Remote security
In an industry-first, Safetrust provisions employee and visitor badges directly into Apple Wallet via an email link or text message, eliminating the need to download an application. This innovative app-free approach ensures a seamless experience for people requiring access to buildings or enterprise IT systems, whether visitors, contractors, or employees. It enables the deployment of mobile credentials in minutes rather than months. Universally compatible credentials “A major barrier to...
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first d...
Newly launched Pinnacle Systems is making its debut at The Security Event 2024, to showcase its pioneering ‘industry-first’ end-to-end, truly independent integration platform. Remote monitoring and control Sharing stand 5/H20 with intelligent video software specialist, Network Optix, Pinnacle Systems will present opportunities for open integration and its capability as an on-site and remote monitoring and control solution. Visitors to the stand will experience live demonstrations...
Hanwha Vision, the global vision solution provider, has appointed John Lutz Boorman to lead Product and Marketing across Europe from its regional HQ in the UK. John has vast knowledge and expertise in the security industry, with more than 30 years of experience working across business development, sales, product, and marketing for distribution and manufacturing companies. John's new responsibilities John Lutz Boorman has deep technical knowledge of security and industry best practices,...
Verkada, a pioneer in cloud-based physical security solutions announced that Eric Salava has joined the company as its Chief Revenue Officer. Salava will lead Verkada's global go-to-market and revenue generation strategy as the company continues to scale rapidly. "Our growth to date has been incredible: our platform supports more than 1 million active devices for 22,000 customers across 70 countries," said Filip Kaliszan, CEO and Co-Founder of Verkada, adding "With Eric at the helm of our go-to...
Pyronix proudly announces the update of its renowned EURO 46, introducing the EURO 76 product line, marking an important progression in the company’s commitment to delivering customer-focused solutions that reliably address ever-evolving security needs. EURO 76 Laurence Kenny, Marketing Director, said, “The EURO 76 retains all the innovative features that made its predecessor a standout in the security industry." He adds, "With its hybrid capabilities, the EURO 76 seam...
News
PACOM, a pioneering provider of access control and integrated security management solutions, will preview VIGIL CORE, its next-generation cutting-edge cloud-based platform at The Security Event 2024. This solution is a centrally controlled integrated security management platform that is intelligent, user-friendly and highly cost-effective and will prove to be a great fit for customers with single sites, hundreds of sites or large campus environments. Security integration management The culmination of a significant program of research and development, the solution has been designed to redefine what’s possible in seamless security integration management, without any legacy restrictions, utilising existing in-house and third-party products on the cloud. It also extends its functionality beyond security by acting as an interface with the Internet of Things (IoT). By accessing, storing and processing data from the smart IoT sensors found in intrusion detection, access control, audio, video and building management systems, it is able to deliver valuable business intelligence, operational insights and efficiencies. VAR community VIGIL CORE Simplicity of the platform stops the need for complex server infrastructure and specialised skills For the VAR community VIGIL CORE provides cost-effective SaaS deployment, enabling them to elevate their businesses by creating long-standing relationships with their customers and protecting their recurring monthly revenues. The simplicity of the platform eliminates the need for complex server infrastructure and specialised skills to configure on-prem servers, pioneering to cost savings in installation time and staff training. By offering more than just security, it provides complete control over the entire building services ecosystem and can scale up and down as required. It provides existing PACOM users with an opportunity to migrate to the solution quickly and easily via a sustainable upgrade path that can be implemented based on the client’s schedule. This makes it perfect for applications such as banking and finance, as well as other verticals such as logistics and warehousing, commercial, cell towers, critical infrastructure and multi-site retail locations. Impact on the security industry Users can view live and playback video from cloud cameras, bookmark cameras for quick access The cloud is having a huge impact on the security industry, with end users now able to harness the power, flexibility and functionality it facilitates. This solution is fully cloud-enabled and a fully customisable dashboard can be accessed via any internet-connected desktop PC or smartphone. Users can view live and playback video from cloud cameras, bookmark cameras for quick and easy access from the main dashboard, check camera health status, set profiles and permissions, assign credentials, set rules, export footage clips, and arm or disarm devices – anytime, anyplace, anywhere. It can also be set up as a purely on-premise solution or even in a hybrid configuration that offers the best of both worlds. Variety of building services “We’re tremendously excited about VIGIL CORE and its ability to integrate a variety of building services over one integrated security management platform,” said Richard Joslin, Senior Director, Global Sales. “PACOM is working to lead the way in the design, manufacture and installation of cutting-edge security systems and we are looking forward to welcoming visitors to our stand so we can explain more about how we are able to transform the operational effectiveness of a diverse range of built environments.”
Hik-Connect 6, the powerful cloud-based security software, continues to get better. The latest enhancements extend the reach of ‘Team Mode’ – which already provides security management across multiple physical locations – to buses, taxis, trucks, and other vehicles. Other improvements include the addition of Motion Detection 2.0, which brings deep learning intelligence to the system, better alarm video backup, and more. Some key enhancements Here’s a brief overview of some key enhancements: Motion Detection 2.0 delivers intelligent person and vehicle search: In response to requests from the user community, Hik-Connect Team Mode now connects directly with Hikvision cameras equipped with Motion Detection 2.0 to enable this feature. It combines the widely applied motion detection function with deep-learning algorithms that differentiate people and vehicles from other moving objects. With Team Mode, they can rapidly search through multi-channel recordings to locate the events that matter. This functionality is also available to users of Q/K Series NVRs (with firmware version 4.74.000 or later) with stream encryption activated. Integration with Hikvision’s mobile onboard security system: By connecting to Hikvision’s mobile onboard security system, Hik-Connect Team Mode can now be used to provide remote security management of buses, taxis, trucks, and other types of vehicles. The interior of vehicles, as well as their surroundings and precise location, can now be remotely monitored in real time. They can view vehicle status updates, manage driver permissions, link vehicles to drivers, create driver groups, and more. They can also generate and export reports from Hik-Connect 6 for further analysis and decision-making. Simplified self-service licence activation: With this update, activating licences in Hik-Connect Team Mode is now a more straightforward, self-managed process, eliminating the need for installer assistance and delivering a much better user experience. Cloud-based backup and sharing of alarm videos: They can now access and share the alarm event videos effortlessly via a web portal, using URLs. Recipients can view these videos without needing to log into a Hik-Connect account. And the best part? This service is now provided free of charge. Find out more These are just some of the new, exciting, feature updates to Hik-Connect 6. Other improvements include enhanced alarm detection, more sophisticated ways to monitor and manage time and attendance, and better access control.
Digital Watchdog® (DW), the industry pioneer in digital recorders, surveillance cameras, system peripherals, and related management software, announces the appointment of Patrick Kelly to the position of Senior Director of Strategy. He formerly held the position of Director of IP Product Sales for the company. In his new position, Kelly will take an active role in designing and executing the company's marketing and sales strategies in the United States and Canada. Positioning and growth "Patrick has been instrumental in our positioning and growth throughout many areas of the business for over a decade," said Wade Thomas, President and COO of DW. He adds, "All of us on the DW Team congratulate Patrick in his new role and look forward to continued growth together." Patrick Kelly Before Digital Watchdog, he worked with end users, distributors, regional systems integrators Patrick Kelly has a long history of success with implementing video systems solutions in a variety of applications, from large school districts to complex installations at regional airports and seaports. Before Digital Watchdog, he worked with end users, distributors, regional systems integrators, national and global resellers, integration partners, A&Es, and consultants as a manufacturer's representative. Kelly holds a degree in Business Management from Florida Atlantic University. AI technology "I am honoured for the opportunity to help shape the future at DW," said Patrick Kelly, adding "Our industry is in a state of transition with the wide-scale adoption of AI technology and the opportunities it presents while leveraging the potential of the cloud." He continues, "I'm eager to continue working with the team to provide the best possible experience to our customers."
Delinea, a provider of solutions that seamlessly extend Privileged Access Management (PAM) announced the introduction of Privilege Control for Servers on the Delinea Platform, enforcing least privilege principles on critical systems consistently across identities to combat stolen credentials and restrict lateral movement. Delinea Platform The Delinea Platform combines enterprise vaulting, VPN-less privileged remote access, and privilege controls to enforce just-in-time and just enough privileges to provide a more secure, resilient, scalable SaaS solution that expands with an organisation’s needs. Delinea is changing how organisations enforce privilege as the new perimeter of security to reduce risk, more easily meet compliance, and improve productivity on a single unified cloud-native platform. Need for a multi-layered security approach The average ransomware payout escalated dramatically from $812,380 in 2022 to $1,542,333 in 2023 According to Verizon’s 2023 research, stolen credentials were involved in nearly half (49%) of the breaches in 2023. A report from Sophos indicates that the average ransomware payout escalated dramatically from $812,380 in 2022 to $1,542,333 in 2023, highlighting the increasing financial stakes for victims. Organisations need a multi-layered security approach to limit privileges so that if credentials or identities are compromised, they can limit the impact of ransomware and other threats. Prevent lateral movement to contain cyber incidents As part of the Delinea Platform, which provides seamless and easy-to-deploy PAM, Privilege Control for Servers centrally elevates privileges on Active Directory identities as needed to limit standing privileges, enforcing least privilege best practices. Customers can limit shared credential sprawl & manage privileged access to Windows, Linux, and Unix servers in hybrid cloud environments, which are enforced on the machine, limiting lateral movement. Customers can enforce Multi-Factor Authentication (MFA) at vault log-in, credential access, server log-in, and privilege elevation using MFA at depth, providing identity assurance to mitigate the risk of compromised credentials or identities and meet increasing regulatory and cyber insurance requirements. VPN-less and agentless privileged remote access For remote workers and vendors, VPN-less and agentless privileged remote access provides a secure means of accessing critical resources and data, whether using a vaulted credential or an Active Directory identity, without ever seeing or entering a credential. Privileged activities are consistently authorised based on policies, and remote sessions are recorded and audited. AI-driven auditing As a shared capability, session, and audit data is unified and saved in the Delinea Platform, simplifying storage In Privilege Control for Servers, session recording and auditing occur on the host, so data cannot be altered. As a shared capability, session, and audit data is unified and saved in the Delinea Platform, simplifying storage and access while taking advantage of Delinea’s innovative AI-driven auditing (in public preview) to dramatically reduce the time to identify potentially dangerous activities without manually reviewing hours of session recordings. Privilege is the new perimeter of security “Threats like ransomware continue to evolve, and organisations need to reduce the risk of stolen credentials and lateral movement drastically. As identities and environments become more complex, privilege is the new perimeter of security,” said Phil Calvin, Chief Product Officer at Delinea. “The introduction of Privilege Control for Servers adds even more robust authorisation to the Delinea Platform, the first cloud-native unified PAM platform that is more secure, resilient, and scalable than other solutions.” First unified cloud-native PAM platform Privilege is the new perimeter of security for modern enterprises. Privilege Control for Servers provides deeper and more robust privilege protection as part of the Delinea Platform. Customers can layer security defences on privileged activities with Secret Server for shared credentials, privileged remote access, and privilege controls to more effectively prevent credential theft and the ability to access critical data and infrastructure. 99.99% uptime and zero-time upgrades Delinea Platform is more resilient, with multiple redundancy levels that automatically ensure the availability Built using modern cloud architecture, the Delinea Platform is more resilient, with multiple redundancy levels that automatically ensure the availability of all capabilities with contracted 99.99% uptime and zero-time upgrades to ensure privileged access is always available. Shared capabilities like continuous discovery, policies, MFA at depth, auditing, session recording, integrations, and AI-driven analytics simplify administration. Delinea can quickly and constantly provide its customers with updates, enhancements, and innovations to address their needs and respond to evolving threats safely and reliably using modern DevOps practices. Privilege Control for Servers Privilege Control for Servers sets the direction for enforcing just-in-time and just enough privileges through the Delinea Platform. As solutions are added to the platform, they will adopt this naming convention (Privilege Control for [Use Case]) to help customers easily identify the solutions required to meet their unique Privileged Access Management and identity security requirements.
The Security Industry Association (SIA) is pleased to announce that dormakaba and Salto Systems will each receive a 2024 SIA Member of the Year Award. SIA will present the honourees with their awards at The Advance, SIA’s annual membership meeting, which will be held on April 9 during ISC West. SIA Member of the Year Award The SIA Member of the Year Award honours SIA member companies that have shown notable involvement in SIA committees and working groups, SIA events, and the SIA Education@ISC conference programme; leadership activity; recruitment of SIA members; and contributions to SIA thought leadership and the industry overall. For the fourth consecutive year, SIA will present the award to two companies highlighting the diversity of the association’s membership and showcasing companies of different scales that exhibit outstanding engagement in SIA and the security industry. SIA’s programmes and initiatives involvement “SIA is thrilled to recognise dormakaba and SALTO Systems as the 2024 SIA Members of the Year and applauds these accomplished companies for their outstanding involvement in SIA’s programmes and initiatives and inspiring dedication to furthering the association’s mission,” said the SIA Board of Directors Chair James Rothstein. “dormakaba and SALTO’s exceptional engagement in SIA’s events, learning and development offerings, advocacy efforts, and industry leadership has been vital in SIA’s efforts to shape the future of the security industry.” SIA programmes and events Members of the dormakaba team have been regular attendees of SIA conferences and networking events dormakaba, a global provider in the access solutions market, has been a corporate member of SIA since 2000. The company and its employees actively participate in a variety of SIA programmes, events, courses, offerings, and services. dormakaba is a strong supporter of SIA’s advocacy initiatives, has been a participant and award winner in SIA’s New Products and Solutions Awards, and has generously sponsored SIA programmes and events. Members of the dormakaba team have been regular attendees of SIA conferences and networking events, and the company’s executives have spoken at SIA conferences and events including ISC West and AcceleRISE. Driving culture and performance “Our dormakaba team is incredibly honoured to be selected as one of the Security Industry Association’s 2024 Members of the Year,” said Ben Brydges, executive vice president of Dormakaba North America. “We share SIA’s commitment to advancing the industry in several different areas from technology to standards to people development. We also appreciate the many engagement opportunities SIA offers to members, which help us drive the culture and performance we desire.” SALTO Systems SALTO Systems works to redefine the access control world with its next-generation electronic locking solutions SALTO Systems which works to redefine the access control world with its next-generation electronic locking solutions joined SIA in 2008. The company is an enthusiastic SIA member involved in a variety of SIA events, programmes, and initiatives. SALTO is an active participant in SIA events and education offerings, with team members regularly attending events like the SIAThere! networking series, The Advance, Securing New Ground, RISE events, and the SIA Market pioneerers Reception and participating in the SIAcademy LIVE! and Security Cornerstones series. TIME programme The company has generously sponsored AcceleRISE for the past five years and provided sponsorship support to the SIA RISE Scholarship programme, the RISE happy hour at ISC West, and SIA student memberships. SALTO has also participated in the Talent Inclusion Mentorship Education (TIME) programme both on the mentor and mentee side and is represented by the SIA Human Resources Working Group. Awareness and community “On behalf of SALTO, I would like to thank the Security Industry Association for recognising us as an SIA Member of the Year. SIA plays such an important role, not just in bringing awareness to our industry, but in building a community for the people that make up this industry,” said Colin DePree, sales strategy, SALTO Systems North America. “I would also like to say thank you to our SALTO team for recognising the value of the SIA community and jumping in to share, participate, and grow. I look forward to continuing our partnership with SIA!” The Advance 2024 The Advance 2024 will take place on Tuesday, April 9, at 10:30 a.m. in The Venetian Expo during ISC West. At this special membership meeting, attendees will review official association business, meet the new SIA board members and participate in SIA elections, recognise volunteer achievements from 2023, exchange market intelligence for the year ahead, and enjoy a dynamic keynote presentation from Rita Mounir, co-founder and CEO of Allthenticate and vice chair of SIA’s Member Engagement and Experience Committee. In addition to presenting the SIA Member of the Year Award, SIA will honour the 2024 recipients of the Chair’s Award, Sandy Jones Volunteer of the Year Award, and Committee Chair of the Year Award.
G4S has launched a campaign to encourage employees to take advantage of apprenticeship training opportunities. Professional Security Operative The company believes that the new ‘Professional Security Operative’ apprenticeship provides an exciting opportunity for employees to enhance their skills. It is raising awareness of this apprenticeship, and of the huge range of other apprenticeships available, to help employees further their careers. Apprenticeship opportunities Apprenticeships are an important part of G4S’s investment in its employees and a key element Apprenticeships are an important part of G4S’s investment in its employees and a key element of its people strategy. The company offers apprenticeship opportunities to all employees, whether they are new to the company or have long service, regardless of their skillset and qualifications. Apprenticeship training Tony Summers, Head of Learning, Capability, and People Development at G4S comments, “We see the Professional Security Operative apprenticeship as a fantastic opportunity, not just for recruits to G4S, but also for existing employees in the first twelve months of their career." He adds, "G4S employees have benefited from apprenticeship training for many years, but until last year there was no specific security apprenticeship for those in the early stages of their career." Nationally recognised qualification Tony Summers continues, "The new apprenticeship provides a positive first step in employees’ training and career progression with G4S." He further said, "It provides the opportunity to obtain a nationally recognised qualification and can be followed by many other training opportunities, including the G4S Enhanced Security Officer level three course, which provides a blend of high-level skills, including conflict resolution and incident scene management." Employee communication campaign Tony Summers stated, "We have launched an employee communication campaign to raise awareness that there are apprenticeships to support a wide range of career aspirations and that work is done as part of the normal working week." He concludes, "Apprenticeships, including the Professional Security Operative, can have a positive effect on the skills and careers of a large number of front-line staff. We want to support our employees to become the G4S supervisors, managers, and pioneers of the future and we hope that many employees will take advantage of this opportunity."
Expert commentary
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
San Luis Obispo (SLO), the gem of California's central coast, is renowned for its picturesque vineyards, historic architecture, and vibrant community life. Quiet but lively, it is also home to the California Polytechnic State University, located halfway between San Francisco and Los Angeles. Ensuring safety and security Because of its distance from major metropolitan areas, SLO has retained its rural, small-town character, along with a bustling downtown and beautifully preserved Spanish Mission. The San Luis Obispo Police Department (SLOPD) is focused on ensuring safety and security across expansive terrains, reducing crime, and enhancing the quality of life while upholding the principles of service and integrity. The challenge The secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins For San Luis Obispo, two priorities were crime prevention and the protection of sprawling outdoor spaces popular for hiking and biking. Hidden from public view, the secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins. However, its remote nature made installing a traditional security system nearly impossible. The initial cost to secure three city parking structures was also cost-prohibitive, with quotes of over $1 million for network connectivity alone. Need for a robust and reliable solution "We've dealt with products that were essentially consumer-grade equipment repackaged as professional security solutions,” said Chad Pfarr, Administrative Lieutenant. "We needed a more robust and reliable solution. Creating our own was time-consuming and beyond our expertise, highlighting the need for a specialised, cost-effective solution.” Why Verkada A system that could operate in remote locations, areas typically beyond the reach of standard CCTV “We were drawn to the hardware and software quality. But what truly set Verkada apart was the willingness to innovate in ways that traditional security solutions did not. We can now bring Verkada devices into the wild, in the middle of nowhere, without traditional city network infrastructure." A system that could operate in remote locations, areas typically beyond the reach of standard CCTV technology was a leap forward for community safety. Use cases include: Protecting remote locations with the GC31 Cellular Gateway. Licence Plate Recognition (LPR) monitoring to streamline vehicle investigations. Protecting evidence in cold storage with Air Quality Sensors. Improving check-in and registrant compliance with Workplace solutions. "Verkada's willingness to venture into uncharted territory with us to ensure security systems could be deployed where they were most needed, regardless of existing connectivity, was what got us so excited. Beyond just adapting to what’s available, it’s continuously improving to meet our needs." Protecting remote locations with the cellular gateway In San Luis Obispo, the GC31 Cellular Gateway bridges the gap between the need for remote security and limited infrastructure. The police department protects areas previously deemed inaccessible without the high costs of traditional network installations, leading to savings of over $1 million for connectivity alone. Bridging the connectivity gap "Before Verkada, the idea of installing a security system in remote locations was a logistical nightmare. The cost of establishing connectivity alone was prohibitive, not to mention the technical hurdles of operating without power or a network." "But with the Cellular Gateway, we've been able to overcome these barriers, bringing security and peace of mind to once vulnerable areas." Licence Plate Recognition (LPR) capabilities SLOPD can install Verkada products in locations that are hard to wire or lack connectivity SLOPD can install Verkada products in locations that are hard to wire or lack connectivity, such as parking lots, construction sites, trailheads, and natural terrain. Within the city, the GC31 also protects busy intersections by supporting cameras with Licence Plate Recognition (LPR) capabilities. Streamline vehicle investigations Paired with the cellular gateway, CB62 outdoor bullet cameras are deployed on streetlight poles to monitor moving traffic, covering up to three lanes with a single camera. Using Verkada’s edge-based processing and computer vision technology, the LPR solution captures licence plates at speeds of up to 80 mph (128 kph). Flexibility and versatility The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics to each location. This includes monitoring busy intersections, remote trailheads, or railroad crossings. This flexibility is crucial in a community that values its open spaces and balances accessibility with safety. "We've not only deterred potential criminal activities but also enhanced the overall safety for residents and visitors alike. The ability to monitor these areas remotely has been a game-changer, allowing us to extend our reach without stretching our resources too thin." Protecting evidence in cold storage with air quality sensors The introduction of Verkada's air quality sensors into the SLPD’s evidence management protocol has marked a significant improvement in securing critical evidence that requires refrigeration. “Sensors protect the evidence entrusted to us." "They monitor the conditions within our cold storage facilities in real-time, ensuring that any deviation from the norm is immediately flagged. This allows us to act swiftly to address any issues before they impact the evidence.” Sensors mitigate the risk of loss and help maintain the overall integrity of the evidence, which is crucial for the judicial process. Ensuring that evidence is stored under optimal conditions preserves its validity and reliability, which can be decisive in court cases. Guest and Workplace Solutions Verkada Guest supports security and compliance as well as administrative processes At the police department, Verkada Guest supports security and compliance as well as administrative processes and community interactions. "We're not just looking at improving how we manage security systems; we're also opening up opportunities to better serve our community in every interaction they have with us. This is about making our department more accessible, efficient, and responsive to the needs of San Luis Obispo.” Automated notification "Registrants can sign in digitally, similar to the check-in process at a doctor's office. This system automatically notifies the assigned detective, who can then prepare before meeting the registrant." "It's a welcome shift from our current, more manual process, and we're excited about the potential to make our operations more efficient while improving the experience for everyone involved.” Digitisation of visitor check-in The registration of certain types of visitors is a legal requirement that, until now, has placed a burden The registration of certain types of visitors is a legal requirement that, until now, has placed a burden on the department's space and resources. By digitising the initial check-in and form completion process, the department can handle sensitive registrations with greater discretion and efficiency. "We can integrate specific forms and requirements into the Guest system." Minimising congestion "This customisation ensures that we can maintain legal compliance while respecting the needs of our community and the constraints we operate under." "Guest reduces wait times, frees up essential space in the lobby, and minimises the congestion that can occur during peak registration periods.” Solar and Battery SLOPD is also exploring alternate power options to enable more deployments across San Luis Obispo, further ensuring the safety and security of their community. "Our partnership with Verkada has already improved our operations. The next step involves incorporating solar and battery backup systems for our cameras and bridge devices. This will not only expand our public safety reach but also ensure that our security measures are sustainable and resilient against power outages."
Pears Jewish Campus is a seven-story education and culture complex that covers over 80,000 square feet, in Westfälische Strasse, Berlin, Germany. The building was designed by renowned architectural firm Tchoban Voss and constructed over a five-year period. It is the largest Jewish campus in Europe, encompassing a kindergarten, primary, and secondary school, a cinema, sports and events halls, art and music studios, co-working office spaces, as well as a kosher restaurant. Paxton’s latest system Paxton10 has been installed to secure the building with sophisticated access control, remote-site management, and flexible access permissions. Requirements Security is of the utmost importance for the safety and protection of young students, teachers and professionals working within the campus, given the anti-Semitic incidents. This prompted the development of a comprehensive security concept with enhanced capabilities, including the need for full-lockdown functionality and checkpoints with weapon detection. Due to the increased level of security needed, Peter Gräf, Managing Director of GRAEF Systemtechnik GmbH, was contracted to oversee the installation and technical aspects of the new security system. Systemtechnik is a group of companies with an arm that specialises in securing high-footfall public sector buildings. Systemtechnik is a level of firms with an arm that specialises in tying high-footfall public sector buildings Peter established that this was a project far beyond the normal requirements. He explains: “Every security measure on the campus had to be designed to recognise and ward off potential threats at an early stage and create a safe yet welcoming environment. The system also needs the ability to convert into manual operation and shut down all electronic keypads from sunset on Fridays to sunset on Saturdays for Shabbat, the Jewish day of rest.” For ease of use, the campus managers need web-based remote site management software and a straightforward way to connect across multiple buildings in various locations. Peter continues: “It is a large site and running cables across it would be a challenge. Having a system that links wirelessly is the simplest and most cost-effective solution. Additionally, there are many people requiring varying levels of access permissions throughout the week. Therefore, it is especially important to be able to implement simple measures to allow access to certain areas at certain times by using electronic tokens that can be issued remotely.” All these requirements coincide with the fact that the system needs long-term scalability, and the design of the hardware used had to meet the expectations of award-winning German architect and artist Sergei Tchoban, who designed the building. Solution To achieve the enhanced security needs of the campus, Peter recommended Paxton10, access control and video management on one simple platform. This was due to multi-site functionality and flexible software configuration, and no requirement for a VPN. It works utilising cloud technology and a Paxton10 server. He explains: “Paxton 10 is easy to specify and install. The modern software is extremely customisable with easily programmable rules and can manage multiple sites remotely with the web software or the Paxton Connect app. Also, the mix of storing data on premises and in the cloud made it ideal for this high-security project.” Peter recommended Paxton10, access control and video management on one simple platform Paxton10 has been installed on 20 main doors across the campus and on turnstiles that form weapon-detecting checkpoints. The system has also been integrated with anti-terror software that locks down the site, meaning no one can enter or leave once initiated. The current setup leaves the building managers with plenty of room to scale the system up, as Paxton10 can manage 1,000 doors, and 50,000 users from a single Paxton10 server. PaxLock wireless door handles have been installed on office doors and employee wellbeing areas. Authorised users can gain access with traditional fobs or more modern smart credentials which are sent through the Paxton10 software to an end-user's smart device, and work within the free Paxton Key app. Peter continues: “Smart credentials are ideal for the vast number of students on campus. They like using their smartphones, and it means they are not losing tokens that are expensive to replace. However, having the choice to still gain access with traditional fobs has been useful as there are a substantial number of people with varying technological preferences.” Results The installation has met the advanced security requirements mapped out in the original concept, and the system can turn into manual operation at the touch of a button for ease of use when Shabbat is being recognised. Overall, the building managers are pleased with the system’s functionality and have been working with Paxton’s Support team configuring Paxton10 to suit the bespoke needs of the campus. Furthermore, the hardware installed has met architectural expectations and compliments the building's heterogenous design, particularly on the main entrances where Paxton's vandal-resistant panels and readers have been installed. Peter concludes: “The system has been configured so the campus managers can make changes at the touch of a button, and the Paxton10 hardware is excellent quality and extremely aesthetically pleasing. I believe Paxton10 is the future of access control.”
RecFaces, an international facial recognition software developer played an indispensable role in promoting and maintaining safety during the Brazilian Carnival 2024. The company's one of the best and highly accurate products, Id-Guard, was applied to secure an open-air carnival and turned out to be a great solution to the security challenges faced. Facial recognition software The cameras equipped with facial recognition software were placed at mobile control checkpoints, which enabled people to move around and take part in live processions happening at the venue. Because of its fast identification ability, smart surveillance, and immediate notification of unwarranted persons present in the audience, facial recognition technology proved to be a good alternative for securing big events and carnivals. Accurate threat detection alerts FRS minimises human error and removes proximity challenges of mobile authentication FRS minimises human error and removes proximity challenges of mobile authentication. In the present-day security landscape, FRS becomes prominent as it contributes to the overall security of big public places, by producing quick but accurate threat detection alerts. Id-Guard's performance Maria Kazhuro, Business Development Director of RecFaces in the LATAM region, expressed pride in Id-Guard's performance, stating, "We are proud to say that our solution has once again performed exceptionally well in supporting security services during a mass outdoor event even under complex conditions of low light, high traffic, masked visitors and crowd." Maria Kazhuro adds, "Confidence in the quality of our facial recognition solutions allows us to look forward to the future with optimism and meet the demands of the most discerning customers. As expected, Id-Guard was vastly praised for being the best solution that elevated the security of the event." Public safety RecFaces will remain in the lead of technological innovation, and thus, it will support and ensure the enhancement of public safety and the well-being of citizens. While Brazilian Carnival 2024 progressed, RecFaces gained a reputation as an indispensable partner ensuring visitors’ safety with its novel facial recognition technology.
Renowned as a significant entity in the power industry, the Indian Power Giant stands as a key player in India's public sector power utility domain. Under the auspices of the Ministry of Power, Government of India, it specialises in hydroelectric power generation and associated endeavours. With a steadfast commitment to providing clean, sustainable, and cost-effective energy, the Power Giant has successfully executed numerous large-scale hydroelectric projects, making substantial contributions to India's energy landscape. Business challenge The Indian Power Giant encountered a formidable obstacle with its existing video surveillance infrastructure, comprising 128 IP cameras and NVRs of disparate makes and models dispersed across its facility. Lack of video management software capable of seamlessly merging with third-party IP cameras This diversity in camera types presented a significant hurdle to centralised surveillance efforts, resulting in delayed detection of security incidents, prolonged response times, and an overall compromised security stance. Moreover, the lack of video management software capable of seamlessly integrating with various third-party IP cameras and NVRs compounded the issue. Key challenges Absence of a centralised video management solution for over 100 IP cameras and NVRs deployed at multiple locations within the facility. Difficulty in finding a Video Management Software (VMS) compatible with diverse third-party IP cameras and NVRs. Varied user interfaces of IP cameras and NVRs from different brands causing user confusion. Inability to integrate the Automatic Number Plate Recognition (ANPR) system with the existing VMS, missing out on enhanced access control and vehicle tracking opportunities. The Power Giant faced issues related to manual monitoring and tracking of vehicles entering or leaving their premises. Solution Remote surveillance became feasible from any location, ensuring continuous monitoring of the facility The deployment of Matrix SATATYA SAMAS-Video Management Software emerged as the solution to the Indian Power Giant’s challenges. SATATYA SAMAS seamlessly integrated all 128 third-party IP cameras and NVRs across the facility, facilitating smooth centralised video surveillance operations. The Admin Client simplified the addition of cameras and NVRs, while the Smart Client enabled effortless playback and monitoring. With the Mobile Client, remote surveillance became feasible from any location, ensuring continuous monitoring of the facility. SATATYA SAMAS effectively addressed the hurdles, providing a user-friendly video management system that significantly enhanced overall security system efficacy. Furthermore, Matrix introduced an Automatic Number Plate Recognition (ANPR) solution at 12 entry points within the power plant premises. This strategic implementation mandated vehicle authentication at the entry gates, allowing access only upon successful authentication. The ANPR solution captured licence plate data, converted it into digital format, and securely stored it in the database, bolstering security measures and establishing a robust record-keeping system for enhanced monitoring and vehicular access control. All in all, Matrix enhanced security for the Indian Power Giant. Products offered Matrix Licence Dongle 200: USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100: Licence for Adding 100 Additional Cameras SATATYA SAMAS CAM20: Licence for Adding 20 Additional Cameras SATATYA SAMAS CAM05: Licence for Adding 5 Additional Cameras SATATYA SAMAS USER03: 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR10: Automatic Number Plate Recognition (ANPR) Licence for 10 Cameras SATATYA SAMAS ANPR01: Automatic Number Plate Recognition Licence for 1 Camera Benefits Interoperability: SATATYA SAMAS facilitated seamless integration with all third-party IP cameras and NVRs, regardless of their models or brands, ensuring a unified and interoperable video management system. Efficient Monitoring: The centralised video surveillance system enabled comprehensive monitoring from a single interface. Effortless Management and Playback: The user-friendly Admin Client simplified camera and NVR management, while the Smart Client facilitated easy playback and monitoring for prompt security responses. Remote Monitoring: The Mobile Client enabled on-the-go surveillance from any location, coupled with instant notifications and alerts for swift response. Enhanced Access Control: Matrix's ANPR solution enhanced access control by authenticating vehicles. Improved Vehicle Tracking: The ANPR solution facilitated accurate vehicle tracking and security through licence plate capture and storage.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced a positive detection of an illegally brandished firearm in Hobbs, New Mexico that has resulted in criminal charges. At 6:35 p.m. MDT on November 30, 2023, ZeroEyes alerted the Hobbs Police Department and Eagle I.C. dispatch centre of an illegal gun detection captured on a security camera in the parking lot of Del Norte Pool. The ZeroEyes Operations Centre (ZOC) provided intelligent situational awareness about the threat, which involved individuals shooting sporting clays dangerously close to North Grimes Street. The responding officers detained the suspects and filed criminal charges against one of them. Rapid human verification ZeroEyes' AI gun detection and intelligent situational awareness software layers over living security cameras “My team and I were highly impressed with ZeroEyes’ AI detection and rapid human verification, which helped us stop this dangerous activity before anybody was hurt,” said Hobbs police chief August Fons. “In the past, something like this would have been missed entirely. We absolutely cannot have our citizens illegally firing guns in a public area, where anybody could walk by and get injured or even killed.” ZeroEyes' AI gun detection and intelligent situational awareness software layers over existing digital security cameras. When a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. Visual description If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to law enforcement in as fast as three to five seconds from detection. “It is always gratifying to learn that our system has successfully prevented a potential shooting,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are thankful that Hobbs PD acted swiftly to stop this illegal behaviour, and look forward to continued success working with the department.”
A multinational corporation, headquartered in Mumbai, ranked among the Fortune 500, is sustained by an exceptional workforce exceeding 187,000 individuals from 100 different nationalities. The corporation is founded on the principles of creating value for stakeholders, with a history of over seven decades of responsible business practices. Need for a modernised solution Their enterprises have evolved into global pioneers in various sectors including metals, pulp and fiber, chemicals, textiles, carbon black, telecom, cement, financial services, fashion retail, and renewable energy. The financial services arm of this conglomerate, to expand its business, needed a well-crafted, modernised Telecom solution, thus bringing them to the forefront of Matrix. Conglomerate's challenges The Financial services arm of this multinational corporation in Mumbai was facing issues ranging from modernisation to optimisation of communication. The challenge of telecommunication without laying Telephone cables for their new office was prominent. An arrangement had also to be made for utilising existing PRI lines and modernising them to meet their demands for new establishment. To elaborate on their challenges: Adoption of modern communication with existing Infrastructure: Their investment in existing infrastructure needed protection, and a provision had to be made to modernise the communication using existing infrastructure. Scalability: They required a Telecom solution that was future-proof, that is, easily scalable to fulfill the needs of future applications. Additionally, it had to be ensured that the operations were flawless, especially during critical work hours. Requirement of modern phone features: They required advanced features like Global Abbreviated Dialing, Auto Redial, Call Pick Up, and Internal Call Restriction, to become efficient in day-to-day operations. Managing different protocols: Interface with existing and different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Stipulated Time-frame: The transition and modernisation, simultaneously, had to be completed within a stipulated time frame. Solution The solution was based on the prelude of utilising existing infrastructure and amalgamation of Matrix solutions Matrix Comsec in partnership with SMB Automation analysed the challenges of communications and crafted a Telecom solution that was the best fit. The solution offered was based on the prelude of utilising existing infrastructure and amalgamation of Matrix Telecom Solutions within a stipulated time frame. VoIP-based communication This included employing Embedded IP-PBX to empower VoIP-based communication, and simultaneously integrating VoIP-PRI Gateway that optimised the feasibility of communication and helped the firm become more efficient by terminating PRI lines. The Telecom solutions include: The Embedded IP-PBX, PRASAR UCS - SPARK200, enabled them up to 2100 IP users. Additionally, features like up to 550 Concurrent calls, Concurrent 21 Calls Tapping, etc. took them to a notch above through a uniquely crafted telecom solution. The VOIP-PRI gateway included SETU VTEP 2P, which comes with features of 125 SIP Trunks and 120 simultaneous calls. The gateway enabled them to terminate 8 Copper PRI lines and thus transition towards IP. The VARTA Extensions enabled them to access Real-time UC features like one-touch access to Extension numbers, Instant messaging, monitoring the Real-time status of employees, etc. The IP phones included SPARSH VP510E and SPARSH VP210. This came with features like an LCD Graphical display, Context-sensitive keys, Built-in 16 DSS Keys, Polyphonic ring tune, and more. Results and benefits The implemented Telecom solutions enabled them to reap the benefits of modern communication while also enabling them to make the best out of the existing infrastructure. Matrix engineered a Telecom solution with our Embedded IP - PBX, PRASAR UCS enabling them to transit towards wire-free and modern communications, addressing the challenge of telephone cabling. The VOIP-PRI gateway, SETU VTEP, provided much-needed Least-cost routing ensuring that the call is always placed on the most appropriate network resulting in the optimisation and feasibility of calls. Access to the gateway was secured through PIN Authentication, while Digest Authentication ensured verification and protection of user credentials during the authentication process. The Real-time UC features were provided in the form of soft IP extensions through the VARTA UC Client. A complete Collaboration solution was made possible through Laptop/Desktop extensions to work remotely. The IP desk phones helped provide advanced features like Call Pick up, Call Forward, Call Waiting, and Call Transfer along with an Intuitive interface, that enabled employees to become efficient while simultaneously, enhancing user experience.
Round table discussion
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
Integrating control access and security
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadIntegrated access control: reap the benefits of connected security
DownloadFour areas to consider in frictionless access control
DownloadSecurity investments retailers should consider for their 2021 budget
DownloadOptimise your business with analytics and AI
DownloadThe healthy market for video surveillance at medical facilities
DownloadVideos
Remote security: Manufacturers & Suppliers
- ADPRO Remote security
- Climax Technology Remote security
- Software House Remote security
- Verkada Remote security
- Video Storage Solutions Remote security
- Bosch Remote security
- AMAG Remote security
- Senstar Remote security
- March Networks Remote security
- Hikvision Remote security
- CLIQ - ASSA ABLOY Remote security
- Vanderbilt Remote security
Multi-residential access management and security
DownloadGuide for HAAS: New choice of SMB security system
DownloadPrecision and intelligence: LiDAR's role in modern security ecosystems
DownloadHikvision: Solar powered product introduction + HCP
DownloadGunshot detection
Download