Electronic security systems
The 23rd edition of the Airport Show was the venue to showcase and introduce new technologies and services in ground handling, cargo movements, and airport operations to foster agility as well as sustainability. More than 30 new innovators joined the Airport Show to introduce their cutting-edge technologies and services. Innovations introduced were a major draw at the Show, which attracted thousands of trade visitors and stakeholders. Helipad Systems Supplies Ground handling service providers...
At this year’s Road Transport Expo, Labcraft, the industry-pioneering designers and manufacturers of LED lighting for commercial vehicles, is presenting its latest Banksman lighting systems alongside a new range of compatible harness kits, designed to save time and money during installation. Available in four models – BM2, BM3, BM4, and BM6 - Labcraft’s innovative Banksman lighting solutions deliver additional bright light around the vehicle, helping drivers to manoeuvre more...
Codelocks (Australia) Pty Ltd, an access control company that designs and distributes innovative, standalone keyless door locks, is celebrating ten years of providing leading-edge mechanical and electronic access control solutions to the APAC market. In ten years, the Australian arm of the global company, headquartered in the UK with subsidiary offices in North America and Europe, has grown into a multi-million AUS dollar business serving over 1,500 clients across Australia, New Zealand and Asi...
Gunnebo Entrance Control has reaffirmed its commitment to sustainability, with a bold ambition to achieve net zero emissions by 2045. Grounded in the principles of employee empowerment, ethical business practices, and environmental stewardship, Gunnebo Entrance Control is taking decisive steps to embark on a pathway or gateway to a sustainable future aligned with the ambitious targets of the Paris Agreement. Project Earth As part of its sustainability approach, Gunnebo AB has launched Project...
Allied Universal®, the world’s renowned security and facility services company, has been named to the Newsweek list of America's Greatest Workplaces for Job Starters 2024 with a ranking of four and a half stars. The list was compiled based on responses from people with less than five years of employment experience currently working at companies with more than 500 employees. Greatest Workplaces for Job Starters “Allied Universal is honoured to be recognised as one of Amer...
ASTM International presented its top annual award – the 2024 Award of Merit to Nicholas Paulter for his contributions to ASTM’s security systems and equipment committee (F12). The prestigious award, which includes the accompanying title of fellow, is ASTM’s highest recognition for distinguished service and outstanding participation in ASTM International committee activities. Expert leadership Paulter was recognised for his successful guidance of member discussions through co...
News
Fingerprint Cards AB has partnered with Lapa Electric, an Indian-based premium electric mobility start-up, to bring the best security to two-wheelers and create India’s first biometric-enabled electric scooter (e-scooter). The use of e-scooters in India has sky-rocketed in recent years, and this growth is expected to continue. In 2023, the penetration rate of e-scooters in India was 13%, yet by 2030 this is projected to grow to 75%. Use of biometrics Adam Philpott, CEO of Fingerprints, comments, “Over the last 10 years, biometrics has become the preferred authentication method for consumers and businesses alike. From our phones, laptops, and payment cards to our homes and workplaces, biometrics is adding security while removing friction." He adds, "As our lives, and our vehicles, become increasingly connected, we must enhance security processes and biometrics is a natural progression to underpin the future of mobility.” Biometric smartness Users won’t have to worry about losing or having their keys stolen anymore as they become the key By replacing traditional physical keys with biometric authentication, only enrolled users will be able to use the e-scooter, drastically reducing the risk of theft. In addition, users won’t have to worry about losing or having their keys stolen anymore as they become the key. Pavan Kumar at Lapa Electric, said, “At Lapa Electric we are on the verge of bringing in a new engineering approach to E two-wheelers like for example replacing heavy steel chassis with weddings and bolts and nuts with light and robust seamless monocoque carbon fiber chassis. Now we’re replacing physical keys with biometric smartness. The resulting scooter embodies premium and performance.” Biometric sensor and algorithm Lapa Electric’s key challenge was to find the smallest sensors that could be integrated into its patented console and throttle system. This is where the engineering collaboration between Fingerprints and Lapa started. Lapa Electric’s e-scooter will integrate Fingerprints’ proven biometric sensor and algorithm. The biometric-enabled e-scooters are presently under vehicle road testing and will be launched in limited numbers by early 2025.
DigiCert, a major global provider of digital trust, reconfirmed its commitment to standards and compliance with the successful completion of 31 audits within a 12-month period. These audits include a range of crucial certifications, including the SOC 2 Type II audit for DigiCert® DNS Trust Manager and the ETSI audit for DigiCert CertCentral® Europe, underscoring DigiCert's dedication to ensuring robust security measures and regulatory adherence across its offerings, around the world. Stringent regulatory requirements DigiCert is demonstrating its steadfast duty to meeting and exceeding industry standards for security In an increasingly connected and regulated digital landscape, compliance has emerged as a critical differentiator for businesses striving to earn and maintain customer trust. By successfully completing a comprehensive array of audits, DigiCert is demonstrating its steadfast commitment to meeting and exceeding industry standards for security, reliability, and transparency. These certifications validate the company’s adherence to stringent regulatory requirements and serve as a testament to its proactive approach to safeguarding sensitive data and mitigating cybersecurity risks. In an era where data breaches and compliance violations can have profound consequences for organisations and their stakeholders, DigiCert’s unwavering focus on compliance underscores its position as a trusted partner. SOC 2 Type II audit “Congratulations to DigiCert for completing their SOC 2 audit, a widely recognised signal of trust and security," said Steve Simmons, COO of A-LIGN, a major provider in cybersecurity compliance, adding "It's great to work with organisations like DigiCert, who understand the value of expertise in driving an efficient audit and the importance of a high-quality final report." “Maintaining our focus on compliance isn't just a regulatory obligation; for DigiCert, it's a strategic imperative that sets us apart in a very competitive landscape,” said Brenda Bernal, Vice President of Compliance at DigiCert, adding “Achieving certifications like the SOC 2 Type II audit for DNS Trust Manager and achieving approved status on coveted trust lists not only demonstrates our proactive approach to meeting industry standards, but also reassures our customers that their data and digital assets are safeguarded with the highest level of security and integrity.” DigiCert DNS Trust Manager The SOC 2 Type II audit for DigiCert DNS Trust Manager was conducted by major compliance assessor A-LIGN, a technology-enabled security and compliance partner trusted by more than 2,500 global organisations to help mitigate cybersecurity risks. Established by the American Institute of Certified Public Accountants (AICPA), the SOC 2 examination is designed for organisations of any size, regardless of industry and scope, to ensure the personal assets of their potential and existing customers are protected. SOC 2 reports are recognised globally and affirm that a company’s infrastructure, software, people, data, policies, procedures and operations have been formally reviewed.
Astute Financial Consulting, LLC, a major provider of accounting and business management solutions for security companies using SedonaOffice and FieldHub enterprise software, has named Amy Becker as President. Amy Becker Amy Becker’s promotion was announced by Jim Lee, Founder of Astute, who will remain with the company in the role of CEO. Ms. Becker joined Astute in April 2023, as Senior Vice President after working for over 25 years within the alarm industry in CFO and Controller positions, and as COO at Alarm Detection Systems. Amy Becker holds both CPA and CMA certifications. Expertise and leadership “With an impressive career spanning three decades in finance and accounting, including pivotal roles at renowned security companies, Amy brings invaluable expertise and leadership to our organisation,” said Jim Lee, adding “As President, Amy will undoubtedly inspire and guide our team to new heights.” “It is such a blessing to serve in a role that fits my passions, skills, and abilities like a glove,” said Amy Becker. Advanced financial reporting capabilities Astute uses business intelligence software from Vivid Reports to provide advanced financial reporting capabilities Amy Becker adds, “I'm thankful for all the people I have learned from in my career. Jim and the team are amazing to work with. They are smart, helpful, and professional. And I love working with our fantastic clients. It never gets old hearing how much we help individuals, teams, and companies work smarter.” Astute uses business intelligence software from Vivid Reports to provide advanced financial reporting capabilities, consulting services, and back-office support to security integrators and alarm companies throughout North America. Automation, forecasting, and business insights Its clients rely on Astute to run their businesses more effectively, increase efficiencies, and grow profitability. Its financial reporting, analysis, budgeting, and compliance software tools provide capabilities beyond the SedonaOffice and FieldHub platforms, providing automation, forecasting, and business insights not otherwise available. In addition to industry veterans Becker and Lee, the company is supported by a team of financial and operational professionals with an average tenure of 15+ years in the security industry.
Secure Logiq is thrilled to announce the launch of 'The Power of Partnerships: Intelligent Integration' at The Security Event 2024. Technology partners Featuring a selection of esteemed Technology Partners in an immersive and interactive live demonstration, the event will spotlight how the meticulous selection of best-of-breed hardware and software components for enterprise electronic security systems can deliver unparalleled results. Alongside Secure Logiq’s cutting-edge server technology, the booth will host prominent partners including 360 Vision Technology, IntelexVision, Lenel, Milestone Systems, and VCA. Interactive and engaging 'digital twin' Users can explore the virtual stand's 'hot spots,' featuring exclusive content from Secure Logiq and partners In a bid to enhance The Security Event visitor experience, Secure Logiq and its partners are introducing a fully interactive and engaging 'digital twin' of the Power Of Partnerships stand. Developed by Security on Screen, the concept offers attendees a sneak preview of the actual stand before their arrival and extends the experience to those unable to attend the event. Users can explore the virtual stand's 'hot spots,' featuring exclusive content from Secure Logiq and partners, including interviews, product showcases, and explainer videos. New and innovative ways Robin Hughes, Co-Founder of Secure Logiq, says, "We're thrilled to introduce this initiative People who know Secure Logiq know that we are always at the cutting edge of technology, both within the business and in seeking new and innovative ways to promote our company." “When approached by Security on Screen with the Digital Twin concept, we saw an exciting opportunity to create a buzz about our presence at The Security Event and attract new customers to the stand before the show. It also allows those unable to attend to understand exactly what we can do and the breadth of the technology partnerships we have." The Power of Partnerships stand Hughes concludes, “We have painstakingly coordinated a complete 3D online version of the Power of Partnerships stand with the release of our new website, showcasing the exciting new website within the stand and featuring the digital twin on the front page." The Power of Partnerships is the perfect opportunity to experience live demonstrations and gain insights into the future of electronic security systems. Join us at The Security Event Premier Partner Hall 5 Stand P75/P80, NEC Birmingham, from 30th April to 2nd May.
Secure Logiq is gearing up for its largest and most dynamic showcase yet at The Security Event 2024 (TSE). Interactive live demonstration Attendees are invited to Stand 5/P75 to experience the future of security technology through immersive and interactive live demonstrations, as well as a highly anticipated 'Big Reveal.' Co-founder Robin Hughes emphasises, "This year, we have gone all out with our biggest stands ever and will be joined by a selection of Technology Partners for a 'not to be missed' immersive and interactive live demonstration." Power of Partnerships: Intelligent Integration Partners on the booth will include 360 Vision Technology, IntelexVision, LenelS2, Milestone Systems, and VCA At the heart of Secure Logiq's showcase is the "Power of Partnerships: Intelligent Integration" initiative, focusing on how selecting the best hardware and software for all components of an enterprise electronic security system can deliver outstanding results. Alongside Secure Logiq's specialist server technology, partners on the booth will include 360 Vision Technology, IntelexVision, LenelS2, Milestone Systems, and VCA, all working seamlessly together in a real-world setting. Optimised designs Hughes highlights, "An integral part of every Enterprise CCTV system in the field is the engine that runs the solution." "Our vast knowledge of not just the IT hardware element of the solution, but the entire ecosystem being deployed, allows us to create optimised designs not available from an IT-centric server company. First and foremost, we are video people, and our customers know that and trust us." Holistic understanding Navigating the complex landscape of security technology requires more than just hardware proficiency or customer support; it demands a holistic understanding of the industry's evolving requirements. Hughes adds, "What sets Secure Logiq apart is our dedication to pre-and post-sales support. We're not just selling hardware; we're empowering our clients with designs and solutions tailored to their needs." Big Reveal "TSE has always been a fantastic event for us, always giving us a quantified return on investment. I’m looking forward to our ‘Big Reveal’ - our amazing System Design Manager, Tonino Schafer, has made a remarkable journey of over 2,000 kilometres from Lithuania to Birmingham to ensure this Big Reveal gets to us safely." "I think it’s going to keep us and our stand buzzing all week!” Secure Logiq invites all visitors to join them at stand 5/P75 from 30th April to 2nd May at the NEC Birmingham and witness the future of security innovation firsthand.
Let’s face it, any security product fixed to a substrate in a public space is only as secure as its fixings, and key safes are no exception. The integrity of a key safe isn't solely reliant on its resistance to tampering and vandalism, although that's undeniably crucial; the quality and size of the fixings used to attach it to a wall are equally pivotal. Otherwise, it runs the risk of being easily removed from a wall in a matter of minutes, if not seconds, potentially causing a property break-in, costly key and lock replacements, and undermining end-users confidence not only in a specific product but the entire concept of keys storage at the point of entry, all due to a single underperforming key safe fixing. Size or quality? striking the balance When tested in real-world scenarios, fixings of identical size do not necessarily ensure identical performance Size indeed matters. It is common sense that when under attack, chunky, large structural bolts would hold a key safe in place far more effectively than smaller anchors or more wood screws, which some key safe brands offer as a standard securing method. However, the numerous professionally executed attack tests that Keynetics has conducted underscore that the quantity and quality of fixings are equally important. When tested in real-world scenarios, fixings of identical size do not necessarily ensure identical performance. Fixing tests within the security accreditation process Through years of product development and continuous accreditation, Keynetics has discovered that the choice of fixings can be the final deciding factor in whether a key safe passes or fails during an attack test. Keynetics’ accreditation with LPCB encompasses two critical facets of key safe robustness: attacking the key safe itself and detaching it from a substrate. The latter is significantly dependent on both the fixings used and the product’s design. Trial-and-error approach For Keynetics, this means conducting extensive research into fixings and ongoing testing, which sometimes includes a trial-and-error approach to identify the best-performing fixings for the key safe applications. Furthermore, the company provides different types of fixings sourced from meticulously selected suppliers, based on the type of substrate, such as brick, concrete, or metal. Installing it right While key-safe installation may seem straightforward and takes little time, it must be done correctly Fixings imply installation. While key-safe installation may seem straightforward and takes little time, it must be done correctly to eliminate potential security risks, especially in commercial applications. Keynetics offers a nationwide installation service for all key safes. Alternatively, full training and support materials are provided to clients’ installers to ensure that the process is executed correctly, prevent missteps that could compromise key safes’ security rating and certifications, and reassure end users that keys are stored safely. Robust security solutions When in doubt, always seek information from the key safe supplier to find out more about the most crucial elements and product components. Keynetics is always eager to help and answer any questions regarding key safe products, access management, security accreditations, and commercial applications, underscoring its commitment to ensuring robust security solutions.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution will be deployed by Michigan’s Olivet Community Schools to protect students and faculty against gun-related violence. The school was approved for the State’s dedicated grant funding, enabling Olivet to implement ZeroEyes. Olivet Community School Olivet Community School comprises an elementary school, as well as a middle and high school that is located at the same complex. According to The Gun Violence Research Center, 55% of the incidents analysed in Michigan educational systems were spontaneous attacks and 42% involved former students. To combat the rising threat of violence, the district has been bolstering its safety and security efforts by installing an access control system and brand-new digital cameras, along with the deployment of ZeroEyes. Multi-layered security framework "We've always maintained a multi-layered security framework, from our security camera and access control system to CRG maps for first responders, and adding ZeroEyes significantly strengthens our preparedness," said John Mertz, Superintendent of Olivet Community Schools. "While this technology greatly enhances our security, we hope we never have to use it in a real-world situation." AI gun detection and intelligent situational awareness If a gun is identified, images are instantly shared with the ZOC staffed 24/7/365 by specially trained U.S. veterans ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and the district's school resource officers as quickly as 3 to 5 seconds from detection. Proactive safety measures "We applaud Olivet Community Schools for their proactive approach to safety," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Our AI gun detection technology is a vital layer in fortifying the security of both students and staff."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that Park City School District (PCSD) of Summit County, Utah has deployed its proactive gun detection and intelligent situational awareness solution to mitigate gun-related violence. Park City School District (PCSD) Nestled within the mountains of the year-round resort town, PCSD encompasses four elementary schools, a middle school, a junior high, a high school, and a learning centre. The district educates nearly 5,000 students annually and boasts a graduation rate in the top 1 percent of the nation. Intelligent situational awareness software AI gun detection and intelligent situational awareness software is layered on existing digital security cameras PCSD is highly focused on student safety, collaborating with the Summit County Sheriff's Department and the Park City Police Department to deploy advanced electronic, physical, and procedural security measures. ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras at all eight student-occupied PCSD buildings. ZeroEyes Operations Centre If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local staff and first responders in as fast as 3 to 5 seconds from detection. AI algorithms The platform does not store personal or biometric data or conduct any kind of facial recognition The company's AI algorithms only search for guns, not faces or bodies. Until a gun is identified, the monitoring screens in the ZOC stay blank; the ZeroEyes Operations team does not see a live feed from any cameras. Further, the platform does not store personal or biometric data or conduct any kind of facial recognition. Gun-related violence “We hold a deep commitment to safeguarding our students and staff, and ZeroEyes is a compassionate ally in our mission,” said Michael Tanner, COO of Park City School District. He adds, “By addressing the concerns of gun-related violence while also respecting the need for privacy, this solution allows us to provide a secure yet welcoming campus environment.” Proactive safety measures “Between its collaboration with local law enforcement and the deployment of proactive safety measures throughout its schools, Park City School District has shown that it is on the cutting edge of security,” said Mike Lahiff, CEO, and Co-Founder of ZeroEyes, adding “We are proud to work alongside this dedicated leadership team to protect students and staff against gun-related threats.” Park City School District was introduced to ZeroEyes through the company’s exclusive Utah reselling partner Aegix, a provider of industry-pioneering resources, technology, equipment, and training for first responders.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can programme keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
When it comes to connecting to the community and protecting its schools, Sumter County in central Florida has implemented some pretty impressive, innovative, and thoughtful solutions. The county, located west of the Greater Orlando area, recently set out on a mission to increase security at its 14 schools district-wide by installing SARGENT IN120 Intelligent Wi-Fi locks on classroom doors and other interior openings. Digital access technology All Sumter County schools feature multiple classroom buildings. So, in addition to deploying more digital access technology indoors, the district took the extra safety measure of installing a special security fence around each campus’s group of buildings, complete with a single point-of-entry gate controlled by an IN120. Custom-made from resilient metal stock, this gate access solution provides further assurance that only students and staff are allowed to enter. For contractors, family members, and other visitors, there’s a separate controlled entrance at the main administration building of each school where they can be vetted for clearance to specific areas. A simpler, cost-effective path IN120s exchange permission data and grant access strictly by Wi-Fi and run on six AA alkaline batteries IN120s exchange permission data and grant access strictly by Wi-Fi and run on six AA alkaline batteries, virtually eliminating the need for hard wiring. This makes the solution very straightforward to install, power, and connect. IN120s are also easy to operate. Faculty and other authorised personnel simply present their issued credentials to a door’s IN120 card reader to release the lock. Fence point-of-entry For the fence point-of-entry, a scheduled staff member stationed at the opening activates the IN120 the same way, unlocking the gate to let students in as they arrive for the day. Once they’ve entered and are on their way to their assigned classroom buildings, the gate is closed and locked until the next time a student or staff member needs access. Per life safety/fire codes, of course, free egress is always possible by pushing on the exit device (panic bar) on the inside of the gate door. Cost savings The rationale for choosing SARGENT IN120 Intelligent Wi-Fi locks for the gate doors was to eliminate the expense The rationale for choosing SARGENT IN120 Intelligent Wi-Fi locks for the gate doors was to eliminate the expense of trenching and cabling between the fence entry point and a nearby building, which would have been necessary for the power and communication requirements of a traditional hard-wired system. That option was out of budget. IN120s, on the other hand, offered a significant cost-saving alternative, which allowed for a better use of available funds. The Power of Wi-Fi Fortunately, high-speed internet and Wi-Fi are plentiful at all the district’s school buildings both indoors and out, the result of Sumter County’s initiative to boost and extend service to campus parking lots after recognising that many people in the somewhat rural area didn’t have access to such an important necessity. This allows students to come to the parking area and easily connect to online resources that help complete schoolwork, an essential amenity especially during off-hours and over weekends. Alternative standalone power source Strong Wi-Fi reach, of course, also fills the connectivity requirements of the IN120 locks Strong Wi-Fi reach, of course, also fills the connectivity requirements of the IN120 locks, including those at exterior gate locations. Batteries outdoors, however, are another matter. The extreme heat and wintertime cold that Sumter County experiences can shorten battery life and high humidity tends to cause corrosion. That meant finding an alternative standalone power source for each of the single-point entries. Securitron BPSS-20 solar power supply Thankfully, the ASSA ABLOY team had a bright idea. They proposed bypassing the batteries altogether and installing the external power 91-prefix version of the IN120 driven by a Securitron BPSS-20 solar power supply. With a 12V, 20W panel, and 18Ah battery mounted nearby, they were able to turn the intelligent Wi-Fi gate lock into a complete IN120 solar energy solution for Sumter County. Proof again that their schools provide valuable learning experiences and great opportunities for creative problem-solving.
A well-known fashion label has effectively expanded its presence in various markets by establishing exclusive brand outlets, multi-brand outlets, large format stores, and engaging in e-commerce. With a widespread network comprising more than 200 exclusive brand outlets, 1300 multi-brand outlets, and 60 large format stores, the brand delivers modern clothing with a dedication to delivering top-notch quality at affordable prices. Under the guidance of its dynamic leadership, the brand has emerged as a preferred option for those with a keen sense of fashion, indicating a bright outlook for achieving global recognition in the fashion and lifestyle sector. Client overview The client needed a solution to a very particular issue: the installation of a secure elevator access control system. Wanting limited access to specific floors exclusively for authorised personnel, the client enlisted Matrix's skills to deliver an Elevator Access Control Solution. This solution aimed to guarantee controlled and secure vertical movement within their building, contributing to heightened security measures and improved operational efficiency. Client challenges The client encountered a significant obstacle in controlling access to specific floors through elevator entry, outlined as follows: Elevator Access Control for Restricted Floors To bolster security measures, Matrix was engaged to deploy a reliable elevator access control system The client confronted difficulty in managing its 12-floor facility, which included three floors restricted to its employees. To bolster security measures, Matrix was engaged to deploy a reliable elevator access control system. The implemented solution guaranteed precise authorisation, restricting entry to designated floors and fulfilling the client's requirement for increased security within their premises. Matrix solution Matrix effectively met these requirements by delivering solutions that enhanced the client's security systems. Matrix implemented an elevator access control system to achieve: Matrix installed elevator access control system to accomplish: Elevator Access Control for Exclusive Floors Matrix skillfully tackled the client's challenge involving a 12-floor structure, with three floors designated as restricted areas. Through a customised elevator access control system, Matrix successfully fulfilled the client's objective of providing selective access to VIP individuals for the specified three floors, ensuring improved security and control within the premises. Matrix's Elevator Access Control Solution not only resolved the client's challenges but also significantly enhanced access operations, leading to an overall increase in security throughout the organisation. Efficiency results Matrix not only fulfilled the client's specific needs but also considerably improved the overall efficiency The application of Matrix's Elevator Access Control Solution produced impressive results for the client. The customised system effectively ensured secure and controlled vertical movement within the 12-floor facility, with a particular focus on the three restricted floors. Through the provision of selective access to VIP individuals, Matrix not only fulfilled the client's specific needs but also considerably improved the overall efficiency of security operations. This successful partnership led to the optimisation of the security infrastructure, showcasing Matrix's dedication to providing effective solutions for its clients' distinctive challenges. Products offered COSEC ARC IO800: Input-Output Controller COSEC PATH DCCM: Compact Card-Based Door Controller COSEC CENTRA PLT: Platform-based User Licence COSEC CENTRA ACM: Access Control User Licence
2N, the global market pioneer in internet-enabled intercoms and access control systems, has upgraded a residential project in the UK to improve security and enable residents to take calls on their phones when they are not at home. Sperry and Gilbert House Sperry and Gilbert House are residential units providing both private and social housing flats. The buildings are part of a larger complex though each apartment block is standalone. The two blocks share a main gate and there is access to both buildings from the basement car park. The two are also linked by doors on five floors that need to remain locked for security, although certain groups – cleaners, and maintenance, for example, need full access. Upgrading access control system There was also a need to integrate the access solution with a new CCTV IP system When the decision was taken to upgrade the access control system, it rapidly became clear that the project’s requirements could only be met by the most modern IP solution with the flexibility to enable new features in line with advances in technology. One priority, for example, was to incorporate mobile apps so that residents could take calls when they were not at home. There was also a need to integrate the access solution with a new CCTV IP system to record incidents around the doors (such as broken glass activation and failed PIN code attempts). GDPR-compliant access control On top of that, each block has a single lift and, in the event of a lift failure, it needed to be possible to grant easy access via the other building. Other requirements included GDPR-compliant access control logs and a ‘future proof’ system that could, for instance, enable QR code access for deliveries, tradespeople, and visitors. All features that are currently supported by 2N or are due to be released on imminent firmware releases. Allowing the Systems Integrator iQual to add new features to the existing solution when they become available. 2N® IP Style intercoms 2N® IP Style intercoms were installed at the main doors to Sperry House and Gilbert House and at the main shared gate At the same time, other more traditional elements were also prioritised. The access control devices needed to be highly resistant to vandalism and able to utilise existing cabling to avoid the need for re-cabling and re-decoration. They also needed to enhance the flats and the buildings aesthetically. The residents’ association, based on their research, identified 2N as a possible technology provider, and four different 2N devices ended up being incorporated into the access solution. Three 2N® IP Style intercoms were installed at the main doors to Sperry House and Gilbert House and at the main shared gate for the two buildings. 2N’s flagship intercom, the 2N® IP Style includes a full-HD camera and a 10” touchscreen display. IP Verso security intercom A 2N® IP Verso security intercom, with multiple buttons to match the respective flat numbers, was then installed at the ground floor entrance to flats in Sperry House. Eight 2N® Access Unit 2.0 access readers were also used to manage the entry to/from the post rooms and car parks, and through the internal link doors. Every apartment was then fitted out with a 2N® Indoor View answering unit, with residents receiving video calls on its 7″ touchscreen. My2N app API integration commands programmed key events to enable alert triggers to be sent The requested mobile phone integration was enabled by the My2N app, which allows residents to answer video calls from the intercoms remotely for a full overview of attempted visits to their homes. API integration commands programmed key events to enable alert triggers to be sent from a newly supplied CCTV system with still images in the affected areas. Enhanced video quality Paul Blundell from Systems Integrator iQual, said, “The residents enjoy the new solution. There was a video system in place previously, but it was black and white and was difficult to operate." Paul Blundell adds, "The video quality we have is on a completely different level, easy to support, while enhancing the end-user experience and the fact that they can now access video calls on their mobile phones gives the whole thing a ‘wow’ factor. Most important of all, though, the new system is fully reliable, and the upgrades significantly improve the security of the buildings.”
Round table discussion
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
By all reports we have heard, 2024 is rushing by at a rapid pace. Many of us are just now catching our breaths after the busy holiday season, even though spring is practically here. Having had a healthy taste of 2024 already, our Expert Panel Roundtable is eager to weigh in on what lies ahead for the rest of the year to come. We asked this week’s panel: What large trends are driving growth in the physical security industry in the year ahead?
Products
White papers
The real cost of an outdated Video Security System
DownloadA step-by-step checklist for choosing an intercom system
DownloadUnderstanding key control systems and best practices
DownloadModernizing facilities management
DownloadA more secure alternative to 125 kHz proximity cards
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadCreating a secure and positive healthcare experience
Download11 advantages of a combined system for access control and intrusion
DownloadIntegrated access control: reap the benefits of connected security
DownloadChoosing the right storage technology for video surveillance
DownloadThe inevitability of The Cloud
Download5 reasons to integrate mobile technology into your security solution
Download11 considerations for embedded system RFID readers
Download3 reasons to migrate to a new access control system
DownloadOSDP is the strongest access control for your business
DownloadVideos
Electronic security systems: Manufacturers & Suppliers
- Software House Electronic security systems
- CyberLock Electronic security systems
- ACT Electronic security systems
- Alpro Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- ASSA ABLOY Electronic security systems
- HID Electronic security systems
- Hikvision Electronic security systems
- Morse Watchmans Electronic security systems
- Dahua Technology Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- Sargent Electronic security systems
- AMAG Electronic security systems
- Corbin Russwin Electronic security systems
- Baxall Electronic security systems
- EVVA Electronic security systems