in the CNI (Critical National Infrastructure) security sector, while gaining valuable insights into the latest developments and available technologies. Hosted by each of the CNI Security Group’s manufacturer members, integrated product solutions will be discussed to provide invaluable security technology information applicable for high security, CNI, and Government end-users, consultants, and system designers. End-to-end AI solutions The event promotes the CNI Security Group’s initiative, underpinned by world-class experience from technology Aimed at providing fully integrated, secure, and futureproofed end-to-end AI solutions, the event promotes the CNI Security Group’s initiative, underpinned by world-class experience from technology members barox, Nedap, ISM, and Harper Chalice - alongside guest partners Dallmeier & Commend. At the event, member manufacturer stands will display a mix of class-pioneering equipment specifically chosen to meet the demanding needs of AI applications, and will include surveillance cameras, industrial ethernet switches, analytics, access control, and perimeter intrusion detection systems. Sharing real-world view “I am delighted to announce that our next event with focus on AI, a topic that is very much ‘front and forward’ when it comes to designing more sophisticated, efficient systems of the future, without compromise on security,” says Sara Fisher, barox International Market Development Specialist. “We have a fabulous line-up of speakers, including end users, who will be sharing with attendees their real-world view of AI deployment in practice - addressing the benefits, considerations, and challenges faced when designing and utilising the technology." AI in practice "Alongside a unique insight, they will promote a debate on the big question of whether there is a place for AI in CNI and high-security applications." “We’re also looking forward to welcoming both Commend and Dallmeier as guest partners to this AI-focused event.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even 'mac addresses' or a person of interest's gait, now all make up the technology toolbox of forward-thinking organisations' security policy. However, humans remain the weakest link in any security chain, and the only way to correct this is to eliminate the human burden, argues Richard Hilson, head of sales for security access management specialist, Parking Facilities. Here, he examines the pitfalls in relying upon human intervention in critical national infrastructure (CNI) settings, and the future of biometrics to keep assets, information and personnel safe. Recent Verizon report 74 percent of corps are saying that insider threats are becoming more of a concern for them As with any workplace initiative, be it a simple recycling policy or a corporate password protection directive, technology is only as good as those who implement or operate it. Whilst technology can be fallible and gremlins do arise, it’s never as flawed as us mere humans with our unreliable ‘on/off’ switch. Likewise, we carry the ability to reason, to override procedures, or ignore policy, should we wish. Or as it happens, just make mistakes. In fact, according to a recent Verizon report, two out of three insider attacks happen as a result of negligence, and 74 percent of organisations are saying that insider threats are becoming more of a concern for them. Fundamental security practices Security breaches aren’t limited to external threats either, whether intentionally or not, they can come from within. Humans can, and do, ‘go rogue’, whether that’s pre-meditated criminal or malicious intent, or just by taking shortcuts. While data breaches court most news headlines in this digital era, some of the most significant security risks are those posed when employees neglect fundamental security practices such as sharing passwords or access cards. Employee negligence and insider threats Insider negligence remains one of the pioneering causes of security breaches Insider negligence remains one of the pioneering causes of security breaches. Employees who share passwords or access cards may do so out of convenience, ignorance, or a misplaced sense of trust. Unfortunately, this creates vulnerabilities that are left open to exploitation. When multiple employees share credentials, it becomes difficult to trace actions to a single individual. This lack of accountability can complicate incident investigations and allows malicious activities to go undetected. Emergency services resources Furthermore, the sharing of passwords or access cards means inaccurate accounting of personnel, and in the event of an evacuation or major incident, central IT systems will hold misleading information of employees’ locations which could have a huge impact upon safety and potentially emergency services resources. Employees with malicious intent can exploit shared credentials to carry out unauthorised activities while shifting blame to others, increasing the risk of deliberate sabotage or theft of sensitive data. Even when there is no malicious intent, employees who share access credentials risk unintentionally exposing them to unauthorised individuals, such as contractors, visitors, or external attackers. What happens when employees compromise security? Access cards are designed to limit entry to restricted physical locations. When shared, unauthorised personnel could enter secure areas such as control rooms, rail lines, large construction sites, data centres, power plants or indeed any site meant to be kept secure. This creates opportunities for sabotage, theft, or corporate espionage. Sensitive data held within critical sites, such as blueprints, system controls, and customer records Likewise, shared passwords can lead to unauthorised entry into IT systems, allowing hackers to install malware, ransomware, or spyware. For example, a cybercriminal gaining access to an energy grid system could shut down power to entire regions, causing chaos to millions of people, and disrupting essential services. And not all data breaches are caused by online hackers gaining entry through unsecure firewalls. Sensitive information held within critical sites, such as blueprints, system controls, and customer records, becomes vulnerable when access credentials are shared too, and the disclosure of such information can have a serious impact upon a company’s bottom line, operations, and ultimately its reputation. Eliminating the human burden One way to prevent human error, or to thwart malpractice is to reduce the burden upon employees to be compliant, and eliminate our flaws by using technology that requires no intervention, decision-making or reason. Facial recognition is widely used in the civil world now, despite the concerns of various lobbyists. Used correctly it is not a ‘catch all’, but an instant recognition of persons of interest cross referenced against a database of known suspects. Our car parks are governed by automatic number plate recognition (ANPR) to gain access in and out, while border controls are using advanced biometrics for everything from facial and fingerprint recognition, through to recognition of human characteristics and gait, for both entry and to apprehend. The UK Home Office is even accelerating its transition to digital border management, using biometric technology to improve efficiencies, safety, and to track and capture known or illegal persons. What of the CNI sites? But what of the corporate world? What of the CNI sites, our airports, our national construction developments such as HS2 or our high-rise office spaces? We always ask this very question, and also ‘can you afford a security breach’ in whatever environment you’re in? Because the smart, cloud-based technology being used by governments, law enforcement authorities and Border Force have cascaded down through the civil and corporate worlds. Immediate safety and security Security-conscious corps are diligently removing human error, by eliminating the human burden Security-conscious organisations are now diligently removing human error, by eliminating the human burden. With cloud-managed software not only are access points managed through biometric integration, but it also overcomes the issues mentioned earlier around accountability - in that the cloud will always register who has passed through an access point, or out of it. This is critical for both immediate safety and security but also for matters arising from a crisis, or emergency situation. It’s also less admin-heavy, more cost-effective and can manage and store employee records, including background checks. Employee or contractor data is encrypted, their information is safe, their interactions are secure, and businesses are protected. Implement robust access management systems Simple acts of negligence, such as sharing passwords or access cards, can open the door to catastrophic consequences, operational disruption, financial loss, and even, in the case of CNI, national security risks. To mitigate this, organisations can do worse than to implement robust access management systems, and in doing so, release employees from having to be accountable for ensuring the security of the sites in which they work. As artificial intelligence evolves, I see even more robust biometrics coming to the fore, until such time we work and live in environments that are controlled without us even knowing security checkpoints are all around us, and access management happening at every step. It will become as ‘every day’ as an automatic door allowing entry into our local supermarket - but we’re not quite there yet.
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Security beat
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
Omnilert, a pioneer in active shooter solutions, announced that Sarasota County Schools in Florida is deploying its Omnilert Gun Detect system to monitor over 4,800 security cameras throughout the entire school district, representing the largest deployment of its kind in Florida aimed at thwarting the presence of weapons on school campuses. Omnilert Gun Detect is the most effective and complete AI visual gun detection system available–providing 24/7 monitoring with a near-instant response at the first sight of a gun with rich automation capabilities that can lock doors, notify police and trigger alarms to ensure the best possible outcomes in the event of an active shooter incident. Additional layers of technology Sarasota Schools educates and covers over 45,000 pupils across 56 schools and employs more than 5,200 teachers Sarasota County Schools already completed a successful deployment in one of its high schools the past year, which received overwhelmingly positive results and response from parents and staff. It is now in the process of deploying the system with the entire district’s camera network. Sarasota County Schools educates and protects over 45,000 students across 56 schools and employs more than 5,200 teachers and staff including its own police department and school resource officers. “Maintaining a safe learning environment is paramount for our school district,” said Terry Connor, Superintendent of Schools for Sarasota County. “Our district is fortunate to have a safety conscious School Board and community who understands this need and invests in solutions that will make for safer schools. It is critical to have additional layers of technology such as Omnilert Gun Detect working behind the scenes to ensure the safety our students and staff every day of the school year.” Infrastructure of safety systems “Omnilert Gun Detect clearly fit our requirements for flexible detection verification and response escalation with the ability to activate our existing infrastructure of safety systems,” said Sean O’Keefe, Director of Security at Sarasota County Schools. “Accurate gun detections and fast verifications are only the beginning of a response. It is critical for us to share the intelligence from Omnilert with our safety systems immediately to ensure we maximise as many seconds or minutes as possible for our police and security teams to respond to a potential situation and to protect lives.” Largest deployments of AI gun detection Security cameras can be altered into 24/7 monitors of weapons that never get tired and distracted Omnilert Gun Detect is protecting several hundred schools and other organisations across the country, with many deployments being the largest ever recorded. Sarasota sets the record in Florida and is the second largest in the nation next to Baltimore County Public Schools, the largest deployment of AI visual gun detection in the United States with their 7,500 cameras. These large installations highlight the ease of use and flexibility that customers experience when integrating Omnilert technology with their existing cameras and security infrastructure. Security cameras can be transformed into 24/7 monitors of weapons that never get tired and distracted and can automatically initiate a pre-planned response to save lives in the event a weapon ever came on campus. Activation of safety systems “Sarasota’s comprehensive safety program to enhance school security is a model for school districts across the nation as it combines early detection with an activation of safety systems that speeds response and removes the potential for human error,” commented Dave Fraser, CEO of Omnilert. “We make it a priority to ensure our technology integrates with other safety systems so security teams can capitalise on their existing investments and utilise a full range of capabilities to protect their people.” How Omnilert Gun Detect works Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout a campus Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout campus, both indoors and outdoors. Once a gun is detected, it sends an alert to a designated person at either Omnilert Monitoring centres or the customer’s security operations centre to verify detections. When a threat is confirmed, Omnilert Gun Detect triggers a series of alerts that sets security systems into motion and police into action to protect those in harm’s way. This solution gives emergency response teams advance warning before shots are fired and delivers precise information on the location and a photo and video of the potential shooter for a much more effective response. Omnilert’s software Unlike other solutions that merely provide weapon identification and verification, Omnilert Gun Detect integrates with video management systems, access control systems, emergency mass notification solutions, audio and video communication platforms and more. Omnilert’s software can easily be deployed with any existing IP-based camera and can monitor spaces that other safety technologies miss such as exterior grounds and parking lots. The software was designed with privacy concerns in mind so there is no use of biometrics like facial recognition and the live video feeds never leave the school premises.
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
Cognitec Systems is providing reliable face recognition technology to Brazilian payment solutions provider - Billingpay for use in Rio de Janeiro’s public transport system. Automated face recognition Billingpay has implemented automated face recognition to facilitate digital ticketing via the transport application Jaé, to be used by more than four million users daily. Currently, about 11 thousand capture devices are installed throughout the city’s transportation system. Facial biometrics The process starts with the enrollment of facial images during the registration service The process starts with the enrollment of facial images during the registration service, which is then used to prevent revenue evasion in public transportation. Facial biometrics match the ticket holder to the correct ticket, therefore preventing fraudulent use of subsidised tickets. “The second largest city in Brazil now operates one of the most modern and secure ticketing systems in the world, with added high-performance technology from Cognitec!” comments Marcello Perrotta, CCO of Billingpay. Modern identification services Public transport users can also present their faces to log into the Jaé platform and access buses or trains without the need for a ticket or identification. “This use case is a testament to the countless capabilities of face recognition technologies for modern identification services,” says Alfredo Herrera, Cognitec’s Managing Director, adding “We are excited to be a part of this innovative project, and this successful international partnership with Billingpay!”
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
Matrix's client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs but also strategically positioned it for future advancements and scalability.
The university in rural Maharashtra is committed to providing a holistic and inclusive education that focuses on character building, intellectual growth, and community service. Its mission is to develop knowledgeable, compassionate citizens. With an emphasis on interdisciplinary studies, experiential learning, and cultural heritage preservation, the institution aims to foster creativity, innovation, leadership, and responsible global citizenship. Featuring one of the largest campuses in Mumbai, the university offers a diverse range of programmes across nine different disciplines. Challenge/Requirements The client faced considerable difficulties with their current communication system. The wired configuration demanded frequent maintenance and ongoing problems with voice communication quality persisted. The primary challenges they encountered included: Problems with wired communication: The wired system experienced issues like corrosion, causing a decline in communication quality. Call Quality: The communication system faced problems like dropped calls and interruptions during active conversations. Multi-location and Unified Communication Solution: Upgrading the infrastructure was essential to connect and unify various sites across the campus. Integration with Existing Infrastructure: The new solution had to be compatible with their current setup to bring modernisation. Redundancy: To guarantee minimal or no downtime, especially in emergencies, incorporating redundancy was essential. Matrix solution Matrix, in partnership with Shreeji Comsec, designed a solution that greatly improved the university's communication capabilities. The key aspects of this solution are summarised below: The current infrastructure relied on copper PRI lines, which needed to be upgraded to IP. To support this transition, two Matrix VoIP-PRI gateways, the SETU VTEP2P and SETU VTEP4P, were utilised. The VoIP-PRI gateways are now compatible with two Matrix IP Phones: the SPARSH VP510 and SPARSH VP210. The IP connection can now be routed through SIP (TATA) trunks via the Matrix server-based PBX, ANANT. The server-based PBX, ANANT, provided seamless communication with integrated redundancy, effectively eliminating downtime. Results observed The solution enabled the university to consolidate multiple sites into a single communication network. Legacy systems were smoothly integrated with modern VoIP technology, optimising existing investments and enhancing the overall communication infrastructure. This upgrade notably increased operational efficiency. Here is a detailed overview of the solution: Multi-location Solution: Multiple sites were integrated into a unified, comprehensive communication system. Unified Communication Solution: Integrating with the server-based PBX, ANANT, facilitated seamless collaboration and ensured uninterrupted information transfer and reception. Investment Optimisation: The integration of SIP with the Matrix Solution, seamlessly incorporated into the existing network infrastructure. This approach maximised the use of existing resources and avoided the need for additional investments. Operational Efficiency: The redundancy built into ANANT ensured minimal or no downtime, facilitating a continuous flow of information and significantly enhancing workflow efficiency. This feature was crucial for maintaining critical communications and handling emergencies effectively. Modern Features: The office benefits from advanced functionalities provided by Matrix Standard SIP desk phones, including the SPARSH VP510. These features, such as call-back and auto-answer over secure SIP communication, greatly enhance the university’s communication capabilities. The Matrix communication solution allowed the university to both enhance and modernise its communication capabilities, equipping them with advanced, state-of-the-art call features. Products offered Matrix ANANT: PBX Server for Unified Communications Matrix SETU VTEP4P: VoIP - PRI Gateway Matrix SETU VTEP2P: VoIP - PRI Gateway Matrix SETU VFXTH: VoIP - FXO - FXS Gateway Matrix SPARSH VP510E: Standard SIP Phone
Omnilert, a pioneer in active shooter solutions, announced that Sarasota County Schools in Florida is deploying its Omnilert Gun Detect system to monitor over 4,800 security cameras throughout the entire school district, representing the largest deployment of its kind in Florida aimed at thwarting the presence of weapons on school campuses. Omnilert Gun Detect is the most effective and complete AI visual gun detection system available–providing 24/7 monitoring with a near-instant response at the first sight of a gun with rich automation capabilities that can lock doors, notify police and trigger alarms to ensure the best possible outcomes in the event of an active shooter incident. Additional layers of technology Sarasota Schools educates and covers over 45,000 pupils across 56 schools and employs more than 5,200 teachers Sarasota County Schools already completed a successful deployment in one of its high schools the past year, which received overwhelmingly positive results and response from parents and staff. It is now in the process of deploying the system with the entire district’s camera network. Sarasota County Schools educates and protects over 45,000 students across 56 schools and employs more than 5,200 teachers and staff including its own police department and school resource officers. “Maintaining a safe learning environment is paramount for our school district,” said Terry Connor, Superintendent of Schools for Sarasota County. “Our district is fortunate to have a safety conscious School Board and community who understands this need and invests in solutions that will make for safer schools. It is critical to have additional layers of technology such as Omnilert Gun Detect working behind the scenes to ensure the safety our students and staff every day of the school year.” Infrastructure of safety systems “Omnilert Gun Detect clearly fit our requirements for flexible detection verification and response escalation with the ability to activate our existing infrastructure of safety systems,” said Sean O’Keefe, Director of Security at Sarasota County Schools. “Accurate gun detections and fast verifications are only the beginning of a response. It is critical for us to share the intelligence from Omnilert with our safety systems immediately to ensure we maximise as many seconds or minutes as possible for our police and security teams to respond to a potential situation and to protect lives.” Largest deployments of AI gun detection Security cameras can be altered into 24/7 monitors of weapons that never get tired and distracted Omnilert Gun Detect is protecting several hundred schools and other organisations across the country, with many deployments being the largest ever recorded. Sarasota sets the record in Florida and is the second largest in the nation next to Baltimore County Public Schools, the largest deployment of AI visual gun detection in the United States with their 7,500 cameras. These large installations highlight the ease of use and flexibility that customers experience when integrating Omnilert technology with their existing cameras and security infrastructure. Security cameras can be transformed into 24/7 monitors of weapons that never get tired and distracted and can automatically initiate a pre-planned response to save lives in the event a weapon ever came on campus. Activation of safety systems “Sarasota’s comprehensive safety program to enhance school security is a model for school districts across the nation as it combines early detection with an activation of safety systems that speeds response and removes the potential for human error,” commented Dave Fraser, CEO of Omnilert. “We make it a priority to ensure our technology integrates with other safety systems so security teams can capitalise on their existing investments and utilise a full range of capabilities to protect their people.” How Omnilert Gun Detect works Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout a campus Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout campus, both indoors and outdoors. Once a gun is detected, it sends an alert to a designated person at either Omnilert Monitoring centres or the customer’s security operations centre to verify detections. When a threat is confirmed, Omnilert Gun Detect triggers a series of alerts that sets security systems into motion and police into action to protect those in harm’s way. This solution gives emergency response teams advance warning before shots are fired and delivers precise information on the location and a photo and video of the potential shooter for a much more effective response. Omnilert’s software Unlike other solutions that merely provide weapon identification and verification, Omnilert Gun Detect integrates with video management systems, access control systems, emergency mass notification solutions, audio and video communication platforms and more. Omnilert’s software can easily be deployed with any existing IP-based camera and can monitor spaces that other safety technologies miss such as exterior grounds and parking lots. The software was designed with privacy concerns in mind so there is no use of biometrics like facial recognition and the live video feeds never leave the school premises.
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organisational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimise communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
Cognitec Systems is providing reliable face recognition technology to Brazilian payment solutions provider - Billingpay for use in Rio de Janeiro’s public transport system. Automated face recognition Billingpay has implemented automated face recognition to facilitate digital ticketing via the transport application Jaé, to be used by more than four million users daily. Currently, about 11 thousand capture devices are installed throughout the city’s transportation system. Facial biometrics The process starts with the enrollment of facial images during the registration service The process starts with the enrollment of facial images during the registration service, which is then used to prevent revenue evasion in public transportation. Facial biometrics match the ticket holder to the correct ticket, therefore preventing fraudulent use of subsidised tickets. “The second largest city in Brazil now operates one of the most modern and secure ticketing systems in the world, with added high-performance technology from Cognitec!” comments Marcello Perrotta, CCO of Billingpay. Modern identification services Public transport users can also present their faces to log into the Jaé platform and access buses or trains without the need for a ticket or identification. “This use case is a testament to the countless capabilities of face recognition technologies for modern identification services,” says Alfredo Herrera, Cognitec’s Managing Director, adding “We are excited to be a part of this innovative project, and this successful international partnership with Billingpay!”
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.
Matrix's client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs but also strategically positioned it for future advancements and scalability.
The university in rural Maharashtra is committed to providing a holistic and inclusive education that focuses on character building, intellectual growth, and community service. Its mission is to develop knowledgeable, compassionate citizens. With an emphasis on interdisciplinary studies, experiential learning, and cultural heritage preservation, the institution aims to foster creativity, innovation, leadership, and responsible global citizenship. Featuring one of the largest campuses in Mumbai, the university offers a diverse range of programmes across nine different disciplines. Challenge/Requirements The client faced considerable difficulties with their current communication system. The wired configuration demanded frequent maintenance and ongoing problems with voice communication quality persisted. The primary challenges they encountered included: Problems with wired communication: The wired system experienced issues like corrosion, causing a decline in communication quality. Call Quality: The communication system faced problems like dropped calls and interruptions during active conversations. Multi-location and Unified Communication Solution: Upgrading the infrastructure was essential to connect and unify various sites across the campus. Integration with Existing Infrastructure: The new solution had to be compatible with their current setup to bring modernisation. Redundancy: To guarantee minimal or no downtime, especially in emergencies, incorporating redundancy was essential. Matrix solution Matrix, in partnership with Shreeji Comsec, designed a solution that greatly improved the university's communication capabilities. The key aspects of this solution are summarised below: The current infrastructure relied on copper PRI lines, which needed to be upgraded to IP. To support this transition, two Matrix VoIP-PRI gateways, the SETU VTEP2P and SETU VTEP4P, were utilised. The VoIP-PRI gateways are now compatible with two Matrix IP Phones: the SPARSH VP510 and SPARSH VP210. The IP connection can now be routed through SIP (TATA) trunks via the Matrix server-based PBX, ANANT. The server-based PBX, ANANT, provided seamless communication with integrated redundancy, effectively eliminating downtime. Results observed The solution enabled the university to consolidate multiple sites into a single communication network. Legacy systems were smoothly integrated with modern VoIP technology, optimising existing investments and enhancing the overall communication infrastructure. This upgrade notably increased operational efficiency. Here is a detailed overview of the solution: Multi-location Solution: Multiple sites were integrated into a unified, comprehensive communication system. Unified Communication Solution: Integrating with the server-based PBX, ANANT, facilitated seamless collaboration and ensured uninterrupted information transfer and reception. Investment Optimisation: The integration of SIP with the Matrix Solution, seamlessly incorporated into the existing network infrastructure. This approach maximised the use of existing resources and avoided the need for additional investments. Operational Efficiency: The redundancy built into ANANT ensured minimal or no downtime, facilitating a continuous flow of information and significantly enhancing workflow efficiency. This feature was crucial for maintaining critical communications and handling emergencies effectively. Modern Features: The office benefits from advanced functionalities provided by Matrix Standard SIP desk phones, including the SPARSH VP510. These features, such as call-back and auto-answer over secure SIP communication, greatly enhance the university’s communication capabilities. The Matrix communication solution allowed the university to both enhance and modernise its communication capabilities, equipping them with advanced, state-of-the-art call features. Products offered Matrix ANANT: PBX Server for Unified Communications Matrix SETU VTEP4P: VoIP - PRI Gateway Matrix SETU VTEP2P: VoIP - PRI Gateway Matrix SETU VFXTH: VoIP - FXO - FXS Gateway Matrix SPARSH VP510E: Standard SIP Phone
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![2025 Trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/email-image.png)
2025 Trends in video surveillance
Download![7 proven solutions for law enforcement key control and asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1738766148.png)
7 proven solutions for law enforcement key control and asset management
Download![Maximising security and performance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1736935536.png)
Maximising security and performance
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download