SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alibaba's Wan2.6 series revolutionises AI video content
    • AI agents revolutionising video surveillance by 2026
    • Matrix Comsec: CII industrial innovation award winner
    • AI & cybersecurity in 2026: i-PRO insights
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Which vertical markets have the greatest growth potential for security?
    • What’s behind (perimeter) door #1?
    • Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft
    • Why open matters in the age of AI
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Marin Hospital enhances security with eCLIQ access control

    Marin Hospital enhances security with eCLIQ access control

    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6

Video surveillance

  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
AI agents revolutionising video surveillance by 2026

AI agents revolutionising video surveillance by 2026

Corporate
Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft

Louvre heist exposes security gaps: How smarter security could have prevented a $100 million theft

Expert commentary
Hikvision SMB security solutions: HikCentral Lite V1.1.2

Hikvision SMB security solutions: HikCentral Lite V1.1.2

Product
AVS: New standard for alarm monitoring centres

AVS: New standard for alarm monitoring centres

Corporate
Deep Sentinel launches Mobile Monitoring Trailer

Deep Sentinel launches Mobile Monitoring Trailer

Product

News

Transforming video data: Videonetics 2025 vision
Transforming video data: Videonetics 2025 vision

Videonetics, the pioneer in True AI-powered video analytics and unified video computing platforms, reaffirmed its commitment to shaping the future of intelligent video technologies at Videonetics Partner Connect 2025, held on December 5 in Mumbai. The gathering brought together partners, system integrators, and customers across the government and enterprise landscape, serving as a strategic platform for deepening collaboration and accelerating the adoption of AI-driven video intelligence across India. Raw video data into meaningful insights As a company built on 17+ years of R&D, 20+ patented technologies, and deployments across more than 150 cities and critical infrastructure sectors worldwide, Videonetics used the forum to outline its continued mission: transforming raw video data into meaningful insights that enhance safety, improve operational efficiency, and empower organisations to make smarter decisions. With its unified video computing platform at the core, Videonetics reiterated its commitment to developing scalable, indigenous, and globally benchmarked solutions engineered for real-world environments. Importance of video data Addressing the audience, Bhardwaj Naik, Senior Vice President & Chief Revenue Officer at Videonetics, said, “Our partners are critical to the transformation we are driving across sectors. As the volume, complexity, and importance of video data continue to grow, Videonetics remains steadfast in its commitment to deliver trusted, scalable, and future-ready AI solutions." "Videonetics Partner Connect 2025 is a reaffirmation of our long-term vision, to combine deep technology innovation with strong partnerships, ensuring that organisations can unlock the full value of video intelligence across every environment.” Videonetics’ focus on strengthening The platform also emphasised Videonetics’ focus on strengthening its partner ecosystem, which is instrumental in delivering the company’s mission at scale. Through dialogues led by the leadership team, attendees explored how Videonetics’ innovations in True AI, video management, analytics, traffic intelligence, and cloud-based video services are addressing growing national and industry needs from urban safety and governance to enterprise security and operational intelligence. AI-powered innovation Naresh B. Wadhwa, Vice-Chairman & Managing Director of Videonetics, said, “Videonetics remains deeply committed to advancing India’s leadership in AI-powered innovation. Our goal is not just to build world-class technology but to create meaningful impact enabling safer cities, smarter enterprises, and more resilient infrastructure." "Videonetics Partner Connect 2025 reflects our belief that collaboration is central to shaping this future. Together with our partners, we are driving a new era of video intelligence built in India for the world.” Advancing breakthrough innovations in AI With its foundational philosophy of “looking deeper to simplify the world,” Videonetics continues to lead India’s evolution toward safer, smarter, and more connected environments. Recognized by OMDIA for seven consecutive years as India’s No. 1 Video Management System provider and among the top 10 in Asia, the company remains focused on advancing breakthrough innovations in AI, strengthening its partner ecosystem, and expanding its impact across global markets.

Genetec's state of physical security report 2026
Genetec's state of physical security report 2026

Genetec Inc., the pioneer in enterprise physical security software, now released its sixth annual State of Physical Security report. Based on insights from over 7,300 physical security pioneers worldwide (including end users, channel partners, systems integrators, and consultants), the report shows that physical security is playing a broader strategic role within organisations. The findings highlight closer collaboration across departments and greater interest in technologies that support better operational awareness and decision-making. Physical security is evolving from protection to empowering business outcomes The report shows a shift in how physical security systems are deployed and valued. They are no longer viewed only as a protection layer, and instead, are becoming an enterprise function that contributes to broader organisational goals. “As it becomes more tightly woven into the broader fabric of the enterprise, security is emerging as a genuine enabler of business outcomes—helping organisations work more cohesively, respond more effectively, and stay focused on long-term goals,” said Christian Morin, Vice President of Product Engineering at Genetec Inc. Modernisation is accelerating as demand for unified systems grows Survey findings indicate that organisations are prioritising modernisation of their physical security systems to support this shift toward stronger collaboration and business decision-making. More than 70% of respondents are using unified or integrated systems, and 60% say their main motivation for replacing legacy technology is to integrate new capabilities. Fifty-one percent cite access to new features as another key driver. These trends reflect a growing interest in cross-functional systems that deliver operational insight and help teams achieve more with their existing investments. Long-term vendor stability is becoming a key selection factor Survey findings show that organisations place strong importance on choosing manufacturers they consider stable and trustworthy. Seventy-three percent of end users say the long-term viability and stability of the vendor is a key factor when evaluating solutions, while product performance and price indicators followed behind, ranked at 45% and 43%, respectively. This points to a clear preference for partners who can provide continuity, support multi-year modernisation efforts, and deliver reliable product development as systems evolve. Interest in AI is rising but teams want practical benefits AI is an area of growing focus. For the first time, AI ranked alongside access control and video surveillance as a top project priority for 2026. Interest in adopting AI has more than doubled among end users since last year’s report. They see value in technology that helps navigate alarms, support investigations, and reduce noise in busy environments. At the same time, 70% express concerns about how AI systems are designed and implemented, specifically around data use and understanding how AI works, reinforcing the need for clear guidance from vendors. Hybrid cloud is preferred, and defines the future of security infrastructure Cloud is playing a stronger role in how security infrastructure is designed and maintained. End users identify automatic updates, ease of deployment, and simpler maintenance as key benefits. Respondents expect continued cloud adoption in 2026, supported by the flexibility to choose which workloads remain on premises and which move to the cloud. 2026 Forecast The report also provides insights into priorities for 2026, including access control modernisation, cybersecurity initiatives, and the growing use of analytics. It also offers regional findings and additional forecasts to help organisations plan their next steps. Survey methodology The report is based on survey responses from 7,368 physical security professionals across six global regions (USA and Canada; Latin America and the Caribbean; Europe; Asia-Pacific; Middle East and Africa; and Australia and New Zealand). Participants included end users, channel partners, consultants, and manufacturers from organisations of all sizes and industries. The survey was conducted between August 18 and September 15, 2025, and only fully completed responses were included in the analysis.

Rugged PTZ cameras by Hanwha Vision: New launch
Rugged PTZ cameras by Hanwha Vision: New launch

Hanwha Vision, a pioneer in video surveillance solutions, has announced the launch of three ruggedised PTZ cameras, purpose-built to deliver seamless monitoring in challenging environments.  Designed to withstand extreme weather conditions, these cameras combine durability with AI-powered intelligence - via Hanwha Vison’s AI-native chipset Wisenet 9 - to provide reliable and intelligent surveillance for critical infrastructure, transportation, ports and urban environments. Engineered to endure The cameras, model TNP-A6550RW, TNP-A7430RW and TNP-A9430RW, are engineered for high performance. With an operating temperature range of -50°C to +60°C, and proven resilience in Category 5 hurricane-level winds (up to 257km/h), they ensure continuous monitoring in snow, heavy rain, high heat, or severe storms. Anti-icing technology, including a window defroster and pan heater, guarantees a clear field of view and full PTZ mobility in freezing conditions. Meanwhile, advanced optical image stabilisation (OIS) and digital image stabilisation (DIS) deliver clarity under high winds or strong vibrations, ensuring video remains steady even in the harshest conditions. Certified with IP68 dust and water resistance, and IK10 impact protection, as well as meeting MIL-STD-810H military standards, the camera delivers mission-critical reliability in any scenario. Whether exposed to saltwater spray at busy ports or enduring dust and sand in industrial zones, these T series cameras stand as a dependable solution. Powerful imaging capabilities Equipped with a powerful 55x optical zoom (2MP) or 43x zoom (4/8MP models) and an IR range of up to 500m, the cameras capture fine details across expansive areas. A wide tilt range and versatile mounting options ensure maximum deployment flexibility for diverse environments. Powered by Hanwha Vision’s Wisenet 9 System on Chip, the cameras achieve significantly improved low-light and Wide Dynamic Range performance, delivering clear and detailed images even in the most challenging lighting conditions. Intelligent AI-powered monitoring The cameras utilise advanced AI features to empower operators. The object classification engine identifies people (with clothing attributes for top and bottom colours), faces, vehicles, and licence plates, dramatically improving forensic search speed and accuracy. Additionally, Dynamic Privacy Masking ensures compliance in sensitive zones, while seamless auto-tracking keeps focus on the target object, even when larger movements or surrounding crowds are present. This combination of AI analytics and automation enhances situational awareness while reducing operator workload. Trustworthy cybersecurity, seamless integrations Robust cybersecurity is built into the cameras, with certifications including FIPS 140-3 Level 3 and ETSI EN 303 645, for proven cyber resilience. WiseStream compression technology reduces bandwidth consumption without compromising image quality, optimising efficiency for large-scale deployments. The camera also integrates seamlessly with leading video management software, including Milestone, Genetec (with Hanwha Vision’s plug-in), Wisenet SSM and Wisenet WAVE, ensuring smooth adoption into existing infrastructures. With its unmatched durability, superior imaging performance, advanced AI capabilities, and robust cybersecurity, this series sets a new benchmark for mission-critical surveillance in the most challenging conditions.

Secure Logiq expands APAC with DAS partnership
Secure Logiq expands APAC with DAS partnership

Secure Logiq has strengthened its Asia-Pacific presence with the appointment of Graham Wheeler as APAC Regional Director and a new Australian distribution agreement with DAS (Dicker Access & Surveillance). Wheeler will lead Secure Logiq’s growth across Australia and New Zealand, working with consultants, system integrators and enterprise end users to deliver high-performance video server and storage platforms optimised for modern surveillance and analytics workloads. The partnership with DAS gives the market direct access to Secure Logiq’s full portfolio through DAS’s national reseller network, backed by local pre- and post-sales support. Efficient video infrastructure “Across ANZ we’re seeing a clear shift toward smarter, more efficient video infrastructure,” said Graham Wheeler, APAC Regional Director at Secure Logiq. “Our focus is to help partners design systems that deliver more throughput and resilience without unnecessary complexity. Partnering with DAS means customers can specify, source and support Secure Logiq locally - with the responsiveness they expect.” To support the expansion, Secure Logiq has extended Australian support hours to 6 am-6 pm AEST, aligning with project and service windows across all time zones. The company will collaborate with DAS on education, training and roadshow activity to accelerate partner enablement. Secure Logiq’s platforms “Appointing Graham gives us dedicated leadership in region, while DAS brings the on-the-ground reach and technical capability to scale,” added Ben Yoxall, Joint Managing Director at Secure Logiq. “Together we’re combining British engineering with Australian market expertise to deliver performance, reliability and value for ANZ projects of any size.” Secure Logiq’s platforms are designed specifically for professional video, offering high I/O performance, efficient storage architecture and tools that simplify design and lifecycle management for large camera counts and analytics-heavy deployments.

View all

Expert commentary

What’s behind (perimeter) door #1?
What’s behind (perimeter) door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measures are in place beyond the perimeter door in case the worst happens and it’s somehow breached? Hopefully, many more levels of access control are in place to prevent, or at least slow down, a perpetrator’s ability to compromise protected assets. Additional interior layers Interior security measures must operate as an integrated, multilayered system that eliminates single points of failure. These inner protections safeguard not only the physical infrastructure but also the operational integrity, confidentiality, and availability of the systems housed within. Beyond simply preventing unauthorised individuals from getting inside, the goal is to create a controlled, monitored, and resilient environment in which every movement, action, and access attempt is verified, logged, and, when necessary, challenged. As modern buildings, data centres, and infrastructure sites host critical functions and potentially sensitive intellectual property, these additional interior layers become essential to protecting both organisations and their proprietary assets. Interior security controls One of the most important interior security controls is granular access segmentation One of the most important interior security controls is granular access segmentation. While a perimeter door may verify an individual’s right to enter the building, the interior should treat every room, cage, and corridor as its own security zone. Role-based access control and strict least-privilege principles should limit personnel to only the areas they absolutely require. For example, a network engineer may need access to routing equipment but not storage racks; a janitorial contractor might be allowed into shared hallways but not any equipment rooms at all. These access restrictions should be enforced using intelligent keys, biometric scanners, mantraps, and, at particularly sensitive locations, two-factor authentication. Segmenting access in this way limits the potential damage from a single compromised badge or insider threat and ensures that a single breach does not cascade into a total facility compromise. Low-light and infrared capabilities Biometric authentication within a building adds a layer of confidence beyond perimeter controls. Technologies such as facial identification help prevent the use of stolen, cloned, or borrowed credentials. These systems complement anti-tailgating measures, such as sally ports or mantraps, which ensure that only one authenticated person passes through at a time. Interior surveillance is another essential measure. High-resolution cameras equipped with low-light and infrared capabilities should cover every hallway, door, rack row, and logistical pathway. Camera feeds must be continuously recorded, and retention policies must align with regulatory requirements. Intelligent video analytics, such as motion pattern recognition and heat mapping, enable the detection of atypical behaviours — such as someone lingering near a cage they are not authorised to access or movement at odd hours. Physical tamper-detection mechanisms Cabinet security provides a vital layer of granularity in the access hierarchy, ensuring that even within secure facilities Integrating surveillance with access control systems creates a strong correlation; when someone successfully passes through a secured door and enters a room, the system can track whether the number of people seen on camera matches the number authenticated, and alert security if a discrepancy occurs. However, it is increasingly important that access control not stop at the room level, because the most sensitive assets are often housed in cabinets, racks, or storage units within already-secured spaces. Cabinet security provides a vital layer of granularity in the access hierarchy, ensuring that even within secure facilities, assets remain protected. Physical tamper-detection mechanisms on racks, cable trays, and server chassis add another dimension: they can detect if a panel is opened, a cable is unplugged, or a device is removed without authorisation. Secure destruction protocols Another internal measure is the use of secure storage and chain-of-custody procedures for any components that contain intellectual property or personally identifiable information. Hard drives, backup media, and even printouts should be stored in locked cabinets accessible only to people with proper clearance. When decommissioning hardware, secure destruction protocols such as shredding or degaussing should be performed in controlled areas and thoroughly logged. Every movement of sensitive equipment should be traceable, from installation through end-of-life disposal. Such processes reduce the risk of data leakage from improperly discarded or undocumented devices. Consequences of improper behaviour Staff should be trained to recognise social engineering attempts, unusual behaviours, and procedural deviations Operational security procedures also contribute significantly to interior protection. Background checks, ongoing employee vetting, and mandatory training ensure that individuals with access to sensitive areas understand their responsibilities and the consequences of improper behaviour. Staff should be trained to recognise social engineering attempts, unusual behaviours, and procedural deviations. Maintaining a strict visitor escort policy prevents non-employees from wandering unobserved. All visitors should wear highly visible identification badges and be monitored continuously by authorised personnel. The building's interior should be treated as a controlled environment at all times, not merely a workspace. Continuous auditing and logging form Continuous auditing and logging form another pillar of interior security. Access logs from intelligent keys, biometrics, video, and environmental systems must be stored securely and evaluated regularly for anomalies. Automated systems can flag irregular patterns, such as repeated attempts to access unauthorised areas or entering rooms at odd hours. Manual audits validate that the access control list remains accurate, that no inactive or former employees retain credentials, and that documentation matches reality on the floor. These logs are indispensable during investigations, compliance assessments, and incident response efforts. Interior security controls Security networks should be isolated from the main IT networks to prevent a cyber incident Finally, redundancy and resiliency must be built into interior security controls. Electrical power for access control, intelligent keys, biometrics, and video systems should be backed by secondary sources, generators, or uninterruptible power supplies. Security networks should be isolated from the main IT networks to prevent a cyber incident from disabling physical protections. The goal is to ensure that interior security remains functional even during outages, disasters, or cyber disruptions. Multilayered approach Together, these additional interior measures create a layered defence that makes a secure building, data centre, or infrastructure site extremely difficult to compromise. Rather than relying on a single barrier at the entrance, the environment becomes an ecosystem of mutually reinforcing controls — physical, operational, digital, and procedural. This multilayered approach allows structures to maintain high levels of protection even as threats evolve, ensuring that the systems inside remain secure, resilient, and trustworthy.

Scalable security storage: From SD cards to hybrid cloud solutions
Scalable security storage: From SD cards to hybrid cloud solutions

Where and how to store security camera footage usually depends on the scale of the video surveillance project, the way you are using to record the video and how long you want to keep the recordings. If there are only few IP cameras, say 2~3 IP cameras for example, and you don’t need to keep the recordings for the month, usually using SD card which is installed in the camera is enough. Video management software A VMS provides a unified platform to manage all cameras and record footage onto centralised local storage servers If there are more than four cameras, even up to 128 cameras, NVR or CVR become the practical choice for managing and storing recordings reliably. However, if there are hundreds or thousands cameras, which need to managed and recorded, in this way video management software with centralised recording storage becomes essential. A VMS provides a unified platform to manage all cameras and record footage onto centralised local storage servers. S3-compatible cloud platforms Critically, if the VMS supports the S3 object storage protocol, users gain the flexibility to store recordings on S3-compatible cloud platforms (public or private), offering significant hardware cost savings and enhanced scalability. For such demanding environments, selecting a VMS built on an open platform architecture is strongly advised, ensuring the system can expand infinitely to meet future project growth. Video surveillance management system Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth Take the video surveillance management system SVMS Pro as an example. Its foundation is an open 1+N stackable architecture, enabling unlimited expansion of recording storage servers. Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth.  This achieves extended recording durations and boosted storage performance while maintaining system stability during sustained operation (assuming environmental requirements are met). Key architectural advantages Each centralised storage module based on a Linux OS, supports up to 200 front-end video channels per server. Its N+1 stackable expansion capability utilises a distributed architecture, forming clusters of storage servers. Scaling the project involves simply adding subordinate storage modules – no modifications to existing deployments are required. Seamless S3 object storage integration Furthermore, SVMS Pro features deep integration of the S3 object storage protocol Furthermore, SVMS Pro features deep integration of the S3 object storage protocol. This allows seamless connection to major public cloud services like Alibaba Cloud OSS, Tencent Cloud COS, and Amazon S3 cloud, as well as private S3-compatible object storage solutions. This integration delivers truly limitless capacity expansion, leveraging the inherent elasticity of the cloud to effortlessly accommodate petabyte-scale video growth. Dual insurance: Multi-layered data protection The critical value of security data comes with inherent risks; losing video footage can lead to immeasurable losses. To mitigate these risks comprehensively, SVMS Pro innovates with its "Local + Cloud" Dual-Backup mechanism, leveraging S3 features to build multiple security layers: Real-Time Dual-Writing: Recordings are first written to the local disk (acting as a cache buffer). Upon local persistence, data is simultaneously replicated to cloud-based S3 storage, guaranteeing instant failover if either node fails. Smart Hot/Cold Tiering: Frequently accessed ("hot") data remains on high-performance local storage, while historical footage is automatically archived to low-cost cloud tiers, optimising storage expenses. Cross-Regional Disaster Recovery: Utilising the multi-replica and cross-region replication features of carrier-grade S3 storage inherently protects against physical disasters like earthquakes or fires. Additionally, the platform ensures comprehensive data protection through integrity verification and encrypted transmission, safeguarding data integrity and confidentiality across its entire lifecycle – from storage and transmission to access. Conclusion In essence, selecting the optimal storage solution for security footage hinges on a fundamental understanding of scalability requirements, retention needs, and data protection imperatives. As surveillance deployments grow from a few cameras to enterprise-scale systems, the underlying architecture must evolve: Localised storage (SD cards/NVRs) suffices for limited scope and short retention. Centralised VMS platforms become essential for unified management at scale, with open, modular architectures providing critical future-proofing for expansion. S3 object storage integration represents a paradigm shift, decoupling storage capacity from physical hardware and enabling truly elastic, cost-efficient scaling – both on-premises and in the cloud. Ultimately, successful large-scale video surveillance storage relies on architecting for flexibility, embedding data protection intrinsically, and strategically leveraging object storage protocols to balance performance, cost, and resilience – principles essential for safeguarding critical security data now and in the future.

SVMS Pro & AI Edge Boxes: A unified intelligent solution for cost-effective, intelligent video management
SVMS Pro & AI Edge Boxes: A unified intelligent solution for cost-effective, intelligent video management

Currently, in security surveillance, the application of intelligent analysis technology has two approaches: front-end intelligence and back-end intelligence. Front-end intelligence Front-end intelligence is typically implemented within the video surveillance camera itself, integrating AI edge algorithms into the camera. Its advantages include: acquiring video in real-time and performing video analysis and feedback results immediately. Benefits No consumption of network resources like bandwidth; Offers real-time and highly efficient analysis; Obtains results immediately; relatively low cost; Highly flexible deployment. Disadvantages Due to the small physical size of cameras, hardware expansion space is limited. AI edge algorithms are often confined to a fixed few types, such as perimeter intrusion detection, tripwire, abandoned object detection, etc. It cannot flexibly load customised intelligent functions. The other approach is back-end intelligence, which usually requires installing an intelligent analysis server in the monitoring centre, integrating AI edge algorithms into this back-end server.  Advantages: Hardware components can be flexibly expanded based on project requirements, thereby enhancing the server's overall analytical capability. It can also flexibly customise and load various intelligent algorithms according to project needs, capable of loading dozens or even hundreds of algorithms.  Disadvantages: Because back-end intelligence requires first collecting the video stream from the front-end cameras in real-time before analysis, it consumes significant resources like bandwidth. It cannot provide immediate feedback of intelligent analysis results like front-end intelligence, lacks flexible deployment options, and the cost is very high. Development of intelligent analysis technology AI edge analytics boxes have emerged in the security surveillance market, defining another front-end With the development of intelligent analysis technology, AI edge analytics boxes have emerged in the security surveillance market, representing another front-end intelligence product. These boxes themselves can integrate dozens of AI edge algorithms, enriching the variety of AI algorithms available for front-end intelligent cameras while maintaining flexible deployment.  Users can freely choose to deploy the box at the front-end (near the camera) or at the monitoring centre end to function as a small intelligent analysis server. Front-end (camera side) When deployed at the front-end (camera side): There is no need to dismantle existing video surveillance equipment. The real-time video stream from the original camera can be analysed directly within the AI box, and results are fed back. Since the camera and AI box are usually on the same network, this consumes minimal bandwidth resources, offering excellent real-time performance, timeliness, and efficiency. After the AI edge analytics box analyses the video, the results can be transmitted to the monitoring centre video management platform server via the internet, VPN dedicated line, 4G, 5G, etc., for storage, real-time display, and retrieval. Monitoring centre end When deployed at the monitoring centre end: The AI edge analytics box can function as a small video analysis server. Individual AI analytics boxes can be stacked to aggregate their analytical power, enabling the analysis of large volumes of video streams transmitted from the front-end. Since the cost of the AI edge analytics box itself is significantly lower than that of a full intelligent analysis server, using AI analytics boxes to implement intelligent solutions is often more economical and practical for small to medium-sized intelligent security surveillance projects. AI box application. AI box deployment application Edge AI Box does not require changes to existing video surveillance kit deployments Since the Edge AI Box does not require changes to existing video surveillance equipment deployments and only upgrades the original system to enable intelligent applications for existing monitoring devices, it can save significant labour costs associated with on-site deployment personnel. After the Edge AI Box and AI-powered cameras transmit intelligent analysis results to the platform, what can the platform do? Taking the video surveillance management platform SVMS Pro as an example. SVMS Pro video surveillance management software First SVMS Pro provides centralised management for multiple AI Boxes across diverse networks (LAN, WAN, VPN, 4G/5G). This flexibility enables users to deploy AI Boxes anywhere project requirements demand. With the AI Box and cameras connected to the SVMS Pro video surveillance management software, users can select video channels for analysis. The AI Box automatically analyses the chosen channels, transmits the results, and triggers alarms back to SVMS Pro. This seamless integration provides a unified platform for users to: Configure event settings Define alarm-triggering actions (such as alarm recording and alarm video pop-up). Alerts originating from the AI Box can trigger video recording via the SVMS Pro platform. These recordings are then stored long-term within the SVMS Pro platform. This capability resolves the limitation of the AI Box itself, which cannot store recordings for extended periods due to constraints imposed by its physical size. Search historical alarm events Manage active alarms View alarm statistics Additionally, SVMS Pro facilitates pushing the analysed results to third-party platforms via the network. SVMS Pro provide various AI intelligent solutions for different scenarios. AI intelligent solutions for different scenarios AI box + video surveillance management software SVMS Pro provides various AI intelligent solutions for different scenarios. For example: In smart construction site applications, AI box can provide not wearing safety helmet and reflective vest detection, fight detection, area intrusion detection, wandering detection, fire detection, etc., and display real-time results in real-time on SVMS Pro. Users can watch real-time video from different places, store the recordings, playback, get the real-time AI alarms, put the video on the video wall, etc., all in one platform. SVMS Pro and AI Edge Boxes Combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution In essence, the combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution, effectively overcoming the inherent limitations of both traditional front-end and back-end surveillance intelligence. The AI Edge Boxes deliver powerful, real-time analytics at the edge or as scalable micro-servers, offering unprecedented flexibility and cost-effectiveness – particularly vital for small to medium-sized projects.  SVMS Pro elevates this capability by providing centralised command and control, seamlessly integrating diverse AI Boxes across any network to offer comprehensive video management. Advanced AI surveillance This synergy enables robust features like intelligent event configuration, alarm-triggered recording with long-term SVMS Pro storage, historical event search, and cross-platform integration, all within a single, cost-optimised platform.  From construction sites to broader security networks, this unified solution transforms raw video into actionable intelligence, democratising advanced AI surveillance by making it accessible, practical, and economically viable. SVMS Pro and AI Edge Boxes together redefine intelligent video management for the modern era.

View all

Security beat

Flock’s drones are a new tool providing fast, flexible visibility for security
Flock’s drones are a new tool providing fast, flexible visibility for security

Drones are poised to fill long-standing gaps in physical security. Fixed cameras leave blind spots, and human guards cannot quickly cover large or complex properties during high-risk moments. Drones fill the gaps, providing a missing mobile layer, offering unmatched speed, broad aerial visibility, and proactive coverage that elevates security from reactive to truly responsive and deterrent. As an added element in security systems, drones complement fixed cameras, access control, and licence plate recognition (LPR) systems by serving as dynamic, rapid-response assets that reach areas other technologies cannot.  Integrated with existing alarms and sensors, drones can auto-launch on triggers to deliver near-instant, real-time aerial video for accurate threat verification, giving security teams critical information before taking action. Drones as first responders Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies “Drones are a natural fit for physical security because they provide teams with fast, flexible visibility that fixed cameras and human patrols cannot always deliver, especially on large properties,” says Keith Kauffman, Senior Director of DFR Strategy at Flock Safety. Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies, which includes LPR, video surveillance, and gunshot detection systems. “Drones act as a force multiplier, improving coverage without increasing head count,” says Keith Kauffman, adding “Scaling is easy with the ability for one pilot to control multiple drones stationed at multiple locations.” Drones as a force multiplier Drones reduce manpower needs by offering wide-area coverage that would normally require several guards or patrol vehicles. Drones boost security team productivity and safety by automating the most dangerous and tedious tasks, such as alarm verification. Acting as a first responder, a drone can clear a significant portion of false alarms, allowing human guards to concentrate on high-priority roles, complex issues, or confirmed intrusions with real-time aerial intelligence. This improves personnel deployment and cuts down workload, risk, and costly overtime. Drones also significantly improve efficiency and safety for security personnel, says Kauffman. A drone system delivers real-time aerial intelligence in seconds, enabling guards to respond wisely and safely. Initial threat verification Some drone systems' yearly costs are similar to a single mid-level guard's salary Some drone systems' yearly costs are similar to a single mid-level guard's salary, but they can cover up to 38 square miles. This investment provides ROI by reducing large-scale losses and allowing human guards to focus on high-touch roles, while the drone handles initial threat verification. Flock Safety entered the drone space after acquiring Aerodome DFR in October 2024, with their private-sector drone as automated security (DAS) system rolling out in Q3 2025. And because the drones plug directly into FlockOS and work alongside other tools like licence plate recognition (LPR) and gunshot detection, they can launch automatically on alerts, creating a smarter, faster response workflow. Immediate intelligence to combat false alarms Drones fundamentally change false alarm management by providing security teams with immediate, real-time aerial intelligence. When an alarm triggers, the drone can be dispatched to the exact location in seconds, allowing operators to verify instantly the threat's legitimacy via a live HD or thermal video feed. This capability enables staff to safely clear or ignore false alarms remotely, preventing guards from wasting time and resources on unnecessary, lengthy, or potentially dangerous physical checks. This process can significantly reduce alarm fatigue and allow personnel to reallocate their time to genuine security threats. Emerging drone use cases enhance security operations Emerging drone use cases enhance security operations by integrating with existing systems and enabling novel applications. One key area is Post-Storm Damage Assessment, where drones provide rapid, safe aerial visuals of expansive sites, documenting damage for insurance claims far faster than ground inspections. Another area is Ecosystem Integration via platforms such as FlockOS, where the drone automatically launches in response to alerts from other security sensors (LPR, gunshot detection). This creates a powerful, automated workflow that unifies responses, enabling quicker incident interruption, better evidence capture, and a proactive security posture without increasing the number of human patrol staff. Evolving regulations expanding drone usage Evolving FAA regulations and corporate airspace policies impact the usage of drones Evolving Federal Aviation Administration (FAA) regulations and corporate airspace policies impact the usage of drones. Today, operating drones beyond the visual line of sight (BVLOS), at night, and over-people/roadway operations requires special FAA waivers. However, the trend — Remote ID, expanded FAA Part 107 allowances, and growing BVLOS exemptions proven in drones as first responders (DFR) — reduces overhead and allows more automation. Combined with enterprise standard operating procedures (SOPs), geofencing, and data governance, drone adopters can standardise flights, minimise risk, and integrate with other technologies. “In practice, that means automated dock-based dispatch on verified alerts, scheduled perimeter sweeps, and incident-to-incident coverage without on-site pilots,” says Kauffman. “The results are faster detection-to-dispatch, stronger evidentiary chains, and lower costs per incident — unlocking 24/7 remote operations across campuses, logistics, and sites.” Winning over public acceptance Public perception plays an important role in how communities embrace drone technology, which is why transparency and clear policy are essential. When employees and community members understand the drone’s purpose — responding to alarms, patrolling after hours, and deterring crime — they tend to view it much as they do security cameras or access control: a safety tool, not surveillance. Flock’s system is event-driven, privacy-minded, and used only by authorised personnel, and every flight is logged, documented, and fully audit-traceable for accountability. “With clear communication and responsible use, drones become a reassuring layer of protection rather than a cause for concern,” says Kauffman. Drones are extremely safe, actually reducing human risk by acting as a first responder to scout ahead of personnel. They come with layers of protection, such as geofencing, obstacle avoidance, precision landing, autonomous deconfliction with aircraft, and automated safety modes. Smartest approach For security teams considering adding drones, the smartest approach is to choose a system built specifically for 24/7 security operations. That usually means the drone provider handles FAA paperwork, writes clear procedures, develops sound policy, and trains customers’ staff so everything runs smoothly. “With the right partner, drones become a safe, compliant, and incredibly helpful part of your security toolkit,” says Kauffman. Flock ramps up drone production Flock Safety’s immediate focus is ramping production of its U.S.-designed and assembled Flock Alpha hardware, which is already NDAA-compliant and built to meet the growing demand for American-made drone solutions. At the same time, the next six to 12 months will centre on releasing key software updates, such as automated scheduled patrols. Together, increased hardware production and these software advancements will move the DAS product line toward full capability and broader commercial availability. Flock DAS Flock DAS essentially provides a guard’s vantage point from above, with the ability to instantly fly to any corner of a property. “And it doesn’t sleep on duty or call in sick,” says Kauffman. “Picture your traditional security measures: cameras are your static sentries; guards are your roaming patrollers. Now add Flock DAS: it’s your mobile, flying camera that can respond anywhere, anytime.” Just as a dispatcher coordinates police calls, Flock DAS serves as an aerial dispatcher for the security team, triaging alerts and providing eyes on the scene before anyone sets foot into potential danger. It gives the security team immediate, property-wide awareness so they can make safer, more informed decisions during any incident.

GSX 2025 highlights security's rapid shift to smart solutions
GSX 2025 highlights security's rapid shift to smart solutions

There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis.  Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localised threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Centre in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernising security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system  Eagle Eye Networks says they are focused on helping integrators "organise the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarisation, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditised tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Centre SaaS has had a fast and successful launch. It enables cloud-based systems with local storage.  Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratise evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app centre” enables additional features to enhance XProtect without involving integration.  Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernisation and open integration Convergint and Genetec collaborated on a "2026 Technology Modernisation Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernisation, enabling security professionals to better utilise new technology. Convergint and Genetec collaborated on a "2026 Technology Modernisation Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernisation," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favourable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond licence plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Centre (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Centre to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernisation roadmaps, suggests a security ecosystem built for agility and future growth.  These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.

Everon’s new CTO directs focus on video monitoring and evolving technology
Everon’s new CTO directs focus on video monitoring and evolving technology

Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a video monitoring company. With most of his professional experience rooted in commercial security, Kassem has come to understand how customer needs and demands change with the evolving technology landscape. That understanding is a foundation for his new role at Everon, the national provider of commercial security, fire, and life safety solutions formerly known as ADT Commercial. Integrate AI to security operations “In this role, I am responsible for any customer-facing technology at Everon,” says Kassem. “Our primary focus is to provide a platform that will make it easy to do business with us. That platform will involve most of our solutions, including video monitoring which is the near-future focus for us.” As an integrator, Everon’s objective is to identify the best solutions. “We have partners that we leverage to help develop solutions for our customers that directly respond to their needs,” says Kassem. “For example, we partner with video camera providers to integrate AI to take security operations to the next level.” Demand for video monitoring Everon is looking to shift from reacting to events after they take place toward proactive monitoring Like most security operations, Everon is looking to shift from reacting to events after they take place toward proactive monitoring and preventing crimes as they are happening or deterring them from taking place.  The ability to detect objects and behaviours is possible through AI. “Through this detection, we can respond accordingly – that’s why it’s at the forefront of our video monitoring efforts,” says Kassem. Every pursuit at Everon is in response to customer demand, and there is tremendous demand for video monitoring, says Kassem. Customer needs are the main philosophy behind the development and acquisition of technology, which also ensures that Everon is at the forefront of evolving with the security industry. Video-based security solutions “Right now, we’re noticing a trend towards video-based security solutions versus solely intrusion and guarding,” says Kassem. Everon seeks to strike a balance between “build versus buy.” The integrator prefers to buy when there is a proven product that will bring the most value. “We’re an integrator before we are a developer of technology,” says Kassem. “However, we are not shy about complementing a technology that we purchase with technology that we build if we don’t find the proper platform.” Video monitoring solutions and services Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras, faster internet connectivity, and availability of wireless through 4G, LTE, and 5G connections. All of these are critical pieces of the video monitoring roadmap, says Kassem. “We aim to develop our video monitoring solutions and services to provide the best value to enterprises, reduce false alarms, and focus on relevant activities to save time and money,” he adds. “That’s what we’re looking forward to in the next couple of years.” Dependence on physical security Everon provides video monitoring services on a monthly basis, so the approach plays well with their recurring monthly revenue (RMR) model. Video monitoring is in great demand, and Everon is working towards being pioneers in that space, pushing to make it a major part of their future offerings. Everon is working towards being pioneer in that space, pushing to make it a major part of their future offerings “The dependence on physical security has gotten expensive, and many responding agencies no longer dispatch without video verification, which is the biggest technology challenge currently in the commercial security space,” says Kassem. “Video monitoring is the most direct, effective answer to that challenge, replacing costly, around-the-clock guarding services while also providing video verification for first responders and law enforcement agencies.” Portfolio of security solution offerings Everon roots all its pursuits in responding to the customer. Making the difference in Everon’s approach is an eagerness to listen, an awareness of industry trends and changes, and a full portfolio of security solution offerings.  “Our technological roadmap is ambitious, innovative, and looks to the future through our thoughtful investments in this space, including through acquisitions of technology and top talent,” says Kassem. “All our efforts are supported by our teams of experts with decades of experience.”

View all

Case studies

VIVOTEK upgrade at Kitakobushi Resort in Shiretoko
VIVOTEK upgrade at Kitakobushi Resort in Shiretoko

Kitakobushi Resort operates multiple distinctive properties in Shiretoko, Hokkaido – a UNESCO World Natural Heritage site since 2005. Their portfolio includes a large resort hotel overlooking the Sea of Okhotsk, a forest retreat, private cottages, and a historic hotel with over 60 years of operation – all showcasing the region’s stunning landscapes and local charm. As Shiretoko grew in popularity, maintaining a consistently safe and comfortable environment across multiple dispersed properties became increasingly important. This demand prompted a comprehensive review of the resort’s aging surveillance infrastructure. Challenge Towards smarter, unified, and more efficient video management As visitor numbers continued to rise, expectations for safety and operational efficiency increased across Kitakobushi Resort’s dispersed properties. The limitations of the resort’s aging, siloed surveillance system became particularly evident at its two flagship properties: Kitakobushi Shiretoko Hotel & Resort and KIKI Shiretoko Natural Resort – where modernisation became a strategic priority. The resort faced three critical challenges: Upgrading aging infrastructure: The resort’s existing cameras and NVR had served reliably for many years, but an upgrade became essential to maintain smooth operations. Unifying scattered monitoring operations: With several properties to oversee, each facility’s video was previously monitored separately, limiting operational efficiency and making management more complex. The resort wanted to enable remote monitoring, allowing staff to view live footage from anywhere without needing to be on-site. Maximising coverage while controlling costs: Comprehensive coverage across facilities required numerous cameras spanning public spaces, parking areas, and back-of-house operations, yet keeping the system cost-effective remained an important consideration. The resort sought a solution that could modernise infrastructure, unify operations, and maximise value while achieving smart upgrading within budget constraints. Solutions Smart video integration for a safer, more connected resort As a global pioneering security solution provider, VIVOTEK was selected for its proven reliability, performance, and strong local support in Japan. The solution deployed 58 VIVOTEK network cameras across key areas at Kitakobushi Shiretoko Hotel & Resort and KIKI Shiretoko Natural Resort, with centralised management through two NVR-Pro units powered by System K’s SK VMS. Strategic camera deployment included: SD9161-H (17 units): This PTZ camera, installed throughout hotel interiors and parking areas, offers 10x optical zoom and flexible pan-tilt-zoom capabilities. Staff can effortlessly monitor wide areas and zoom in on points of interest in real time — all without leaving the office. FD9369 (41 units): Compact and discreet, this dome camera was installed mainly indoors, preserving the resort’s natural ambiance while delivering reliable, cost-effective performance. By unifying all 58 cameras into a single management platform, the resort gained complete visibility across both properties. The centralised system streamlines daily monitoring, reduces patrol labour, and enables faster response to on-site needs. Staff can now monitor multiple facilities from a single interface, significantly improving overall operational efficiency. Result and customer feedback Making resort operations smarter and guest experiences safer The VIVOTEK solution has transformed resort operations, enabling centralised monitoring, real-time flexibility, and enhanced safety. Key improvements Streamlined multi-facility management: Staff can now monitor multiple properties from a single interface. This unified system eliminates the need to check each facility separately, simplifying operations and boosting overall efficiency. Flexible monitoring with PTZ cameras: The SD9161-H PTZ cameras allow staff to pan, tilt, and zoom in real time from any location, reducing the effort required for routine monitoring. Seamless aesthetic integration: The compact FD9369 dome cameras blend discreetly into the resort’s interior, preserving the natural ambiance while delivering reliable performance at a cost-effective price. Enhanced safety and guest experience: By combining advanced video technology with centralised management, the resort ensures a safe, seamless, and welcoming experience for both staff and guests. Customer insights "Based on System K’s recommendation, we explored and selected VIVOTEK due to its stability, intuitive interface, and excellent value. VIVOTEK offers strong warranty support, reliable performance, and an easy-to-manage system. Integrating all cameras with the NVR-Pro platform allows us to manage multiple properties in one place, greatly improving daily operations," Chief Digital Officer (CDO), Kitakobushi Resort. "VIVOTEK offers an impressive balance of high functionality and affordability. With strong local support and ongoing firmware updates, the system continues to deliver reliability and satisfaction," Sales Representative, System K (VIVOTEK Distributor).

EnGenius security boosts Crossroads Church safety
EnGenius security boosts Crossroads Church safety

EnGenius Technologies Inc., a pioneer in advanced connectivity and cloud-managed networking solutions, today announced that Crossroads Church in Rowlett, Texas, has completed a comprehensive security and network modernisation project using EnGenius AI cameras, multigigabit switches, and Wi-Fi 7 access points.  The upgrade delivers complete visibility across the church’s 30,000-square-foot facility and 15-acre campus, providing staff, volunteers, and families with unprecedented peace of mind. Rapid growth drives need for enhanced safety Serving more than 1,200 members and hosting daily activities including worship services, youth programs, daycare, and community outreach, Crossroads Church faced increasing challenges with its aging surveillance system. The church’s legacy NVR-based surveillance system left numerous blind spots and lacked the clarity, storage, and analytics needed to support a large, active campus. “With ministry happening every day and families trusting us with their children, we needed to be sure we could clearly monitor every part of our campus,” said the church’s Executive Pastor. “Our previous system simply couldn’t keep up.” A unified EnGenius solution Crossroads Church partnered with Smart Technology Solutions to implement a full-scale modernisation built on EnGenius cloud-managed technology. The deployment includes: 57 EnGenius ECC100 AI surveillance cameras for complete indoor, outdoor, and parking-lot coverage Multi-gig EnGenius ECS2552FP and ECS2528FP switches supporting high-capacity video, livestreaming, and campus-wide traffic 12 EnGenius ECW536 Wi-Fi 7 access points providing fast and reliable wireless connectivity for staff, classrooms, and production teams A single-pane-of-glass cloud dashboard delivering centralised management, real-time monitoring, and instant event review “For the first time, we have total visibility,” said the Lead Pastor. “If something happens anywhere on our property, we can see it, isolate it, and respond immediately. That level of clarity is invaluable.” AI features unlock the future of campus security The church has begun using contextual AI analytics, including event detection, vehicle tracking, and customisable alerts. Over time, leadership plans to expand their use of EnGenius AI capabilities to detect human activity, interpret complex scenarios, analyse movement trends, and enhance after-hours oversight — further improving campus safety. Meet the AI that turns video into insight Ever spent hours scrubbing through video just to find one five-second moment? With EnGenius Cloud AI, those days are over. It eliminates the biggest headaches of traditional surveillance—false alerts, slow investigations, and endless manual review—by delivering real-time intelligence and natural language search. Instead of generic motion notifications, the system interprets what it sees, recognising behaviours with context so the team receives fewer false alarms and earlier warnings when something seems off. And when it’s time to find footage, there’s no need to dig through timelines—simply enter a description like “person in a red hoodie with a black backpack,” and the system instantly retrieves the precise clips from any camera or location. This smarter, context-aware approach helps staff work faster, respond with confidence, and stay focused on what matters most. More than a camera system, it’s a smart security assistant that makes investigations faster, simpler, and far more effective. Key camera features 5MP HDR Clarity: Sony Starvis sensor ensures clear day-and-night visuals.  Ultra-Wide Coverage: 132° view and 20m IR distance for versatile environments.  8GB eMMC Flash Storage + 4GB DDR4 Memory: Delivers reliable onboard flash storage and efficient multitasking for smooth, stable performance. Built-in Storage, No NVR Needed: ECC100 includes 256GB of reliable onboard storage, supporting continuous and event recording 24/7 for immediate footage access. Durable Build: IP67 weatherproof and IK10 vandal-resistant design.  Cloud Access & Mobile Monitoring: Manage cameras anytime, anywhere.  The next era of intelligent surveillance With the launch of its AI Cloud Surveillance Solution and ECC100 AI Camera, EnGenius once again sets a new benchmark for intelligent security—empowering businesses to stay one step ahead with smarter, faster, and more reliable protection. “What truly sets our system apart is its ability to analyse contextual sequences rather than just single-frame images, enabling preventive alerts before incidents occur,” said Roger Liu, Executive Vice President at EnGenius Technologies. “Whether it’s spotting loitering before theft, flagging escalating conflicts, or identifying fatigued workers on a factory floor, our system helps businesses act before incidents escalate.” Availability The ECC100 is available from EnGenius authorised resellers and distribution partners.

VIVOTEK supports ecological restoration in Taiwan
VIVOTEK supports ecological restoration in Taiwan

VIVOTEK, the pioneering security solution provider, actively integrates corporate social responsibility into its operations. This year marks the fifth “Safety Map” corporate sustainability event. For the first time, the team extended its efforts beyond urban communities to the natural environment of Zhonggua River in Guoxing Township, Nantou, Taiwan.  Collaborating with the National Chung Hsing University’s (NCHU) University Social Responsibility (USR) team on “Environmental Resilience and Sustainability” and the precision AI agriculture partner DATAYOO, the team launched the “Zhonggua River Ecological Restoration Safety Map” project. VIVOTEK deployed its security solutions to monitor the ecosystem, successfully capturing rare footage of the endangered crab-eating mongoose in its natural habitat. Employees also helped remove invasive species, restore native plants, and construct ecological ponds, embedding sustainability into the company’s core security expertise – extending protection from human safety to habitats and biodiversity. “Returning land to the river:” Reviving the ecosystem After a typhoon in 2004, Zhonggua River’s banks were fortified with high walls and riverbed structures for flood control, which disrupted the ecosystem. Over time, cracks formed, foundations eroded, and exposed steel reinforced the risk. In 2018, Professors Chiou-Rong Sheue and Peter Chesson from NCHU’s Department of Life Sciences began living by the river and advocated a subtraction approach: dismantling walls to “return the land to the river,” balancing flood control with conservation. This effort culminated in 2023 with Taiwan’s first community-initiated river restoration project. Today, the USR team led by Professor Hsu continues ecological monitoring and habitat maintenance, while VIVOTEK contributes technology and manpower through the “Safety Map” initiative, jointly safeguarding the reborn river. Security technology supports restoration through action and care “VIVOTEK uses ‘Concern for Others’ Cares’ as a brand catalyst. During the 2010 Chile mining disaster, our cameras were deployed deep inside the mine to monitor the vital signs of trapped miners, transmitting real-time footage to rescue teams and contributing to the miraculous rescue efforts. In Parks Victoria, Australia, we applied AI solutions to observe seal habitats in Port Phillip Bay, monitoring potential threats such as fishing lines and ropes." "VIVOTEK partnered with the NCHU’s USR team to transform our original commitment to care and social safety into active conservation of the river ecosystem and wildlife, turning technology into a bridge for harmonious coexistence between humans and nature,” said Alex Liao, President of VIVOTEK. Building safe habitats, restoring nature’s vitality Under the guidance of the NCHU’s USR team, VIVOTEK employees observed aquatic insects, native plants, and changes in the river ecosystem, gaining insight into the impact of removing cement embankments on local wildlife. To accelerate ecological restoration, they split into teams to construct ecological ponds and build new homes for the Ayers’ tree frogs using bamboo tubes. At the same time, invasive plant species such as Mimosa pudica, fragrant orchids, and elephant grass were removed, while native species including reed orchids, wild peonies, honeysuckles, purple bead trees, Taiwan mountain laurels, and orange osmanthus were replanted to stabilise the soil and restore riparian vegetation. “Being able to personally contribute to ecological restoration and give back to nature is a source of pride as a VIVOTEKer,” shared Ben, an engineer who has participated in the Safety Map event for five consecutive years. Leveraging big data monitoring to deepen corporate impact “The Safety Map event has extended from neighbourhoods, care facilities, schools, and historic settlements to Zhonggua River, engaging hundreds of employees in inspecting sites and proposing safety solutions. Through these efforts, we have expanded the definition of ‘safety’ from simply protecting people to also safeguarding wildlife and habitats, revealing the multidimensional nature of security." "Moving forward, we will continue to promote cross-industry collaboration, using our security expertise as a foundation to amplify social impact and create more inclusive safety values and practices,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the CorpComm & Sustainability Office. This year, VIVOTEK further leveraged the expertise of DATAYOO, using its FarmiSpace PRO monitoring service and AI crop monitoring system to analyse various crop indices derived from satellite spectral data. These insights provide the NCHU’s USR team with a scientific basis for their ecological research at Zhonggua River, enabling a data-driven approach to natural habitat restoration and making technology a powerful tool for conservation. Industry and academia join forces to set a benchmark “VIVOTEK Proactively proposed initiatives and involving company employees in hands-on participation are the most powerful ways to implement ecological restoration. Through VIVOTEK’s security expertise, volunteer engagement, and AI-driven long-term ecological monitoring, we have accelerated the restoration of Zhonggua River’s ecosystem, allowing more people to witness the harmony between humans and nature,” said Chiou-Rong Sheue. The habitat restoration efforts have already shown tangible results, with the ecological ponds built by VIVOTEK employees quickly attracting creatures such as pond frogs, dragonflies, water striders, and damselflies. VIVOTEK has emerged as a key driver of environmental restoration through its security technology, demonstrating that safety is not only about protection but also stewardship and shared responsibility, and continues to foster a Safety Map where humans and nature coexist.

Comelit-PAC's historic video entry solution
Comelit-PAC's historic video entry solution

Comelit-PAC has partnered with Kings Group SW to deliver a bespoke video door entry solution at the historic Bridgwater Arts Centre, a Grade I listed building renowned for its architectural and cultural significance. Situated in the heart of Bridgwater, now owned and operated by the Town Council, the Arts Centre construction was in 1723 and established on its existing site since 1946 to run a theatre programme of performance, music and film. Enhancing video security and access To complete a renovation programme, the Arts Centre worked with Kings Group SW to upgrade its door entry system to incorporate a modular video design. “The Grade I listing of Bridgwater Arts Centre means that any changes, however minor, must be carefully planned to protect the building’s historic character,” said Scott Mason, Director of Amenities at Bridgwater Town Council. “We involved our teams in the initial design and specification process to ensure the solution could be installed to seamlessly blend with its surroundings while enhancing video security and access.” Latest security standards Kings Group SW specified Comelit-PAC’s Ultra Door Entry system, a high-definition video intercom solution designed to allow staff to monitor all entry points via high-definition video intercoms, providing real-time visibility and secure access control.  Adam Pitman, Security and Life Safety Systems Supervisor at Kings Group SW, added: “Every aspect of the door entry upgrade had to be approached sensitively. This included routing cables discreetly, installation and ensuring the system met the latest security standards. By choosing Comelit-PAC’s modular system, this could be achieved with minimal disruption to the building’s historic fabric while providing a flexible solution that can be adapted as the Centre’s security needs evolve.” Configuration of the door entry solution The Ultra system was selected because its modular design enabled a simple configuration of the door entry solution to meet the specific requirements of the Arts Centre. Its 2-Wire and ViP door stations allow a combination of audio, video, and button modules in a compact layout, giving the team flexibility to adapt the system to access points. Tony Berry, Business Development Manager at Comelit-PAC, concluded: “Working closely with Kings Group SW and Bridgwater Arts Centre early on allowed us to tailor the solution specifically for this site. By understanding the needs of the team and how the building operates, we were able to deliver a system that functions seamlessly for staff, visitors and performers while integrating thoughtfully into the historic environment.”

View all

Round table discussion

What is the most overlooked factor when installing security systems?
What is the most overlooked factor when installing security systems?

Installing physical security systems requires integrating diverse technologies (e.g., cameras, access control, alarms) that often use different protocols and must be adapted to a building's unique physical layout and legacy infrastructure.  Specialised technical expertise is required for seamless networking and proper configuration. Hopefully, no important factors are overlooked in the installation process. We asked our Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?

What are the advantages of installing security as a unified platform?
What are the advantages of installing security as a unified platform?

Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralised management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?

Is audio underused in physical security? What are the obstacles?
Is audio underused in physical security? What are the obstacles?

The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the situation changing? We asked our Expert Panel Roundtable: Is audio an underused component in today’s physical security systems? What obstacles are keeping audio from expanding?

View all

Products

Hikvision shows expanded range of video surveillance products at IFSEC 2016

Hikvision shows expanded range of video surveillance products at IFSEC 2016

Hikvision 2MP IR bullet network camera joins Easy IP Solution range

Hikvision 2MP IR bullet network camera joins Easy IP Solution range

Hikvision DS-7616NI-E2 16-channel network video recorder

Hikvision DS-7616NI-E2 16-channel network video recorder

Hikvision DS-7216HVI-SH 16-channel standalone digital video recorder

Hikvision DS-7216HVI-SH 16-channel standalone digital video recorder

Dahua 2MP HDCVI IR Eyeball Camera

Dahua 2MP HDCVI IR Eyeball Camera

Hikvision DS-7732NI-ST 32-channel network video recorder

Hikvision DS-7732NI-ST 32-channel network video recorder

Dahua Technology 5MP HDCVI IR Bullet Camera

Dahua Technology 5MP HDCVI IR Bullet Camera

Hikvision DS-7616NI-SE/P 16-channel network video recorder

Hikvision DS-7616NI-SE/P 16-channel network video recorder

Hikvision DS-7616NI-E2/8P 16-channel network video recorder

Hikvision DS-7616NI-E2/8P 16-channel network video recorder

Hikvision DS-D5043QE 42.5-inch FHD monitor

Hikvision DS-D5043QE 42.5-inch FHD monitor

Hikvision DS-7116HWI-SH 16-channel 960H mini digital video recorder

Hikvision DS-7116HWI-SH 16-channel 960H mini digital video recorder

Hikvision DS-7732NI-SP 32-channel network video recorder

Hikvision DS-7732NI-SP 32-channel network video recorder

Hikvision DS-2CD2620F-I 2 megapixel vari-focal IR bullet camera

Hikvision DS-2CD2620F-I 2 megapixel vari-focal IR bullet camera

Hikvision DS-7216HVI-SV 16-channel 960H digital video recorder

Hikvision DS-7216HVI-SV 16-channel 960H digital video recorder

Hikvision DS-7216HFI-SH 16-channel standalone digital video recorder

Hikvision DS-7216HFI-SH 16-channel standalone digital video recorder

View all

White papers

Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
The power of integration in physical security systems

The power of integration in physical security systems

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
2025 Trends in video surveillance

2025 Trends in video surveillance

Download
Maximising security and performance

Maximising security and performance

Download
Palm vein recognition

Palm vein recognition

Download
The key to unlocking K12 school safety grants

The key to unlocking K12 school safety grants

Download
Selecting the right network video recorder (NVR) for any vertical market

Selecting the right network video recorder (NVR) for any vertical market

Download
The security challenges of data centers

The security challenges of data centers

Download
The role of artificial intelligence to transform video imaging

The role of artificial intelligence to transform video imaging

Download
How to lower labour costs when installing video surveillance

How to lower labour costs when installing video surveillance

Download
View all

Videos

Find Lost Wallet with Dahua WizSeek

Find Lost Wallet with Dahua WizSeek

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems

Hanwha customer stories: Buffalo and Erie County Naval and military park

Hanwha customer stories: Buffalo and Erie County Naval and military park

Top-of-the-line intercom systems by DNAKE

Top-of-the-line intercom systems by DNAKE

View more

Video surveillance: Manufacturers & Suppliers

  • Hikvision Video surveillance
  • Seagate Video surveillance
  • exacqVision Video surveillance
  • Bosch Video surveillance
  • Hanwha Vision Video surveillance
  • Pelco Video surveillance
  • Dahua Technology Video surveillance
  • Honeywell Security Video surveillance
  • Visionhitech Video surveillance
  • LILIN Video surveillance
  • Panasonic Video surveillance
  • Vicon Video surveillance
  • Messoa Video surveillance
  • eneo Video surveillance
  • Axis Communications Video surveillance
  • Vanderbilt Video surveillance
  • VIVOTEK Video surveillance
  • Dedicated Micros Video surveillance
  • AV Costar Video surveillance
  • FLIR Systems Video surveillance

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
About this page

In-depth coverage of Video surveillance, featuring latest news and company announcements, products and solutions and case studies. Read insightful analysis of product, technology and business trends related to Video surveillance from security industry experts and thought leaders.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec