Asset tracking
Nozomi Networks Inc., the pioneer in OT and IoT security announced the industry’s first OT and IoT security sensor that runs embedded in Mitsubishi Electric programmable logic controllers (PLCs). Arc Embedded With Arc Embedded, security and operations teams gain previously unavailable visibility at the process level of their industrial automation equipment and field assets as well as the ability to analyse and deter process-level threats and malicious user activity without impacting curr...
Cubbit, the first geo-distributed cloud storage enabler announced the closing of its $12.5M funding round. With this new funding, the company will enable European Service Providers and Companies to take back full independence and control over their data, infrastructures, and costs. Data security challenges More than 180 billion Terabytes of data will be produced in 2025, and 75% of this will be created and processed at the edge. This explosive growth raises data orchestration complexity, cybe...
Automated operation is a key function for expanding rail capacity and strengthening the performance of railways. Working together with S-Bahn Berlin, Siemens Mobility has installed and will be testing an obstacle detection system – a key technology component for enabling fully automated driving – for the first time during regular daily operation. The project’s goal is to thoroughly evaluate the performance of the new obstacle detection system during daily operation in va...
Kaseya, the global provider of AI-powered cybersecurity and IT management software released its 2024 Future of IT Survey Report, which surveyed IT service providers from the Americas, EMEA, and APAC regions. Based on the report, increasing IT productivity through automation and AI usage are among the top priorities, while IT cybersecurity remains an area for growth, with IT service providers anticipating it will be one of its primary investment areas. AI Investment: AI taking centre stage AI...
Dragonfly and Vismo announce an integration partnership by which intelligence from Dragonfly’s Security Intelligence & Analysis Service will be available through the Vismo platform. Vismo will have access to Dragonfly’s 19,000 location risk scores and associated detailed intelligence reports and incident data. As a result, users of Vismo’s Locate & Protect App will be better protected when they are on the move. Two complementary capabilities The service combines two...
FPT Industrial, the Iveco Group brand dedicated to the design, production, and sale of low-environmental impact powertrains, will travel to Hanover to attend IAA TRANSPORTATION 2024. On-road and industrial applications The trade show for logistics, commercial vehicles, buses, and the transportation industry will take place from September 17 to September 22, 2024, at the Deutsche Messe AG venue. As a pioneer in on-road and industrial applications, FPT Industrial wants to harness its participat...
News
RiverSafe, a global cybersecurity, DevOps, and AppSec professional services provider, has partnered with education-based charity - World Vision to improve access to education for children in Africa. World Vision World Vision is a global humanitarian organisation dedicated to improving the lives of children, families, and communities around the world. Focusing on providing education, healthcare, and emergency relief to those in need, they aim to break the cycle of poverty and open doors for a brighter future for children. Education for children RiverSafe integrates sustainability into its core business strategy, ensuring it grows in a way To support the charity, RiverSafe has provided donations to World Vision to support its mission of providing quality education to children across Africa. This contribution will enable World Vision to enhance literacy skills, provide vital books, and ensure access to essential learning materials for children. RiverSafe integrates sustainability into its core business strategy, ensuring it grows in a way that benefits both the business and the planet, and is working with World Vision to provide quality education, to help change lives and transform societies. Fundamental beliefs Oseloka Obiora, CTO at RiverSafe, commented, "We formed a partnership with World Vision as we share the same fundamental beliefs – that education is the best way to give people a brighter future, for the betterment of everyone in society." Oseloka Obiora adds, "Partnering with World Vision allows us to actively support an initiative that equips young, disadvantaged children with the education they deserve. We are very proud to support the fantastic work they do and hope to continue our relationship, providing more children with good quality education." Breaking the cycle of poverty Spokesperson, World Vision, commented, "Our collaboration with RiverSafe has been fundamental for improving access to education for children. Their support is not only helping transform individual lives but also contributing to the broader goal of breaking the cycle of poverty, making a profound difference, and opening doors to a brighter future for countless children."
Vision Security Technologies is proud to announce that it has been recognised as the North America Value-Added Reseller of the Year for 2023 by LenelS2. This prestigious award underscores Vision Security Technologies' unwavering commitment to excellence in the security industry, innovative security solutions, and exceptional customer support, distinguishing the company as the top vendor within the LenelS2 network. Seamless services LenelS2, renowned as a global pioneer in access control technology, is celebrated for its solutions, including OnGuard, which effectively safeguard buildings, people, and assets. Vision Security Technologies takes pride in its certified installers who deliver seamless services to partners at local, regional, and global levels, consistently meeting and exceeding industry standards. Innovative security solutions Barry Komisar, CEO of Vision Security Technologies, expressed his heartfelt gratitude for this esteemed recognition. He emphasised the critical importance of the company's partnerships and commended the entire Vision team for their hard work and dedication in achieving this honour. "Our team's commitment to delivering innovative security solutions and exceptional customer support has set us apart in the industry. This award is a testament to our dedication and the strong partnership we have built with LenelS2," said Barry Komisar. Electronic security systems Vision Security Technologies has earned its reputation for providing top-of-the-line security solutions to clients As a pioneering systems integrator in the security industry, Vision Security Technologies specialises in designing, installing, and servicing electronic security systems. It has earned its reputation for providing top-of-the-line security solutions to clients nationwide. Del Deason, Senior Vice President, said, "This award reflects the countless hours of strategic planning undertaken alongside our outstanding Lenel RSM and Sales Leader." Value-Added Reseller of the Year Receiving the LenelS2 North America Value-Added Reseller of the Year award is a source of immense pride for Vision Security Technologies. The company remains committed to offering cutting-edge security solutions to its valued customers and expresses profound thanks to LenelS2 for this recognition and to its dedicated team for their unwavering commitment to excellence.
ASIS International, the organisation for security management professionals worldwide announced the appointment of William 'Bill' Tenney as its new Chief Executive Officer, effective 1 July 2024. Tenney brings close to 35 years of security leadership experience from both the public and private sectors to his new role heading the acclaimed global security association. William 'Bill' Tenney As ASIS International’s CEO, Tenney will spearhead the organisation's strategic vision, working closely with members, partners, and stakeholders to advance the mission of fostering excellence in the security profession worldwide. With a commitment to collaboration, and continuous improvement, he is poised to lead ASIS International into a new era of growth and impact. Oatridge comments "We are thrilled to welcome William Tenney as the next CEO to guide ASIS in our mission to support security practitioners across all disciplines," said Cy A. Oatridge, CPP, 2024 President, of ASIS International, adding "His diverse background spanning national security and global corporate security makes him exceptionally qualified to lead our organisation and advance our strategic priorities." Cy A. Oatridge continues, "The successful completion of our chief executive search was made possible by our partner, Spencer Stuart, one of the world's pioneering global executive search and leadership consulting firms, along with our CEO Search Committee led by 2023 ASIS President, Tim McCreight, CPP." Tenney's experience He served in the national security community as a civilian and for eight years as a U.S. Naval Officer Tenney joins ASIS after serving as Chief Security Officer and Senior Vice President of Global Corporate Security for MetLife, Head of Global Operations Risk for Bloomberg, and Director of Global Security at Target Corporation. Previously, he served in the national security community as a civilian and for eight years as a U.S. Naval Officer. "After an extensive global search, we are confident Bill is the ideal leader to guide ASIS International into its next chapter of growth and success," said Tim McCreight, CPP, Chair, ASIS International CEO Search Committee. Operational excellence Tim McCreight adds, "With his proven track record of strategic leadership and deep expertise within the security profession, Bill has the vision and capabilities to provide the highest level of business continuity, while propelling our organisation to new heights. His appointment reinforces our commitment to operational excellence and positions us to capitalise on emerging opportunities in the ever-evolving security landscape." Tenney succeeds Peter O’Neil, FASAE, CAE, who has served with distinction during his tenure from 2016-2024. Tenney will become the eighth executive to lead this organisation in its nearly seven-decade existence. Bill's comments "I am truly honoured and excited to assume the role of CEO for this prestigious global security association with more than 34,000 members representing more than 150 nations worldwide," said Bill Tenney, newly appointed CEO of ASIS International, adding "ASIS International plays a pivotal role in advancing the security profession and addressing the complex challenges facing our increasingly interconnected world." He continues, "I look forward to collaborating closely with our diverse membership, volunteer leaders, and staff to drive innovation, share best practices, and elevate the critical importance of effective security strategies across all sectors and regions." Tenny's education Bill Tenney concludes, "Together, we will continue building a safer and more resilient future on a global scale. I am committed to strengthening our association's position as the preeminent authority and go-to resource for security management professionals everywhere." A graduate of St. Olaf College and Georgetown University's School of Foreign Service, Tenney has completed executive education at Harvard, Northwestern, and MIT. He currently serves on the Board of Directors for the Veterans Defence Project and advisor to the National Center for Missing and Exploited Children.
Gunnebo Entrance Control, a global provider of stylish entrance control solutions, has attained ISO 27001 certification, marking a significant milestone in its dedication to information security excellence. ISO 27001 - the world's best-known standard for information security management systems (ISMS) - defines the requirements for compliance and provides valuable guidance for creating, delivering, monitoring, and evolving the management of risks while keeping owned data protected. Protection of digital assets Commenting on the accreditation, Michel Van Damme, IT Director at Gunnebo Entrance Control, says, "Companies are increasingly transitioning to digital operations to support security and in entrance control, the need for protection of digital assets and customer data is critical." He adds, "This is not only to be compliant with the latest legislation but also as a duty of care responsibility." Transparent process Michel Van Damme continues, "It requires a transparent process to assess information security risks, with controls and processes, and embedded information security management across an organisation." He further said, "It’s something we have committed to on a global scale and being awarded ISO 27001 in recognition it’s a great accomplishment for Gunnebo Entrance Control." ISO 27001 ISO 27001 mandates the establishment, implementation, and maintenance of security measures ISO 27001 mandates a systematic examination of information security risks, and the establishment, implementation, and maintenance of security measures to ensure a safe and secure digital environment for customers and partners. Howard Lang, President at Gunnebo Entrance Control, said, "This is a great achievement for the team and Gunnebo Entrance Control is particularly proud, to demonstrate our commitment to innovation, data protection, and compliance." Highest level of security Howard Lang adds, "As the value of information continues to rise, Gunnebo Entrance Control remains highly aware of the risks associated with data compromise or theft." He continues, "ISO 27001 certification underscores our commitment to overcoming issues proactively with smart solutions, ensuring the highest level of security for our clients and stakeholders."
IriusRisk, the industry-renowned platform for automated threat modeling, grew by more than 50% in 2023, in large part as a result of the company’s expansion into Artificial Intelligence (AI). The company reported a 51% Annual Recurring Revenue (ARR) growth from December 2022 to December 2023, driven by strategic moves into AI and impressive customer retention and expansion rates. AI expansion The expansion into AI is part of the company's wider plans to power the development of advanced AI-driven threat modeling solutions, transforming how the company can help its customers design secure software and systems. In particular, IriusRisk’s ability to threat model machine learning and AI systems, as well as embedding Gen AI into its product has enabled the company to solve one of the key points of friction with threat modeling - the time it takes for data flow diagrams to be drawn. Cyber security National Cyber Security Centre warned that new AI tools will lead to an increase in cyberattacks The implications of the rapid development of AI on cyber security are a significant cause for concern. Earlier in 2024, the National Cyber Security Centre (NCSC, part of GCHQ) warned that new AI tools will lead to an increase in cyberattacks and lower the barrier of entry for less sophisticated hackers to do digital harm. As such, the appointments of a new Head of AI - Jose Lopez - in February 2024, alongside Chief Commercial Strategy Officer - Mark Watson in August 2023, were particularly well timed and both have strengthened the company’s growth capabilities. AI & ML Security Library In October, IriusRisk also published its AI & ML Security Library, which allows organisations to model their planned ML software, and quickly understand what the security risks are, as well as understand what they need to do to mitigate each of those risks before they build AI systems. This security-by-design approach means that engineering teams can quickly understand what the security requirements for building an AI system that meets their organisations security and data privacy policies. Other highlights from 2023 Strong customer retention and expansion rates - In 2023, 55% of existing customers expanded their engagements with IriusRisk, highlighting the company's ability to deliver tangible value and foster long-term partnerships. Increased headcount - By December 2023, the IriusRisk team had expanded to 161 members, a notable 34% increase on December 2022. A diverse and inclusive culture - IriusRisk employs three times more women than the average for tech companies. It scored 83% for employee engagement via the Employee Net Promoter Score (ENPS), 12% higher than the industry average. Expansion of Threat Modeling Connect - Since its launch in November 2022, IriusRisk’s Threat Modeling Connect platform - a global community to facilitate collaboration and sharing between threat modeling practitioners - has reached 1,500 members. Threat modeling Threat modeling as an activity - for SaaS and the free-to-use Community Edition is on the rise, with more clients Overall, threat modeling as an activity - for SaaS and the free-to-use Community Edition is on the rise, with more clients meaning more businesses using it as a tool for cyber defence. The IriusRisk platform saw a two-thirds (67%) increase in the number of active users, while the number of threat models created increased by more than a third (35%). AI enhancements Stephen de Vries, CEO of IriusRisk, commented, "It’s been another strong year of growth for IriusRisk. I’m particularly pleased with the enhancements made to our AI capabilities - by doing so, we have strengthened IriusRisk’s capacity to deliver cutting-edge security solutions for our clients that adapt to the continuously evolving cyber challenge." Stephen de Vries adds, "Our expansion into AI, coupled with several strategic hires, underscores our commitment to staying ahead of technological advancements, bolstering defences against emerging cyber threats."
Axis Communications celebrated the grand opening of its latest Axis Experience Centre (AEC) in Frisco, Texas on Wednesday, May 8, 2024. The new Dallas-area facility replaces the original Irving AEC location with a larger, state-of-the-art facility built to accommodate the need for a greater Axis presence in North Texas and to better serve customers as the Axis product portfolio expands and its partner ecosystem grows. The space also offers additional meeting space, with plans to expand staffing in the future. On-the-ground support With another Texas AEC located in Houston, the new location will serve various industries across North Texas such as defense, financial services, healthcare, and information technology offering localised on-the-ground support and opportunities to demo innovative Axis technologies across video, audio, access control, and analytics, as well as solutions offered by Axis technology integration partners. As an integral part of the Dallas-Fort Worth (DFW) Metroplex and as the third most populous city in Texas, Dallas is a centre for technological innovation and hosts the corporate headquarters of approximately 6,000 companies, resulting in the DFW metropolitan economy being the fourth-largest in the U.S. AEC features Along with some of the most innovative companies, the new Axis AEC will integrate itself into the community not only as an economic driver but as a technological visionary as well. The new 15,000-square-foot AEC is double the size of the former Irving facility and is unlike any Axis has unveiled thus far, with a completely different style and unique features including: A Solutions Theater where visitors can see different Axis technologies working together under one software solution (AXIS Camera Station), as well as an Interactive Solutions area where visitors can engage in hands-on learning around how Axis products work together. An Image Usability Lab, which includes custom displays to demonstrate how Axis solutions perform under challenging scenarios. A dedicated Demo Room with a large-screen video wall to review footage captured by Axis devices. Analytics Alley showcases many of the different analytics Axis offers to enhance security systems. The Partner Pavilion highlights third-party vendor technologies that work well with Axis products and provide solutions for difficult applications. State-of-the-art technology solutions “Axis is excited to expand into one of the most prominent business hubs in Texas, bringing our world-class security technologies and expert support to local organisations across industries,” said Steve Stanberry, Business Area Director, South Central at Axis Communications. “We look forward to meeting and working with local enterprises to enable enhanced safety and security efforts in addition to increased business value. With this grand opening, we’re proud to further our core mission of fostering a smarter, safer world with state-of-the-art technology solutions.” Grand opening Axis, along with local partners, customers, and stakeholders, celebrated the Dallas AEC grand opening with a formal ribbon cutting on May 8. In addition, the grand opening event featured tours of the space led by Dallas-area Axis staff, as well as live country music and special appearances by Dallas Mavericks mascot, Champ, and Dallas Cowboys mascot, Rowdy. The Dallas AEC is located at 17 Cowboys Way, Suite 700, Frisco, TX 75034.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
Security beat
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern programme Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern programme, welcoming 120 interns into various departments for a full semester. The programme helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organisations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centres as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centres as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realise the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasise data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organisation. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
As new technologies incorporate artificial intelligence (AI) and overall uses of AI continue to expand, what protections are in place to prevent its misuse? Artificial intelligence, like any technology or security measure, is not inherently bad. It can, however, be used for nefarious purposes and in ways that were never intended or thought of. ‘Responsible AI Policy’ to protect users Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threats As an AI company, Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threats, and to prevent employee and partner misuse of AI-enabled technology, with guard rails in place to hold them accountable, if artificial intelligence is being used nefariously. “Any security or similar company that utilises AI with its products should monitor for potential misuse and implement a similar policy for protection,” contends Mike Dunn, the Chief Technology Officer (CTO) at Prosegur USA. Requirements of Prosegur’s ‘Responsible AI Policy’ include: Human action and oversight - Prosegur heavily monitors their agents using an integrated international security operations centre (iSOC). Floor and shift supervisors ensure that everything is working properly and that incidents are handled. They also ensure employees are logging into AI-enabled cameras and other technologies for the right reason. Transparency - As with any new company-wide policy, Prosegur wants to ensure that every employee learns about the policy and their duties to uphold it. “In doing this, we are making sure that all processes involving AI development are transparent, so any employee can understand and implement the policy into these processes,” says Mike Dunn. Non-discrimination and equity - Prosegur seeks to make sure employees are using AI-enabled technology to look for known criminals, for example, and not profiling or singling people out. Having a policy in place ensures agents are aware. Accountability - The most important part of the policy is to hold people accountable, if AI-enabled technologies are misused. Violation of the policy will result in disciplinary actions, which can range from HR (Human Resources) intervention to possible suspension. For partners, Prosegur would cease and desist using their products immediately upon finding out about any misuse. Leading the charge for ethical AI practices Prosegur is proud to lead the charge for ethical AI practices, by creating this first policy of its kind" “Prosegur is proud to lead the charge for ethical AI practices, by creating this first policy of its kind, and we hope that other security organisations follow suit,” says Mike Dunn. Technology can do wonderful things. In security, technology can help to stop crimes and even to prevent them from happening with deterrents and alarms. Important to take action to stop ‘bad actors’ However, as with any industry or group of people, there will be ‘bad actors.’ Mike Dunn said “It is important to take actions to stop those people, but it is also important not to condemn all technology or practices when this happens.” Even proven, effective technologies can be used for bad (as well as good). An example is TSA Scanners at the airports. They were designed to provide safer air travel, picking up things that normal metal detectors could miss. Misuse of AI technology can cause lot of harm However, it came to light that a few ‘bad actors’ were using this technology and sharing silhouetted nude pictures of passengers. This has since been patched and fixed, but nonetheless, it’s a great example of how misuse can break people’s trust. As a whole, technology can be dangerous. If not used as intended, it can be used to hurt people. The U.S. government has found that China was using facial recognition and demographic analytics to classify and identify people, based on their ethnicity and that technology singled them out for tracking. Important to ensure analytics and AI used as intended As a society, I think it’s important for us to take that first step and self-police any use of these analytics" “As a society, I think it’s important for us to take that first step and self-police any use of these analytics,” said Mike Dunn, adding “At a minimum, (we should) set policies and procedures to make sure these analytics and AI are being used as intended.” As use of artificial intelligence (AI) continues to increase, an industry standard would ensure companies have protections in place for their employees, clients, and partners. Having a policy is the first proactive step in ensuring AI protections. However, companies need to enforce accountability too. Effectively handle security threats and vulnerabilities Mike Dunn continues, “By heavily monitoring for unethical AI practices and enforcing disciplinary actions when needed, companies will be better prepared to handle security threats and vulnerabilities.” At Prosegur, monitoring agents are heavily trained, taught procedures and then closely supervised by several methods. “This is something that should be common practice in the security industry,” says Mike Dunn, adding “We have employed a compliance officer to help us stay ahead of the curve. Fortunately, we have seen many manufacturers and end users adopt this practice as well.” Compliance officers can act faster than new laws enacted Compliance officers can act faster than new laws being enacted, and often will hold their company to higher standards than a minimum threshold. Mike Dunn concludes, “Putting a responsible AI procedure in place is Prosegur’s way of taking on this problem we see in our everyday work.”
Case studies
As an Indian multinational public sector bank, this financial services entity plays a crucial role in bolstering India’s economy and addressing the diverse needs of its vast customer base. In the United Kingdom, this institution has been active since the early 1900s, gradually growing to become the largest Indian bank in the UK. Initially, its focus in the UK market was on wholesale banking, but it has since expanded its offerings to include a dedicated retail arm. Financial products and services Operating 11 branches across the UK, it provides a wide range of financial products and services tailored to both commercial and individual clients. These include commercial lending, buy-to-let mortgages, cash ISAs, safe deposit lockers, instant access savings accounts, business accounts, and fixed deposits. Overview The institution faced operational inefficiencies and security concerns due to maintaining separate software Confronted with the challenge of integrating attendance and payroll software, along with the inability to effectively restrict unauthorised access to its secured premises across 14 locations, a prominent financial institution sought a comprehensive multi-location solution. Additionally, the institution faced operational inefficiencies and security concerns due to maintaining separate software platforms for employee directories. Need for a cloud-based attendance system To address these issues, the institution sought an integrated cloud-based attendance system that seamlessly integrates with payroll, enhances access control measures, and consolidates employee directory management. This solution aimed to ensure streamlined operations and heightened security across its premises. Institution's challenge The challenges centered around implementing a cloud-based attendance system and access management processes, as detailed below: Need for Integrated Attendance and Payroll Software The financial institution faced difficulties managing attendance and payroll software separately, resulting in inefficiencies and potential discrepancies in salary processing. There was an urgent need to integrate these systems to ensure seamless data flow and improve payroll management. Inadequate Entry and Exit Security Measures The institution struggled to restrict unauthorised entry and exit into its secured premises, posing significant security risks. Strengthening access control measures was essential to mitigate the threat of unauthorised access and protect personnel and assets. Need for a Single Employee Directory Using different software for employee directories created complexity and inefficiency Using different software for employee directories created complexity and inefficiency in administrative processes. It was crucial to consolidate employee directory management into a single platform to ensure accurate, consistent, and easily accessible employee information. Need for a Dedicated Server to Safeguard Data Integrity and Compliance The client had stringent requirements regarding data usage, with a key stipulation being that their main servers could not be used to manage third-party applications. This necessitated the implementation of a separate server or a cloud-based attendance system to host third-party applications and services, ensuring strict data protection measures and compliance with relevant regulations. These challenges highlighted the need for comprehensive solutions to improve operational efficiency, security, and data management within the financial institution. Matrix solution To tackle the challenges faced by the financial institution, Matrix delivered comprehensive solutions, including a cloud-based attendance system that transformed its attendance management processes: Integration of Events and Payroll Software: Matrix seamlessly merged the institution's event logs and payroll software, Darwin Box, through API Integration, guaranteeing synchronised data flow. Through this consolidation, Matrix facilitated smooth payroll processing, lessening inefficiencies, and decreasing the likelihood of discrepancies in salary management. Enhancement of Entry and Exit Security Measures: Utilising advanced technology, Matrix enhanced security protocols, reducing potential risks Matrix deployed proactive access control measures to strengthen the institution's premises against unauthorised entry and exit. Utilising advanced technology, Matrix enhanced security protocols, reducing potential risks and effectively protecting personnel and assets. Unified Employee Directory Management: Matrix unified the institution's management of employee directories by offering a centralised platform. By consolidating employee data, Matrix optimised the system so that updates made in the payroll software would automatically synchronise with the COSEC software, ensuring precise, uniform, and easily accessible vital employee information. Implementation of Cloud-based Solution: Due to a strict restriction on using the COSEC application on their primary server, Matrix proposed and implemented COSEC VYOM, a cloud-based attendance system tailored to their requirements. Moreover, this system was seamlessly linked with their payroll system through API Integration. Results observed Matrix's comprehensive solutions brought significant enhancements across various facets of the financial institution's operations, yielding measurable improvements in efficiency, security, and compliance: Efficient Payroll Processing: By integrating event logs and payroll software, Matrix facilitated seamless data flow and streamlined payroll By integrating event logs and payroll software, Matrix facilitated seamless data flow and streamlined payroll processing. This consolidation minimised inefficiencies and reduced discrepancies in salary management, causing more accurate and efficient payroll operations. Improved Premises Security: Matrix's proactive implementation of access control technology, Matrix fortified entry and exit points, mitigating security risks, and effectively safeguarding personnel and assets. Centralised Employee Directory Management: Through a unified platform for employee directory management, Matrix streamlined administrative processes and ensured consistency and accuracy in employee data. Changes made in the COSEC application automatically updated the payroll software, reducing manual effort and error. Compliance with Data Protection Regulations via Cloud-Based Attendance System: Matrix's provision of COSEC VYOM, a cloud-based attendance system, helped ensure compliance with strict data protection requirements. By segregating data and applications, Matrix improved data integrity and ensured adherence to regulations, minimising the risk of data breaches and non-compliance penalties. Operational efficiency, security, compliance Matrix's solutions not only tackled the financial institution's challenges but also delivered tangible enhancements In summary, Matrix's solutions not only tackled the financial institution's challenges but also delivered tangible enhancements in operational efficiency, security, compliance, and data management. Matrix contributed to the institution's effectiveness and resilience in the financial sector through integrated systems and innovative solutions. Products offered COSEC ARGO CAM200: MiFare Classic Card-Based Ultra Fast Door Controller COSEC VYOM TENANT: Tenant User Licence COSEC VYOM PLATFORM UD10K: Cloud-based Platform User Licence for 10K User Days COSEC VYOM PLATFORM UD100K: Cloud-based Platform User Licence for 100K User Days
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions and systems integrator Wireless Guardian, who develops its patented security technology, announced the successful deployment of the SecurOS® UVSS (Under Vehicle Surveillance System) for vehicle screening at EverBank Stadium in Jacksonville, Florida, USA. UVSS units Engineers from the two companies worked with local law enforcement authorities along with officials from the stadium management company, ASM Global, and security firm S.A.F.E. Management to deploy UVSS units at the stadium’s loading docks and athlete/performer entries to scan all vehicles entering the facility. C&M Consultants, a Wireless Guardian reseller based in Northern Virginia, coordinated this event between ASM Global, Wireless Guardian, and ISS. AI-powered system ISS’ SecurOS® Auto LPR/ANPR software was also used to create a complete profile for each vehicle During the Monday Night (4th Dec 2023) Football game, approximately 100 vehicle undercarriages ranging from large delivery trucks and commercial vehicles to police and civilian cars and even golf carts were scanned by the AI-powered system to detect a wide variety of threats. In conjunction with the UVSS, ISS’ SecurOS® Auto LPR/ANPR software was also used to create a complete profile for each vehicle, including their class, colour, make, and model. Benefits of UVSS “ISS has a long history of providing solutions that secure large events, from the Rio Olympics to the recent FIFA World Cup in Qatar. Now, we are bringing these lessons learned to North America by partnering with Wireless Guardian to help stadiums and other venues take advantage of the benefits of our patented UVSS solution,” said Matt Powell, Managing Director for North America at ISS. He adds, “Our teams worked together flawlessly to deliver the results that ASM Global and EverBank Stadium needed on an important night, and I look forward to continuing this success with Wireless Guardian, combining solutions to provide full awareness at events and venues around the U.S.” How it works The SecurOS® UVSS from ISS is a compact solution specially designed to screen the undercarriage of vehicles for explosives, illegal contraband, damages/anomalies, and other prohibited items. In addition to providing high-quality undercarriage scans, the UVSS can also be integrated with licence plate recognition (LPR) and access control systems to provide a comprehensive solution for vehicle ingress and egress in a wide variety of operating environments. De-warping technology The UVSS has been trusted by government and law enforcement agencies as well as private sector The system, which does not require heavy construction to deploy, also features patented de-warping technology to provide unmatched correction of distortions and composite image stitching. The UVSS has been trusted by government and law enforcement agencies as well as private sector organisations worldwide to protect several high-profile facilities and events. Safe, fast, and efficient screening In late 2022, for example, the UVSS was deployed to protect stadiums and other venues throughout Qatar that hosted matches and events for the 2022 FIFA World Cup. Specifically, 40 UVSS units were installed at vehicle checkpoints for the eight World Cup stadiums in and around Doha, along with three logistics areas and a fan zone, to safeguard visitors and make the screening process safer, faster, and more efficient.
HID, a worldwide pioneer in trusted identity solutions, has been awarded a contract to provide Finland with a new high-security driver’s licence cards and personalisation services solution, incorporating the European second-generation smart Tachograph solution. This collaboration reflects HID’s commitment to enhancing security and efficiency in Finland's transportation systems. Configurable solution Finland will benefit from a comprehensive, tailor-made, and configurable solution that integrates software, hardware, and equipment to align with the Traffic Authority's vision of a streamlined and efficient digital document issuance system. For the project, HID has joined forces with CardPlus Systems, a trusted partner that provides secure ID documents, services, and systems, to ensure an exceptional driver's licence solution with industry-pioneering features. Security, efficiency, and compliance We will be able to ensure that our card services continue to meet the highest level of security" Max Fogdell, Head of Services for Driving licences and Examinations at Finland’s Transport and Communications Agency, Traficom, stated, "The Finnish Transport and Communications Agency, Traficom, is pleased to enter into a partnership with HID." "We are convinced that with HID's broad experience in the field of trusted identity solutions, we will be able to ensure that our card services continue to meet the highest level of security, efficiency, and compliance with the European Union's safety regulations.” Enhance drivers licence Craig Sandness, Senior Vice President and Head of Citizen Identity and Secure Issuance expressed his enthusiasm for the project, stating, "We are proud to collaborate with the government of Finland and contribute to the enhancement of the country's driver's licence and tachograph systems." "Our commitment to security and innovation is unwavering, and this contract is a testament to our dedication to safeguarding citizens and infrastructure." Safety standards and tachograph regulations With the European Union’s new safety standards and tachograph regulations, commercial vehicles in the region are required to install second-generation tachographs by 2026. HID’s advanced solution fully complies with these stringent regulations and includes smartcards securing access to device data for drivers, law enforcement, companies, and workshops.
SeeTrue, a global AI software solution pioneer for security screening, disclosed its recent entry into the realm of urban security through a strategic partnership with Israel Railways. This collaborative effort has resulted in the seamless integration of SeeTrue's cutting-edge AI solution into security screening checkpoints at railway stations throughout Israel, including the country's largest stations, where more than 1,000 bags require screening every hour. Faster, smoother security process The integration of SeeTrue into train station security processes has proven to be transformative, maintaining a consistently high level of security and operating continuously around the clock. Passengers benefit from a faster, smoother security process minimising stress and ensuring that critical security checks do not result in bottlenecks that can negatively impact the journey. Security screening solution This incident offers concrete proof of SeeTrue's invaluable contribution to ensuring public safety In a recent incident at one of the busiest and most central train stations, SeeTrue's AI security screening solution identified a bag containing a concealed 30-centimetre knife, alerting security personnel in real-time. As a result, the potential threat was swiftly and effectively neutralised, resulting in the arrest of the individual carrying the concealed knife. This incident offers concrete proof of SeeTrue's invaluable contribution to ensuring public safety in high-traffic transportation hubs. AI technology Assaf Frenkel, Co-Founder and CEO of SeeTrue, "We take immense pride in deepening our expertise in AI technology to include urban security, an endeavour that complements our pioneering work in aviation, customs, and other urban security checkpoints." Assaf Frenkel adds, "Partnering with a high-quality, innovative mass-transit organisation like Israel Railways is a testament to our commitment to revolutionising safety and security across multiple domains, making our cities and transportation systems safer and more efficient." Innovation and intelligence in railway security Hagay Rozenfeld, Head of Innovation, Israel Railways, said "Innovation at Israel Railways is a key part of our strategy, and AI plays a pivotal role in strengthening our pledge to passenger safety, seamlessly infusing intelligence into our security strategies and enabling us to provide optimal security for our passengers and our employees." Shaked Bar, Head of Security, Israel Railways, said "Acknowledging our responsibility to top-tier security at Israel Railways, we harness the power of AI to provide the highest security standards, ensuring the best passenger experience and safety."
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance with regulations, prevents accidental misuse, and streamlines workflows. We asked this week’s Expert Panel Roundtable: What safeguards are in place to avoid unauthorised retrieval of access control data?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionise physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
White papers
![Best practices for asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1699974817.png)
Best practices for asset management
Download![Securing care closer to patients](https://www.sourcesecurity.com/img/white-papers/612/920x533_1695745509.png)
Securing care closer to patients
Download![Machine Operator Authentication](https://www.sourcesecurity.com/img/white-papers/612/920x533-2_1685024513.jpg)
Machine Operator Authentication
Download![Understanding key control systems and best practices](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713432940.jpg)
Understanding key control systems and best practices
Download![Smart surveillance in the workplace](https://www.sourcesecurity.com/img/white-papers/612/920x533.png)
Smart surveillance in the workplace
Download![How end-to-end video security solutions can help your organisation with social distancing](https://www.sourcesecurity.com/img/white-papers/612/vaion-social-distancing-920x533.jpg)
How end-to-end video security solutions can help your organisation with social distancing
Download![How to overcome the storage challenges of adopting surveillance AI](https://www.sourcesecurity.com/img/white-papers/612/seagate-landing-page.jpg)
How to overcome the storage challenges of adopting surveillance AI
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download